Re: [RFC] Faster libvirtd restart with nwfilter rules, one more time

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 3/20/20 5:25 AM, nshirokovskiy wrote:
Hi, all.
Some time ago I posted RFC [1] concerning an issue of unresponsive
libvird during restart if there is large number of VMs that have network
filters on their interfaces. It was identified that in most cases we
don't need actually to reinstall network filter rules on daemon restart.
Thus I proposed patches [2] that check whether we need to reapply rules
or not.
The first version has a drawback that daemon won't reapply rules if
someone mangled them between daemon stop and start (and this can be done
just by restarting firewalld). The second one is just ugly :)
Around that time Florian Westphal in a letter off the mailing list
suggested to use {iptables|ebtables}-restore to apply rules in one
binary call. These binaries has --noflush option so that we won't reset
current state of tables.  We also need one more -L call for
iptables/ebtables to query current filter state to be able to construct
input for restore binaries.


So are you considering doing something with this idea? At the end of our discussion, both libvirt and firewalld people agreed that we're gaining nothing from setting our rules via firewalld passthrough, and we would be potentially gaining *a lot* by setting them in batch mode with "iptables-restore -n".


Perhaps we could just add a new firewall backend (in util/virfirewall.c) that checked for the presence of iptables-restore (and ip6tables-restore and ebtables-restore), and if they are found it would use a backend that just put all the rules for each layer together in a temporary file and send them to *-restore (the internals would need to be reorganized a bit, so that args like -w, -l, and -n could be added in during virFirewallApply (if necessary) rather than when initially adding rules).


Ooh! I just tried it, and iptables-restore also accepts (and acts on) lines with "-D" to delete rules! So we could do everything in a single go - intermixing -D and -A rules in the same file (to minimize the time when the firewall would be incorrect while still taking advantage of the efficiency of doing everything in a batch).


I wonder can we use this approach? I see currently only one issue - we
won't use firealld to spawn rules. But why we need to spawn rules
through firewalld if it present? We use passthrough mode anyway. I tried
to dig history for hints but didn't found anything. Patch [3] introduced
spawning rules thru firewalld-cmd.
Nikolay [1] [RFC] Faster libvirtd restart with nwfilter rules
https://www.redhat.com/archives/libvir-list/2018-September/msg01206.html
[2] nwfilter: don't reinstantiate filters if they are not changed
v1: https://www.redhat.com/archives/libvir-list/2018-October/msg00904.html
v2: https://www.redhat.com/archives/libvir-list/2018-October/msg01317.html
[3] network: use firewalld instead of iptables, when available
v0: https://www.redhat.com/archives/libvir-list/2012-April/msg01236.html
v1: https://www.redhat.com/archives/libvir-list/2012-August/msg00447.html
...
v4: https://www.redhat.com/archives/libvir-list/2012-August/msg01097.html








[Index of Archives]     [Virt Tools]     [Libvirt Users]     [Lib OS Info]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]     [Fedora Tools]

  Powered by Linux