Feature #3204
Dynamically push out changes to Security Groups
Status: | Closed | Start date: | 09/29/2014 | |
---|---|---|---|---|
Priority: | High | Due date: | ||
Assignee: | Ruben S. Montero | % Done: | 0% | |
Category: | Drivers - Network | |||
Target version: | Release 5.0 | |||
Resolution: | fixed | Pull request: |
Description
Call the network driver to update the set of iptables rules
Associated revisions
feature #3204: Security group initial commit
feature #3204: fix typo
feature #3204: Update VM SECURITY_GROUP_RULES in template
feature #3204: Handle UPDATESG driver messages. Refactor SG rules
get/set
feature #3204: Expose XML-RPC API, OCA ruby bindings and CLI command
feature #3204: Fix update procedure. Add information to CLI commands.
feature #3204: Add security group id to driver message.
feature #3204: Fix driver issues. Add missing driver actions.
feature #3204: Rename ObjectCollection methods. Better model for
ObjectColletion for User, Group & Datastore. Add auth_op to Commit
operation
feature #3204: Make it work with out migrator
feature #3204: Security Group dynamic update. Add support to update SG
rules of running VMs though a new one.secgroup.commit operation
Feature #3204: Add new sgroup elements in onedb migrator
feature #3204: Fix empty message for main_action
Feature #3204: Automatic commit after secgroup rule update
Feature #3204: Choose correct xpath filters
Feature #3204: Show updated/updating secgroup VMs in sunstone
Feature #3204: Fix onesecgroup commit description
Feature #3204: Add the SG commit action to sunstone
Feature #3204: Remove commit --recover from sunstone
History
#1 Updated by Tino Vázquez almost 7 years ago
- Tracker changed from Feature to Backlog
- Priority changed from Normal to High
#2 Updated by Ruben S. Montero over 6 years ago
- Status changed from New to Pending
#3 Updated by Christian Hüning over 6 years ago
Do you mean to update existing VMs with new rules?
#4 Updated by Ruben S. Montero over 6 years ago
Christian Hüning wrote:
Do you mean to update existing VMs with new rules?
Exactly
#5 Updated by Ruben S. Montero about 6 years ago
Also look at this:
https://forum.opennebula.org/t/how-to-manage-openvswitch-flows-with-opennebula/701/6
to expose this functionality to recreate flows/iptables rules
#6 Updated by Justin Riley over 5 years ago
Just dropping a note that this is really important - security groups are almost useless without this feature for us...
#7 Updated by Ruben S. Montero over 5 years ago
- Target version set to Release 5.0
#8 Updated by Ruben S. Montero over 5 years ago
- Tracker changed from Backlog to Feature
- Status changed from Pending to New
#9 Updated by Ruben S. Montero over 5 years ago
- Assignee set to Ruben S. Montero
#10 Updated by Ruben S. Montero about 5 years ago
- Status changed from New to Closed
- Resolution set to fixed