RFE: extend security group rules to support logging

Bug #1659416 reported by Han Zhou
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
neutron
Won't Fix
Wishlist
Unassigned

Bug Description

It is important for operators to have visibility for security rule enforcements, as described in [1]. A specific requirement is to be able to control logging behaviour at rule level.

A typical use case is, when defining rules for a new application, or when an application has new clients, the user wants to observe/learn what are the active flows in "monitoring" phase, to avoid missing rules. During this phase, a "allow any" rule can be added to the security group for that application, and packets hitting that rule can be logged (with rate limiting).

For this purpose, rule level logging enabling/disabling is required. Instead of a generic logging API, this RFE propose a simple extension to security rule resource, to add a "log" property. It will be each plugin's choice whether and how to support it. Take networking-ovn as an example, it will be straightforward to translate this into the "log" keyword in OVN ACL.

[1] https://bugs.launchpad.net/neutron/+bug/1468366

Tags: rfe
Revision history for this message
Boden R (boden) wrote :

Is this an alternate approach to [1], or is the idea to supplement [1]?

If we're considering supplementing [1], I would've expected the proposal herein to leverage the constructs set forth there. For example, perhaps the 'resource_type' (see [1]) here could be 'security_group_rule'.

[1] https://review.openstack.org/#/c/203509/

Changed in neutron:
importance: Undecided → Wishlist
status: New → Confirmed
status: Confirmed → Won't Fix
Revision history for this message
Han Zhou (zhouhan) wrote :

Boden, I would say this is an alternative to [1]. [1] is more generic but need to be flexible enough to cover different resources. This one is simpler, only for sg-rules, and I think it would be easier to implement in an efficient manner.

[1] https://review.openstack.org/#/c/203509/

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.