-
Notifications
You must be signed in to change notification settings - Fork 659
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add policy-forwarding network-instance attachment point #1224
base: master
Are you sure you want to change the base?
Conversation
No major YANG version changes in commit d203259 |
release/models/policy-forwarding/openconfig-pf-network-instances.yang
Outdated
Show resolved
Hide resolved
release/models/policy-forwarding/openconfig-pf-network-instances.yang
Outdated
Show resolved
Hide resolved
release/models/policy-forwarding/openconfig-pf-network-instances.yang
Outdated
Show resolved
Hide resolved
Last call for comments. This will merge on Jan 6th, 2025 |
description | ||
"The policy to be applied on the network-instance. Packets ingress | ||
on the referenced interface should be compared to the match | ||
criteria within the specified policy, and in the case that | ||
these criteria are met, the forwarding actions specified | ||
applied. These policies should be applied following quality of | ||
service classification, and ACL actions if such entities are | ||
referenced by the corresponding interface."; | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This description still talks about the "referenced interface".
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd like to see a precise definition of how matching is supposed to work.
In addition, I think there's a formatting issue with the references in the first comment, can it be fixed?
|
||
When attached to a network-instance, the policy-forwarding rules | ||
should be evaluated against packets in the specified | ||
network-instances."; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Similar comment to what I left in the previous PR #1150: what are the "packets in the specified network-instances"?
- does that mean that the policy applied to all interfaces associated with the network-instance on ingress (e.g. this change introduces only a new way of configuring the existing functionality), or
- are there any additional expectations w.r.t what packets should be matched (e.g packets redirected from another network-instance via a policy)?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The operational use case motivating this PR is for packets ingress to the device which arrive on interfaces (including virtual interfaces) which are mapped to a network-instance.
I am not aware of an operational use case that we have for packets re-directed from another network-instance.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Policy forwarding entries are already defined within a network instance, so what does the enclosing network instance mean?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The operational use case motivating this PR is for packets ingress to the device which arrive on interfaces (including virtual interfaces) which are mapped to a network-instance.
Thus, in terms of functionality, this configuration will be fully equivalent to applying a policy to all interfaces associated with the network-instance? We just adding a "simpler" way to configure this?
Can this be explicitly stated in the description? Thanks
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, that is correct. I will make this explicit in the description
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Policy forwarding entries are already defined within a network instance, so what does the enclosing network instance mean?
It is true, but without any "apply-policy" configuration, it is ambiguous where the policy is applied? Further, since OC has a way to apply-policy to interfaces, if none are specified, what should the behavior be?
I'd prefer an explicit leaf for this.
I will change the name/description from a leaf-ref to network-instance instead to a boolean like 'all-interfaces'. In our use case, we only want to apply the policy to the same network-instance the policy is defined in, and not some different network-instance.
Hi Darren, please note that EOS decap groups cannot be attached to a network instances, so not sure why we think that EOS decap group implements this proposal. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I tend to agree with the other reviewers here -- given that we are already in the context of a network-instance
when we are applying a policy this looks to be:
- syntatic sugar to apply to "all interfaces",
- probably something that can be applied programmatically at the cost of adding some more content to the configuration request.
It looks like @nandanarista also highlighted this isn't supported in EOS. Can we look at whether we need to make this enhancement?
Change Scope
Today policy-forwarding policies can only be attached to interfaces. This change adds network-instance as an attachment point for policy-forwarding rules. This causes packets in the specified network-instance to be evaluated against the specified policy-forwarding rules and actions.
This change is backwards compatible.
Tree diff view
We are at:
/network-instances/network-instance/policy-forwarding/
vrf-policy
vrf default address-family ipv4 policy type pbr input GRE-DECAP-PBR
ip decap-group SRTE-GRE-DECAP
tunnel type gre
tunnel decap-ip 10.5.32.0