<div dir="ltr">Hi Mohan,<div><br><div>You can find the neutron logs on the attached.</div><div>I used the sripts below for the lab.</div><div>Please cloud you give the networking-sfc channel and your username ?</div><div>Regards,</div><div><br></div><div><div>cat create_sfc_ports.sh</div><div>#!/bin/bash</div><div><br></div><div>neutron port-create --name p1 net1</div><div>neutron port-create --name p2 net1</div><div>neutron port-create --name p3 net1</div><div>neutron port-create --name p4 net1</div><div><br></div><div>#In part 4: I've added 4 instances in this step. 2 SFs , source and dst</div><div>nova boot --flavor m1.tiny --image cirros-0.3.4-x86_64-uec --nic port-id=$(neutron port-list | grep -w p1 | awk '{print $2}') --nic port-id=$(neutron port-list | grep -w p2 | awk '{print $2}') vmvx1</div><div>nova boot --flavor m1.tiny --image cirros-0.3.4-x86_64-uec --nic port-id=$(neutron port-list | grep -w p3 | awk '{print $2}') --nic port-id=$(neutron port-list | grep -w p4 | awk '{print $2}') vmvx2</div><div># the source vm has 55.55.55.8 and the dsl 55.55.55.7</div><div>cat create_flow_classifier.sh</div><div><br></div><div> neutron flow-classifier-create \</div><div> --ethertype IPv4 \</div><div> --source-ip-prefix <a href="http://55.55.55.8/32">55.55.55.8/32</a> \</div><div> --logical-source-port 1b2ec7a7-b6ae-48db-bc5c-76970f0da4fd \</div><div> --destination-ip-prefix <a href="http://55.55.55.7/32">55.55.55.7/32</a> \</div><div> --protocol icmp FC1</div><div> </div><div>cat create_port_pair.sh</div><div><br></div><div>#!/usr/bin/env bash</div><div>neutron port-pair-create --ingress=p1 --egress=p2 PP1</div><div><br></div><div>neutron port-pair-create --ingress=p3 --egress=p4 PP2</div><div><br></div><div>cat create_port_group.sh</div><div>#!/usr/bin/env bash</div><div><br></div><div>neutron port-pair-group-create --port-pair PP1 PG1</div><div>neutron port-pair-group-create --port-pair PP2 PG2</div><div><br></div><div>cat create_port_chain.sh</div><div>#!/bin/bash</div><div><br></div><div>neutron port-chain-create --port-pair-group PG1 --port-pair-group PG2 --flow-classifier FC1 PC1</div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div></div></div></div><div class="gmail_extra"><br><div class="gmail_quote">On 16 August 2016 at 16:06, Mohan Kumar <span dir="ltr"><<a href="mailto:nmohankumar1011@gmail.com" target="_blank">nmohankumar1011@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">Hi  Alioune,<br><div><br></div><div> Could you share neutron log as well ? also let us know your sfc code base., If possible shall we have quick chat on this in neutron IRC channel ?</div><div><br></div><div>Thanks.,</div><div>Mohankumar.N</div></div><div class="HOEnZb"><div class="h5"><div class="gmail_extra"><br><div class="gmail_quote">On Mon, Aug 15, 2016 at 5:09 PM, Alioune <span dir="ltr"><<a href="mailto:balioune3@gmail.com" target="_blank">balioune3@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div>Hi all,</div><div>I'm trying to launch Openstack SFC as explained in[1] by creating 2 SFs, 1 Web Server (DST) and the DHCP namespace as the SRC.</div><div>I've installed OVS (Open vSwitch) 2.3.90 with Linux kernel 3.13.0-62 and the neutron L2-agent runs correctly.</div><div>I followed the process by creating classifier, port pairs and port_group but I got a wrong message "delete_port_chain failed." when creating port_chain [2]</div><div>I tried to create the neutron ports with and without the option "--no-security-groups" then tcpdpump on SFs tap interfaces but the ICMP packets don't go through the SFs.</div><div><br></div><div>Can anyone advice to fix? that ? </div><div>What's your channel on IRC ?