-
Notifications
You must be signed in to change notification settings - Fork 62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Let's enable enable-ml2-port-security out of the box #218
base: master
Are you sure you want to change the base?
Let's enable enable-ml2-port-security out of the box #218
Conversation
7482080
to
dc507e2
Compare
The CI error is on the server side I believe.
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
So, Octavia isn't enabled in the bundles by default - but there is a loadbalancer specific overlay in which would arguably be a better place to enable the ml2-port-security since the justification in the commit message is around Octavia Loadbalancers requiring it.
On the other hand, perhaps the default for the neutron-api charm is wrong and the ml2-port-security should be enabled by default rather than disabled by default. I get the sense that it is generally enabled more often than not, which begs the question as to whether the current default is the right choice. Which would also be better to do in the charm than in every single bundle.
Of course, there are drawbacks to changing the default as this changes some important behavior for folks who have not considered it before and they will see a behavior change in the upgrade.
So, I guess in short, I'm less of a fan in changing it in every bundle since Rocky and think this should rather be a discussion about what the right default is here or if we should consider a more targeted change towards the loadbalancer overlay.
Hi Billy, thanks for reviewing this. My comments are below:
Yeah, my commit message was too casual. It's a must-have for Octavia, but it should be enabled for almost all cases as you pointed out.
In Canonical's field deployments, it's always enabled. The reasons the config is still false in the charm are (in my understanding):
EDIT: ARP spoofing protection is enabled even when port security extension is disabled so the statement above is probably not applicable or correct.
Initially I thought about it, but:
Openstack-base bundle is opinionated about the architecture (it's OVS/OVN only) so I thought we can be opinionated about ml2-port-security too. |
Neutron's port security extension allows operators to turn on and off the port security on per port or per network basis. It brings flexibility to network port management and it's expected to be available where the extension is available, OVS/OVN deployments in mind. Let's turn it on for new deployments. Also, it's must-have for Octavia as per the charm deployment guide so make sure it's enabled in the Octavia overlay bundle.
dc507e2
to
72a5e25
Compare
I've updated the number of files touched and the commit message for the time being. |
enable-ml2-port-security for Yoga+
Neutron's port security extension allows operators to turn on and off
the port security on per port or per network basis. It brings
flexibility to network port management and it's expected to be available
where the extension is available, OVS/OVN deployments in mind. Let's
turn it on for new deployments.
Also, it's must-have for Octavia as per the charm deployment guide so
make sure it's enabled in the Octavia overlay bundle.