Congress Tutorial - Tenant Sharing Policy¶
Overview¶
This tutorial illustrates how to create a Congress monitoring policy that detects when one OpenStack tenant shares a network with another OpenStack tenant, and then flags that sharing as a policy violation.
Data Source Tables
- Neutron networks: list of each network and its owner tenant.
- Neutron ports: list of each port and its owner tenant.
- Nova servers: list of each server, and its owner tenant.
Detailed Policy Description
This policy collects the owner information for each server, any ports that server is connected to, and each network those ports are part of. It then verifies that the owner (tenant_id) is the same for the server, ports, and networks. If the tenant_id does not match, the policy will insert the server’s name to the Congress error table.
Setting up Devstack¶
The first step is to install and configure Devstack + Congress:
Install Devstack and Congress using the directions in the following README. When asked for a password, type “password” without the quotes.
https://github.com/openstack/congress/blob/master/README.rst#41-devstack-install
The Devstack installation script will automatically create a data source instance of the neutronv2 driver. If you are not using Devstack, you will need to create the data source: a.) If your environment supports identity v3 then,
$ AUTH_URL=`openstack endpoint list –service identity | grep “public” | awk ‘{print $14}’`
b.) If your environment only supports identity v2 then,
$ AUTH_URL=`openstack endpoint show identity | grep “public” | awk ‘{print $4}’`
$ openstack congress datasource create neutronv2 neutronv2 –config username=admin –config tenant_name=admin –config password=password –config auth_url=$AUTH_URL
Change auth_strategy from “keystone” to “noauth” in /etc/congress/congress.conf
Restart congress-server:
$ screen -x stack switch to congress window <Ctrl-A> ' <congress-window-number> <Enter> <Ctrl-C> <Up> <Enter> <Ctrl-A> d
Setting up an OpenStack VM and network¶
At this point, Devstack and Congress are running and ready to accept API calls. Now you can setup the OpenStack environment, including a network and subnet owned by the “admin” tenant, a port owned by the “demo” tenant, and a VM owned by the “demo” tenant.
Change to the congress directory:
$ cd /opt/stack/congress
Login as the admin tenant:
$ source ~/devstack/openrc admin admin
Create a network called “network-admin”. Note this is owned by the admin tenant:
$ neutron net-create network-admin Created a new network: +-----------------------+--------------------------------------+ | Field | Value | +-----------------------+--------------------------------------+ | admin_state_up | True | | id | a4130b34-81b4-46df-af3a-f133b277592e | | name | network-admin | | port_security_enabled | True | | shared | False | | status | ACTIVE | | subnets | | | tenant_id | 7320f8345acb489e8296ddb3b1ad1262 | +-----------------------+--------------------------------------+
Create a subnet called “subnet-admin”. Note this is owned by the admin tenant:
$ neutron subnet-create network-admin 2.2.2.0/24 --name subnet-admin Created a new subnet: +-------------------+------------------------------------------+ | Field | Value | +-------------------+------------------------------------------+ | allocation_pools | {"start": "2.2.2.2", "end": "2.2.2.254"} | | cidr | 2.2.2.0/24 | | dns_nameservers | | | enable_dhcp | True | | gateway_ip | 2.2.2.1 | | host_routes | | | id | 6ff5faa3-1752-4b4f-b744-2e0744cb9208 | | ip_version | 4 | | ipv6_address_mode | | | ipv6_ra_mode | | | name | subnet-admin | | network_id | a4130b34-81b4-46df-af3a-f133b277592e | | tenant_id | 7320f8345acb489e8296ddb3b1ad1262 | +-------------------+------------------------------------------+
Create port owned by the demo tenant:
$ source ~/devstack/openrc admin demo $ neutron port-create network-admin | tee port-create.log Created a new port: +-----------------------+--------------------------------------------------------------------------------+ | Field | Value | +-----------------------+--------------------------------------------------------------------------------+ | admin_state_up | True | | allowed_address_pairs | | | binding:host_id | | | binding:profile | {} | | binding:vif_details | {} | | binding:vif_type | unbound | | binding:vnic_type | normal | | device_id | | | device_owner | | | fixed_ips | {"subnet_id": "6ff5faa3-1752-4b4f-b744-2e0744cb9208", "ip_address": "2.2.2.2"} | | id | 066c5cfc-949e-4d56-ad76-15528c68c8b8 | | mac_address | fa:16:3e:e9:f8:2a | | name | | | network_id | a4130b34-81b4-46df-af3a-f133b277592e | | security_groups | dd74db4f-fe35-4a51-b920-313fd36837f2 | | status | DOWN | | tenant_id | 81084a94769c4ce0accb6968c397a085 | +-----------------------+--------------------------------------------------------------------------------+ $ PORT_ID=`grep " id " port-create.log | awk '{print $4}'`