</div><div><br></div><div>Regards,</div><div><br></div><div><br></div><div>[1] <a href="https://wiki.openstack.org/wiki/Neutron/ServiceInsertionAndChaining" target="_blank">https://wiki.openstack.org/wik<wbr>i/Neutron/ServiceInsertionAndC<wbr>haining</a></div><div>[2]</div><div>vagrant@ubuntu:~/openstack_sfc<wbr>$ ./08-os_create_port_chain.sh</div><div>delete_port_chain failed.</div><div>vagrant@ubuntu:~/openstack_sfc<wbr>$ cat 08-os_create_port_chain.sh</div><div>#!/bin/bash</div><div><br></div><div>neutron port-chain-create --port-pair-group PG1 --port-pair-group PG2 --flow-classifier FC1 PC1</div><div><br></div><div>[3] Output OVS Flows</div><div><br></div><div>vagrant@ubuntu:~$ sudo ovs-ofctl dump-flows br-tun -O OpenFlow13</div><div>OFPST_FLOW reply (OF1.3) (xid=0x2):</div><div> cookie=0xbc2e9105125301dc, duration=9615.385s, table=0, n_packets=146, n_bytes=11534, priority=1,in_port=1 actions=resubmit(,2)</div><div> cookie=0xbc2e9105125301dc, duration=9615.382s, table=0, n_packets=0, n_bytes=0, priority=0 actions=drop</div><div> cookie=0xbc2e9105125301dc, duration=9615.382s, table=2, n_packets=5, n_bytes=490, priority=0,dl_dst=00:00:00:00:<wbr>00:00/01:00:00:00:00:00 actions=resubmit(,20)</div><div> cookie=0xbc2e9105125301dc, duration=9615.381s, table=2, n_packets=141, n_bytes=11044, priority=0,dl_dst=01:00:00:00:<wbr>00:00/01:00:00:00:00:00 actions=resubmit(,22)</div><div> cookie=0xbc2e9105125301dc, duration=9615.380s, table=3, n_packets=0, n_bytes=0, priority=0 actions=drop</div><div> cookie=0xbc2e9105125301dc, duration=9615.380s, table=4, n_packets=0, n_bytes=0, priority=0 actions=drop</div><div> cookie=0xbc2e9105125301dc, duration=8617.106s, table=4, n_packets=0, n_bytes=0, priority=1,tun_id=0x40e actions=push_vlan:0x8100,set_f<wbr>ield:4097->vlan_vid,resubmit(,<wbr>10)</div><div> cookie=0xbc2e9105125301dc, duration=9615.379s, table=6, n_packets=0, n_bytes=0, priority=0 actions=drop</div><div> cookie=0xbc2e9105125301dc, duration=9615.379s, table=10, n_packets=0, n_bytes=0, priority=1 actions=learn(table=20,hard_ti<wbr>meout=300,priority=1,cookie=0x<wbr>bc2e9105125301dc,NXM_OF_VLAN_<wbr>TCI[0..11],NXM_OF_ETH_DST[]=<wbr>NXM_OF_ETH_SRC[],load:0->NXM_<wbr>OF_VLAN_TCI[],load:NXM_NX_TUN_<wbr>ID[]->NXM_NX_TUN_ID[],output:<wbr>NXM_OF_IN_PORT[]),output:1</div><div> cookie=0xbc2e9105125301dc, duration=9615.378s, table=20, n_packets=5, n_bytes=490, priority=0 actions=resubmit(,22)</div><div> cookie=0xbc2e9105125301dc, duration=9615.342s, table=22, n_packets=146, n_bytes=11534, priority=0 actions=drop</div><div>vagrant@ubuntu:~$ sudo ovs-ofctl dump-flows br-int -O OpenFlow13</div><div>OFPST_FLOW reply (OF1.3) (xid=0x2):</div><div> cookie=0xbc2e9105125301dc, duration=6712.090s, table=0, n_packets=0, n_bytes=0, priority=10,icmp6,in_port=7,ic<wbr>mp_type=136 actions=resubmit(,24)</div><div> cookie=0xbc2e9105125301dc, duration=6709.623s, table=0, n_packets=0, n_bytes=0, priority=10,icmp6,in_port=8,ic<wbr>mp_type=136 actions=resubmit(,24)</div><div> cookie=0xbc2e9105125301dc, duration=6555.755s, table=0, n_packets=0, n_bytes=0, priority=10,icmp6,in_port=10,i<wbr>cmp_type=136 actions=resubmit(,24)</div><div> cookie=0xbc2e9105125301dc, duration=6559.596s, table=0, n_packets=0, n_bytes=0, priority=10,icmp6,in_port=9,ic<wbr>mp_type=136 actions=resubmit(,24)</div><div> cookie=0xbc2e9105125301dc, duration=6461.028s, table=0, n_packets=0, n_bytes=0, priority=10,icmp6,in_port=11,i<wbr>cmp_type=136 actions=resubmit(,24)</div><div> cookie=0xbc2e9105125301dc, duration=6712.071s, table=0, n_packets=13, n_bytes=546, priority=10,arp,in_port=7 actions=resubmit(,24)</div><div> cookie=0xbc2e9105125301dc, duration=6709.602s, table=0, n_packets=0, n_bytes=0, priority=10,arp,in_port=8 