** Changed in: mos/6.0.x
       Status: New => Won't Fix

** Changed in: mos/6.0.x
    Milestone: 6.0.1 => 6.0-updates

** Changed in: mos/6.0.x
     Assignee: MOS Neutron (mos-neutron) => MOS Sustaining (mos-sustaining)

** Changed in: mos/6.0.x
       Status: Won't Fix => Confirmed

** Changed in: mos/5.1.x
       Status: New => Won't Fix

** Changed in: mos/5.0.x
       Status: New => Won't Fix

** Changed in: mos/4.1.x
       Status: Incomplete => Won't Fix

** Changed in: mos/6.0.x
       Status: Confirmed => Won't Fix

** No longer affects: mos

** No longer affects: mos/4.1.x

** No longer affects: mos/5.0.x

** No longer affects: mos/5.1.x

** No longer affects: mos/6.0.x

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1432858

Title:
  Suboptimal security groups calculation for nodes

Status in OpenStack Neutron (virtual network service):
  Invalid

Bug description:
  During my testing Openstack with Neutron on scale I found that security group 
updates for the neutron-ovs-agent are suboptimal. The agent will request the 
security group rules for all of the ports attached to OVS. The server will then 
provide the rules for each individual port,
  which are almost identical for the ports in the same security group. This 
becomes extremely large if the security group has a lot of members and the OVS 
agent has a lot of ports.

  So here is some math:
  If a security group has 2000 VM’s spread across and 50 compute nodes, the 
average node will have 40 VMs. If a new VM is launched in the same security 
group, each compute node will get a notification and request the security group 
info that will have 2001 entries for each of the ~40 ports on that node. That’s 
~80k records that need to be delivered to 50 compute nodes in a short period of 
time. The only difference between each port’s list of rules is that the port’s 
fixed_ips are excluded.

  I suggest approach when there would be only one response for node that
  contains 2000+1 records. The agent would be responsible for taking the
  list of rules for the security group and applying it per port by
  excluding the rule referencing the port’s address. Besides the
  generation of useless information and a lot of work done on neutron-
  server side it will significantly decrease load on oslo.messaging and
  neutron-server. Right now in my env (25 computes; 1500VMs) a security
  groups response could be up to 32Mb for each compute node/ovs-agent.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1432858/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to     : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp

Reply via email to