Create vm named “vm-demo” with the newly created port. The vm is owned by the demo tenant:
$ nova boot --image cirros-0.3.4-x86_64-uec --flavor 1 vm-demo --nic port-id=$PORT_ID +--------------------------------------+----------------------------------------------------------------+ | Property | Value | +--------------------------------------+----------------------------------------------------------------+ | OS-DCF:diskConfig | MANUAL | | OS-EXT-AZ:availability_zone | nova | | OS-EXT-SRV-ATTR:host | Ubuntu1204Server | | OS-EXT-SRV-ATTR:hypervisor_hostname | Ubuntu1204Server | | OS-EXT-SRV-ATTR:instance_name | instance-00000001 | | OS-EXT-STS:power_state | 0 | | OS-EXT-STS:task_state | networking | | OS-EXT-STS:vm_state | building | | OS-SRV-USG:launched_at | - | | OS-SRV-USG:terminated_at | - | | accessIPv4 | | | accessIPv6 | | | adminPass | js6ZnNjX82rQ | | config_drive | | | created | 2014-08-15T00:08:11Z | | flavor | m1.tiny (1) | | hostId | 930764f06a4a5ffb8e433b24efce63fd5096ddaee5e62b439169fbdf | | id | 19b6049e-fe69-416a-b6f1-c02afaf54a34 | | image | cirros-0.3.4-x86_64-uec (e8dc8305-c9de-42a8-b3d1-6b1bc9869f32) | | key_name | - | | metadata | {} | | name | vm-demo | | os-extended-volumes:volumes_attached | [] | | progress | 0 | | security_groups | default | | status | BUILD | | tenant_id | 81084a94769c4ce0accb6968c397a085 | | updated | 2014-08-15T00:08:12Z | | user_id | 3d6c6119e5c94c258a26ab246cdcac12 | +--------------------------------------+----------------------------------------------------------------+
Get tenant ids:
$ keystone tenant-list | tee tenant-list.log +----------------------------------+--------------------+---------+ | id | name | enabled | +----------------------------------+--------------------+---------+ | 7320f8345acb489e8296ddb3b1ad1262 | admin | True | | 81084a94769c4ce0accb6968c397a085 | demo | True | | 315d4a5892ed4da1bdf717845e8959df | invisible_to_admin | True | | b590e27c87fa40c18c850954dca4c879 | service | True | +----------------------------------+--------------------+---------+ $ ADMIN_ID=`grep " admin " tenant-list.log | awk '{print $2}'` $ DEMO_ID=`grep " demo " tenant-list.log | awk '{print $2}'`
Creating a Congress Policy¶
At this point, demo’s vm exists and its port is connected to an network belonging to admin. This is a violation of the policy. Now you will add the congress policy to detect the violation.
Add a rule that detects when a VM is connected to a port belonging to a different group:
CongressClient: $ openstack congress policy rule create classification "error(name2) :- neutronv2:ports(a, tenant_id, c, network_id, e, f, g, device_id, i), nova:servers(device_id, name2, c2, d2, tenant_id2, f2, g2, h2), neutronv2:networks(network_id, tenant_id3, c3, d3, e3, f3), not same_group(tenant_id, tenant_id2)" +---------+--------------------------------------------------------------------------+ | Field | Value | +---------+--------------------------------------------------------------------------+ | comment | None | | id | c235f3a6-44cc-4222-8201-80188f9601ce | | name | None | | rule | error(name2) :- | | | neutronv2:ports(a, tenant_id, c, network_id, e, f, g, device_id, i), | | | nova:servers(device_id, name2, c2, d2, tenant_id2, f2, g2, h2), | | | neutronv2:networks(network_id, tenant_id3, c3, d3, e3, f3), | | | not same_group(tenant_id, tenant_id2) | +---------+--------------------------------------------------------------------------+
or:
$ curl -X POST localhost:1789/v1/policies/classification/rules -d '{"rule": "error(name2) :- neutronv2:ports(a, tenant_id, c, network_id, e, f, g, device_id, i), nova:servers(device_id, name2, c2, d2, tenant_id2, f2, g2, h2), neutronv2:networks(network_id, tenant_id3, c3, d3, e3, f3), not same_group(tenant_id, tenant_id2)"}' {"comment": null, "id": "783ff249-6a52-4691-baf7-3cdfb8f9d200", "rule": "error(name2) :- \n neutronv2:ports(a, tenant_id, c, network_id, e, f, g, device_id, i),\n nova:servers(device_id, name2, c2, d2, tenant_id2, f2, g2, h2),\n neutronv2:networks(network_id, tenant_id3, c3, d3, e3, f3),\n not same_group(tenant_id, tenant_id2)", "name": null}
Add a rule that detects when a port is connected to a network belonging to a different group:
CongressClient: $ openstack congress policy rule create classification "error(name2) :- neutronv2:ports(a, tenant_id, c, network_id, e, f, g, device_id, i), nova:servers(device_id, name2, c2, d2, tenant_id2, f2, g2, h2), neutronv2:networks(network_id, tenant_id3, c3, d3, e3, f3), not same_group(tenant_id2, tenant_id3)" +---------+--------------------------------------------------------------------------+ | Field | Value | +---------+--------------------------------------------------------------------------+ | comment | None | | id | f7369e20-8b1b-4315-9b68-68197d740521 | | name | None | | rule | error(name2) :- | | | neutronv2:ports(a, tenant_id, c, network_id, e, f, g, device_id, i), | | | nova:servers(device_id, name2, c2, d2, tenant_id2, f2, g2, h2), | | | neutronv2:networks(network_id, tenant_id3, c3, d3, e3, f3), | | | not same_group(tenant_id2, tenant_id3) | +---------+--------------------------------------------------------------------------+
or:
$ curl -X POST localhost:1789/v1/policies/classification/rules -d '{"rule": "error(name2) :- neutronv2:ports(a, tenant_id, c, network_id, e, f, g, device_id, i), nova:servers(device_id, name2, c2, d2, tenant_id2, f2, g2, h2), neutronv2:networks(network_id, tenant_id3, c3, d3, e3, f3), not same_group(tenant_id2, tenant_id3)"}' {"comment": null, "id": "f7708411-a0fc-4ee8-99e6-0f4be7e980ff", "rule": "error(name2) :- \n neutronv2:ports(a, tenant_id, c, network_id, e, f, g, device_id, i),\n nova:servers(device_id, name2, c2, d2, tenant_id2, f2, g2, h2),\n neutronv2:networks(network_id, tenant_id3, c3, d3, e3, f3),\n not same_group(tenant_id2, tenant_id3)", "name": null}
Define a table mapping a tenant_id to any other tenant in the same group:
CongressClient: $ openstack congress policy rule create classification "same_group(x, y) :- group(x, g), group(y, g)" +---------+--------------------------------------+ | Field | Value | +---------+--------------------------------------+ | comment | None | | id | a3d0cfcb-d013-4578-ac60-3e8cefb4ab35 | | name | None | | rule | same_group(x, y) :- | | | group(x, g), | | | group(y, g) | +---------+--------------------------------------+
or:
$ curl -X POST localhost:1789/v1/policies/classification/rules -d '{"rule": "same_group(x, y) :- group(x, g), group(y, g)"}' {"comment": null, "id": "e919d62e-b9af-4b50-a22c-c266379417b8", "rule": "same_group(x, y) :- \n group(x, g),\n group(y, g)", "name": null}
Create a table mapping tenant_id to a group name. admin and demo are in two separate groups called “IT” and “Marketing” respectively. In practice, this “group” table would receive group membership information from a system like Keystone or ActiveDirectory. In this tutorial, we’ll populate the group table with membership information manually:
CongressClient: $ openstack congress policy rule create classification "group(\"$ADMIN_ID\", \"IT\") :- true" +---------+-----------------------------------------------------+ | Field | Value | +---------+-----------------------------------------------------+ | comment | None | | id | 97a6aeb0-0c9d-493b-8b0c-77691c1c3547 | | name | None | | rule | group("14a3eb4f5b234b578ff905a4bec71605", "IT") :- | | | true() | +---------+-----------------------------------------------------+
or:
$ curl -X POST localhost:1789/v1/policies/classification/rules -d "{\"rule\": \"group(\\\"$ADMIN_ID\\\", \\\"IT\\\") :- true \"}" {"comment": null, "id": "4a51b768-1458-4c68-881f-1cf2f1edb344", "rule": "group(\"14a3eb4f5b234b578ff905a4bec71605\", \"IT\") :- \n true()", "name": null}
Then:
CongressClient: $ openstack congress policy rule create classification "group(\"$DEMO_ID\", \"Marketing\") :- true" +---------+------------------------------------------------------------+ | Field | Value | +---------+------------------------------------------------------------+ | comment | None | | id | 67c0d86d-f7cf-4db1-9efa-4d46960a3905 | | name | None | | rule | group("8f08a89de9c945d4ac7f945f1d93b676", "Marketing") :- | | | true() | +---------+------------------------------------------------------------+
or:
$ curl -X POST localhost:1789/v1/policies/classification/rules -d "{\"rule\": \"group(\\\"$DEMO_ID\\\", \\\"Marketing\\\") :- true \"}" {"comment": null, "id": "e6b57c8f-ffd2-4acf-839c-83284519ae3c", "rule": "group(\"8f08a89de9c945d4ac7f945f1d93b676\", \"Marketing\") :- \n true()", "name": null}
Listing Policy Violations¶
Finally, we can print the error table to see if there are any violations (which there are).
List the errors. You should see one entry for “vm-demo”:
$ curl -X GET localhost:1789/v1/policies/classification/tables/error/rows { "results": [ { "data": [ "vm-demo" ] } ] }
Fix the Policy Violation¶
To fix the policy violation, we’ll remove the demo’s port from admin’s network:
$ neutron port-delete $PORT_ID Deleted port: 066c5cfc-949e-4d56-ad76-15528c68c8b8
Relisting Policy Violations¶
Now, when print the error table it will be empty because there are no violations:
$ curl -X GET localhost:1789/v1/policies/classification/tables/error/rows { "results": [] }