Replies: 10 comments 2 replies
-
Currently the autoscale feature has dependency on loadbalancing service. For now it only works with isolated networks or vpc with lb. |
Beta Was this translation helpful? Give feedback.
-
Hi @weizhouapache , Allowing VNF to be the LB Provider would be great, but come to think of it, i think it will pose a challenge because Cloudstack will need to recognise the different metrics that the VNF outputs for Scale Up, Scale Down etc. If Autoscale relies on Virtual Router for now, then would this suggestion below be easier to implement instead? In this diagram:
I believe a UI is needed to specify the conditions in which the Virtual Router will route the traffic to the VNF. I think basic conditions will do, as the more advanced stuff will be done by the VNF. |
Beta Was this translation helpful? Give feedback.
-
currently Autoscaling supports 5 counters, see https://docs.cloudstack.apache.org/en/latest/adminguide/autoscale_with_virtual_router.html#id2 it looks like you need a feature like traffic mirroring. |
Beta Was this translation helpful? Give feedback.
-
@weizhouapache actually in my diagram above, im suggesting to not use VNF to provide Autoscaling Feature. Let the current logic work as is. The end result we are trying to achieve is to implement some sort of security implementation from the internet, just before it gets distributed to the VMs in the VPC.
But this is not possible because the default gateway must be the Virtual Router. So in my diagram, i was suggesting another way to achieve that is by having the Virtual Router, route traffic to the VNF. The implementation would look like this.
|
Beta Was this translation helpful? Give feedback.
-
the second option looks like option 1 make more sense to me. the public Ip needs to be associated to the VNF. |
Beta Was this translation helpful? Give feedback.
-
@weizhouapache traffic mirroring is a great tool but it doesnt allow for taking action against malicious traffic. Would Option 1 be more straightforward to implement? And in this option, i suppose assigning a public ip to the vnf should not be an issue. But how would the traffic then get send back to the virtual router? And how would the virtual router recognise the vnf as the new default gateway? |
Beta Was this translation helpful? Give feedback.
-
@weizhouapache , ive updated the diagram to reflect Option 1 better. |
Beta Was this translation helpful? Give feedback.
-
this seems like a discussion that ccan lead to several implementation ideas/issues. I'm converting it to a discussion. |
Beta Was this translation helpful? Give feedback.
-
@weizhouapache what are your thoughts on this so far? |
Beta Was this translation helpful? Give feedback.
-
@btzq the VR's firewall is good enough for the majority of Web Traffic. With that said, I really like your idea as that could fit many use cases, I hope someone picks up the development of that. |
Beta Was this translation helpful? Give feedback.
-
ISSUE TYPE
COMPONENT NAME
CLOUDSTACK VERSION
CONFIGURATION
OS / ENVIRONMENT
SUMMARY
Autoscaling was introduce few months ago and so far it works well.
However in more enterprise environments, Autoscale is usually required for web servers, which needs a layer of security applicance in the front to prevent the service from being exposed to vulnerabilities.
VNF Appliances have been introduced in Cloudstack which allows users to bring in their own Virtual Network Appliances (eg. PFsense, FortigateVM) to help with this. But these work effectively only in a L2 Environment, because if it was used in a normal VPC, the default gateway for all VMs would be the Virtual Router, hence bypassing the VNF altogether.
As a cloud provider, looking to service enterprise customers, id like to be able to use both autoscaling and VNF appliances together. Hence, am wondering if it is possible to enhance the virtual router to forward specified traffic (based on specific rules eg. CIDR, Private IPs) to a specified VNF hosted within the VPC. Then, the VNF would be configured to handle the 'filtering/firewalling' and other sort of functions that the VNF is responsible to handle. And once done, it will route the traffic back to the Virtual Router.
This method would not only solve the autoscaling issue, but would solve the issue in general where customers cant filter their traffic to the internet/virtual router if using a VPC. Also would solve the pain of using ACL Lists right now, where if a VPC has a large number of networks, ACL rules are too tedious to manage. This would be made much easier with a VNF.
Just ideas, may sound crazy, open for discussion.
STEPS TO REPRODUCE
EXPECTED RESULTS
ACTUAL RESULTS
Beta Was this translation helpful? Give feedback.
All reactions