-
Notifications
You must be signed in to change notification settings - Fork 660
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Expand ACL model by rate-limits (a.k.a. policers) and counters. #1002
Conversation
Co-authored-by: Darren Loher <[email protected]>
Co-authored-by: Darren Loher <[email protected]>
Co-authored-by: Darren Loher <[email protected]>
Co-authored-by: Darren Loher <[email protected]>
Co-authored-by: Darren Loher <[email protected]>
Co-authored-by: Darren Loher <[email protected]>
Co-authored-by: Darren Loher <[email protected]>
Co-authored-by: Darren Loher <[email protected]>
Co-authored-by: Darren Loher <[email protected]>
Co-authored-by: Darren Loher <[email protected]>
Copp embaded limits
I have also added COPP VRF awarness
|
I have concerns with this change -- can you explain why this isn't using the QoS model, and/or why it is applicable to all ACLs across the system? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Adding a blocking comment as I think there are wider design questions for this approach.
Sure we can extend /qos classifiers. E.g. making Or we can extend /acl as in this proposal. OR we can define new object "/traffic-policy" that has structure similar to /qos classifier but is "attachment point agnostic" - attachable to interfaces, control-plane, forwarding-table, qos/interface ... @robshakir - WDYT ? |
Hi @rszarecki, We have the below of queries regarding your proposed model, can you please clarify?
Thank and regards |
Change Scope
This change introduces 2 new actions to ACL
This change also introduces "scope" attribute for above, that controlls aggregation level of counting/rate-limiting. This has direct impact on number of counter, rate-limit instances that need to be instantiated in datapalane.
The reate-limits are refined in dedicated branch under /acl and are reusable across acl-sets and their entries
The named rate-limit and counters are ACL entries actions
Atatachment of acl-set to interface (or control-plane-traffic) produces respective state
Finally "scope" is enums that alows to control is given instance of rate-limit (token-buckets) is shared among multiple acl-entries of same acl-set instance, shared among entries of multiple acl-set instances but at same attachment point (e.g. interface direction), etc
Platform Implementations