[R2.0-Build 12]: inconsistent behaviour when attach-detach security group from SI

Bug #1403348 reported by alok kumar
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Juniper Openstack
Status tracked in Trunk
R2.0
Won't Fix
Medium
Rudra Rugge
R2.1
Won't Fix
Medium
Rudra Rugge
R2.20
Won't Fix
Medium
Rudra Rugge
R3.0
Invalid
Medium
Rudra Rugge
R3.1
Invalid
Medium
Rudra Rugge
Trunk
Invalid
Medium
Rudra Rugge

Bug Description

when transparent firewall SI is launched then there is no (internal)security group "__no_rule__" attached to the instance.

but when I attach default SG and detach it again from SI, then SI has (internal)security group "__no_rule__" attached.

because of this it blocks all the traffic after detaching the default SG.

information type: Proprietary → Public
tags: removed: blocker
Revision history for this message
Sachin Bansal (sbansal) wrote :

Now that we can't pass any traffic in the absence of a security group, for transparent SI, we should create an allow-all internal SG and attach to it.

tags: added: blocker
Revision history for this message
Rudra Rugge (rrugge) wrote :

This is invalid as it is not expected to attached security groups to transparent services. If the user does attach a security group then the control is with the user to manage the security groups from that point on like other regular VMs.

Revision history for this message
Vedamurthy Joshi (vedujoshi) wrote :

Rudra,
if the user attaches and detaches a SG, it should be the same as what he had earlier.

I think it would be incorrect for us to argue that once we attach a SG, all bets are off.

Revision history for this message
Nagabhushana R (bhushana) wrote :

Per the email discussion, it was decided that this might not be one of the top order bugs to fix right now, but we need to document this behavior. This still needs to be fixed.

tags: added: releasenote
tags: removed: blocker
tags: added: quench
Revision history for this message
OpenContrail Admin (ci-admin-f) wrote : [Bug update]

bug update...

Revision history for this message
Rudra Rugge (rrugge) wrote :

Service chain V2 does not need this support

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.