Replies: 5 comments
-
|
Also curious about this. Have many sites with one VLAN directly assigned, so I'm not following the need to create a group to hold one VLAN. If the decision is made to continue, will this process be automated during the upgrade, or do we have to undo site assignments before upgrading? |
Beta Was this translation helpful? Give feedback.
-
|
In addition to all of the above - we have a use case where VLANs need to span multiple sites (P2P RF links between sites). Currently we just put the same number at both sites and it's "assumed" to be the same... but if we're losing the ability to assign VLANs to sites then this is no longer viable. Representing this with VLAN Groups will be somewhat cumbersome, as it will require creation of arbitrary Site Groups or Regions to contain the sites using the same VLANs, since a single VLAN Group can't be scoped to multiple sites at the same time (AFAIK). |
Beta Was this translation helpful? Give feedback.
-
|
Also looking for clarification on this one, and why the decision was made / who it benefits. Right now it's easy to see what Site or other scope a VLAN is assigned to (and sort / filter by this) but it seems we will soon be forced to add a redundant level of organization - for reasons that aren't at all clear. There does not seem to be a value-add here, and I don't understand the reason behind the change. |
Beta Was this translation helpful? Give feedback.
-
|
I think VLANs should be a first-class concept on the device model, not an afterthought—e.g. something like: device.vlans.all() (and ideally device.vlans.effective() if we support inheritance/aggregation) We need this because we’ll have multiple VLAN “sources” / relationships that must be modeled, for example:
Different devices will consume different combinations of these:
We also need to account for platform-predefined VLANs that exist by default (e.g., Cisco Catalyst reserved VLANs like 1002–1005). These should show up in the device VLAN view as well—either as “system/platform VLANs” or similar—so the effective VLAN set is complete and the UI/API doesn’t hide what’s actually on the box. Example (Catalyst reserved VLANs): We should also explicitly handle overlaps between VLAN sources. Since a device’s VLAN view can be composed from multiple inputs (platform defaults + multiple site/site-link sets + device overrides), the same VLAN ID can show up more than once, and we need to detect and mark that rather than silently flattening it. Concretely, when we build device.vlans.all() / device.vlans.effective() we should:
|
Beta Was this translation helpful? Give feedback.
-
|
For a link (portA ↔ portB), we should be able to compute link-level consistency from the two ports’ assignments:
Expose as link.vlans.consistency() / port.peer().vlans.diff() with a clear diff + source attribution. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Netbox 4.4.0 came out and lists:
The Justification listed in that case isn't so much of a justification as it is an opinion:
Someone also asked in the case how this is handled from the API perspective, but it didn't get answered:
We are curious how this will shake out - since it's deprecated now, I presume removed in 4.5.0/4.6.0. When that happens will something automatically create groups and a group to site association?
Or is there an expectation that that is completed manually prior to 4.5?
In our case we only have one vlan per site (at most) but very few sites with vlans, so it's creating a vlan group to hold a single VLAN - so some busywork, but probably ok.
Just looking for clarification of these things so people know what to do well in advance of vlan to site being removed.
Beta Was this translation helpful? Give feedback.
All reactions