Uploaded image for project: 'Lustre'
  1. Lustre
  2. LU-20290

LNet: add multitenant-aware filtered discovery/push views

    XMLWordPrintable

Details

    • Improvement
    • Resolution: Unresolved
    • Medium
    • None
    • None
    • 3
    • 9223372036854775807

    Description

      Add support for multitenant-aware LNet discovery filtering.

      When MT groups are configured, discovery responses and pushed ping updates are filtered such that peers only observe server NIDs belonging to the same configured MT visibility domain.

      This prevents clients from discovering or learning NIDs belonging to other tenant networks or admin-only networks.

      This change introduces:

      • Static MT group configuration via module parameters
      • Named MT visibility groups, including reserved admin group
      • MT-aware filtered ping/discovery views
      • MT-aware push payload selection
      • Shared discovery seqno handling across MT views
      • Preservation of legacy push/update semantics
      • Configurable handling for unclassified networks via policy mode (relaxed, forbidden, strict)

      Example:

      lnet_mt_groups="admin:tcp0;tenant01:tcp1;tenant02:tcp2"
      lnet_mt_unclassified_policy="strict" 

       
      With the above configuration:

      • client peers on tcp1 only discover tcp1 server NIDs
      • client peers on tcp2 only discover tcp2 server NIDs
      • peers on admin networks observe all server NIDs

      Note:

      • MT filtering affects both explicit discovery responses and pushed ping/discovery updates
      • Primary NID becomes visibility-domain relative under MT filtering
      • Existing non-MT behavior remains unchanged when no MT groups are configured
      • lnet_mt_unclassified_policy controls discovery visibility for LNet networks which are not part of any configured MT group (only takes effect if some are configured):
            • "relaxed": unclassified networks may discover other unclassified networks
            • "strict" unclassified networks only discover server NIDs on the same LNet
            • "forbidden": unclassified networks do not receive discovery informatio

        

      Attachments

        Activity

          People

            ssmirnov Serguei Smirnov
            ssmirnov Serguei Smirnov
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

            Dates

              Created:
              Updated: