Also i am confused why there are so many vlan in RouterOS. It must be that the vlan in the switch is hardware related while the bridge vlan is the Software and in the interface vlan idk.
Correct. The switch chip is quite a separate entity, and if you don't need hardware forwarding between its ports, you may deactivate it let the sowftare bridge do everything on its own. Another point is that the VLANs exist independently on each bridge, so you can have VLAN 27 at bridge A and VLAN 27 on bridge B and they don't leak to each other (this is not the case on the switch chip if hardware forwarding is enabled). That's a huge advantage in complex topologies. And VLAN interfaces attached directly to physical interfaces are also completely independent.
If you simplify that a small bit, you can look at the VLAN ID as just an extension of the MAC address, or as a logical address of a sub-interface on a physical interface, whichever is more illustrative for you. So what you would normally attach to ether1 (like IP address or dhcp client), you can attach to
/interface vlan name=ether1.27 vlan-id=27 interface=ether1 instead; the
/interface vlan is a stupid pipe which adds VLAN tags to those L2 frames carrying L3 packets which it receives from the system on its tagless end (referred to as the pipe's
name), and removes VLAN tags from frames which it can see at the underlying
interface if the VID in the tag matches the
vlan-id, and outputs only these frames after untagging from its
name end.
So if you just need to separate traffic on a single cable, you can attach as many
/interface vlan as you need to the Ethernet interfaces at each end; if the Ethernet port is a member port of a bridge, you must attach the
/interface vlan(s) to that bridge instead.