Public bug reported:

Bug https://bugs.launchpad.net/neutron/+bug/1732067 has a bad impact on VM 
traffic. And all the fix has some potenial risk of data-plane down. So we added 
a new bug for the new solution:
It will add a flow table something like a switch FDB table. The accepted egress 
flows will be take care in that.

table=94 will be used to do accept egress traffic classification when enable 
openflow firewall:
1. the "dest mac" is handled this ovs-agent, direct "output" to that port
2. "ARP request" with enabled L2 pop, packets will still be sent to patch port 
to tunnel bridge
3. "dest mac" not in this host, vlan or tunnel (gre/vxlan/geneve) unicast will 
be sent to corresponding patch port of tunnel/physical bridge.
4. other traffic still match the original NORMAL flow

A new table=61 will be used to do accept egress traffic classification when not 
enable openflow firewall:
1. egress packets will be send to table 61, match rule will be of-port which be 
handled by ovs-agent "in_port=<some_local_of_port>"
2. the "dest mac" is handled this ovs-agent, direct "output" to that port
3. "ARP request" with enabled L2 pop, packets will still be sent to patch port 
to tunnel bridge
4. "dest mac" not in this host, vlan or tunnel (gre/vxlan/geneve) unicast will 
be sent to corresponding patch port of tunnel/physical bridge.
5. other traffic still match the original NORMAL flow

** Affects: neutron
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1841622

Title:
  [L2][OVS] add accepted egress fdb flows

Status in neutron:
  New

Bug description:
  Bug https://bugs.launchpad.net/neutron/+bug/1732067 has a bad impact on VM 
traffic. And all the fix has some potenial risk of data-plane down. So we added 
a new bug for the new solution:
  It will add a flow table something like a switch FDB table. The accepted 
egress flows will be take care in that.

  table=94 will be used to do accept egress traffic classification when enable 
openflow firewall:
  1. the "dest mac" is handled this ovs-agent, direct "output" to that port
  2. "ARP request" with enabled L2 pop, packets will still be sent to patch 
port to tunnel bridge
  3. "dest mac" not in this host, vlan or tunnel (gre/vxlan/geneve) unicast 
will be sent to corresponding patch port of tunnel/physical bridge.
  4. other traffic still match the original NORMAL flow

  A new table=61 will be used to do accept egress traffic classification when 
not enable openflow firewall:
  1. egress packets will be send to table 61, match rule will be of-port which 
be handled by ovs-agent "in_port=<some_local_of_port>"
  2. the "dest mac" is handled this ovs-agent, direct "output" to that port
  3. "ARP request" with enabled L2 pop, packets will still be sent to patch 
port to tunnel bridge
  4. "dest mac" not in this host, vlan or tunnel (gre/vxlan/geneve) unicast 
will be sent to corresponding patch port of tunnel/physical bridge.
  5. other traffic still match the original NORMAL flow

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1841622/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to     : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp

Reply via email to