-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
#675 - Node to Node encryption #655
Conversation
de7ce2f
to
cbd3fdd
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
generally LGTM, but I want to reread it a second time, as it's quite a long document, at the very least there are some spelling mistakes lurking in there imho, but I didn't want to comment on minor errors before actually having read the whole thing first.
Will provide more feedback, hopefully tomorrow.
Thanks for working on this!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overall it is an interesting reading and it looks good from my perspective.
I left just some minor comments there.
@OgarOgarovic check the failed pipelines |
8593ef0
to
b205def
Compare
Add image for a new openvswitch-ipsec service for transparent IPsec encryption of node to node traffic when using OVN neutron agent. Image uses s6-overlay [1] for process supervision as it runs two long run processes - ipsec monitor script and an IKE daemon. There is a document [2] on review downstream providing more context. [1] https://github.com/just-containers/s6-overlay [2] SovereignCloudStack/standards#655 Change-Id: I7afe95856f35b35c6b6c26707a684266f7f98a30 Signed-off-by: Ivan Vnučko <[email protected]>
Adds a role to deploy an openvswich-ipsec service container for IPsec encryption of tenant network traffic. There is a document downstream [1] providing more context. This role depends on a new kolla openvswitch-ipsec image. It needs OVN Neutron plugin agent set up and to enable OVN IPsec with certificate generation: `enable_ovn_ipsec: true` `neutron_ovs_generate_certificates: true` [1] - SovereignCloudStack/standards#655 Depends-on: I7afe95856f35b35c6b6c26707a684266f7f98a30 Change-Id: Icc951578906e387746971e8e7df3a38a57fa4735 Signed-off-by: Ivan Vnučko <[email protected]>
Adds a role to deploy an openvswich-ipsec service container for IPsec encryption of tenant network traffic. There is a document downstream [1] providing more context. This role depends on a new kolla openvswitch-ipsec image. It needs OVN Neutron plugin agent set up and to enable OVN IPsec with certificate generation: `enable_ovn_ipsec: true` `neutron_ovs_generate_certificates: true` [1] - SovereignCloudStack/standards#655 Depends-on: I7afe95856f35b35c6b6c26707a684266f7f98a30 Change-Id: Icc951578906e387746971e8e7df3a38a57fa4735 Signed-off-by: Ivan Vnučko <[email protected]>
@artificial-intelligence would you like to provide more feedback on this? |
SovereignCloudStack/issues#675 Signed-off-by: Filip Dobrovolny <[email protected]>
Signed-off-by: Ivan Vnučko <[email protected]>
Signed-off-by: Ivan Vnučko <[email protected]>
Signed-off-by: Ivan Vnučko <[email protected]>
Signed-off-by: Ivan Vnučko <[email protected]>
2f4c1ef
to
ce61933
Compare
@mbuechse @artificial-intelligence can we merge this one or do you have some further comments/discussion points? |
What is the reason for putting it into the Drafts folder? Why was it merged in "Proposal" state? If it's a decision record that has been accepted by the corresponding team (I guess Team IaaS in this case), then the |
@mbuechse It makes sense. We will rename it and put it under the |
PR here |
Relates: SovereignCloudStack/issues#675