actions=resubmit(,24)</div><div> cookie=0xbc2e9105125301dc, duration=6555.727s, table=0, n_packets=0, n_bytes=0, priority=10,arp,in_port=10 actions=resubmit(,24)</div><div> cookie=0xbc2e9105125301dc, duration=6559.574s, table=0, n_packets=12, n_bytes=504, priority=10,arp,in_port=9 actions=resubmit(,24)</div><div> cookie=0xbc2e9105125301dc, duration=6461.005s, table=0, n_packets=15, n_bytes=630, priority=10,arp,in_port=11 actions=resubmit(,24)</div><div> cookie=0xbc2e9105125301dc, duration=9620.388s, table=0, n_packets=514, n_bytes=49656, priority=0 actions=NORMAL</div><div> cookie=0xbc2e9105125301dc, duration=9619.277s, table=0, n_packets=0, n_bytes=0, priority=20,mpls actions=resubmit(,10)</div><div> cookie=0xbc2e9105125301dc, duration=6712.111s, table=0, n_packets=25, n_bytes=2674, priority=9,in_port=7 actions=resubmit(,25)</div><div> cookie=0xbc2e9105125301dc, duration=6559.621s, table=0, n_packets=24, n_bytes=2576, priority=9,in_port=9 actions=resubmit(,25)</div><div> cookie=0xbc2e9105125301dc, duration=6555.777s, table=0, n_packets=2, n_bytes=140, priority=9,in_port=10 actions=resubmit(,25)</div><div> cookie=0xbc2e9105125301dc, duration=6461.082s, table=0, n_packets=47, n_bytes=4830, priority=9,in_port=11 actions=resubmit(,25)</div><div> cookie=0xbc2e9105125301dc, duration=6709.646s, table=0, n_packets=3, n_bytes=230, priority=9,in_port=8 actions=resubmit(,25)</div><div> cookie=0xbc2e9105125301dc, duration=9619.265s, table=10, n_packets=0, n_bytes=0, priority=0 actions=drop</div><div> cookie=0xbc2e9105125301dc, duration=9620.378s, table=23, n_packets=0, n_bytes=0, priority=0 actions=drop</div><div> cookie=0xbc2e9105125301dc, duration=9620.368s, table=24, n_packets=0, n_bytes=0, priority=0 actions=drop</div><div> cookie=0xbc2e9105125301dc, duration=6709.633s, table=24, n_packets=0, n_bytes=0, priority=2,icmp6,in_port=8,icm<wbr>p_type=136,nd_target=fe80::f81<wbr>6:3eff:fe2a:fe actions=NORMAL</div><div> cookie=0xbc2e9105125301dc, duration=6712.101s, table=24, n_packets=0, n_bytes=0, priority=2,icmp6,in_port=7,icm<wbr>p_type=136,nd_target=fe80::f81<wbr>6:3eff:fee7:1362 actions=NORMAL</div><div> cookie=0xbc2e9105125301dc, duration=6559.607s, table=24, n_packets=0, n_bytes=0, priority=2,icmp6,in_port=9,icm<wbr>p_type=136,nd_target=fe80::f81<wbr>6:3eff:fe91:95ee actions=NORMAL</div><div> cookie=0xbc2e9105125301dc, duration=6555.766s, table=24, n_packets=0, n_bytes=0, priority=2,icmp6,in_port=10,ic<wbr>mp_type=136,nd_target=fe80::f8<wbr>16:3eff:fe76:d998 actions=NORMAL</div><div> cookie=0xbc2e9105125301dc, duration=6461.055s, table=24, n_packets=0, n_bytes=0, priority=2,icmp6,in_port=11,ic<wbr>mp_type=136,nd_target=fe80::f8<wbr>16:3eff:fe5e:ed96 actions=NORMAL</div><div> cookie=0xbc2e9105125301dc, duration=6709.611s, table=24, n_packets=0, n_bytes=0, priority=2,arp,in_port=8,arp_s<wbr>pa=55.55.55.12 actions=resubmit(,25)</div><div> cookie=0xbc2e9105125301dc, duration=6555.741s, table=24, n_packets=0, n_bytes=0, priority=2,arp,in_port=10,arp_<wbr>spa=55.55.55.14 actions=resubmit(,25)</div><div> cookie=0xbc2e9105125301dc, duration=6712.080s, table=24, n_packets=13, n_bytes=546, priority=2,arp,in_port=7,arp_s<wbr>pa=55.55.55.11 actions=resubmit(,25)</div><div> cookie=0xbc2e9105125301dc, duration=6559.584s, table=24, n_packets=12, n_bytes=504, priority=2,arp,in_port=9,arp_s<wbr>pa=55.55.55.13 actions=resubmit(,25)</div><div> cookie=0xbc2e9105125301dc, duration=6461.015s, table=24, n_packets=15, n_bytes=630, priority=2,arp,in_port=11,arp_<wbr>spa=55.55.55.15 actions=resubmit(,25)</div><div> cookie=0xbc2e9105125301dc, duration=6709.714s, table=25, n_packets=0, n_bytes=0, priority=2,in_port=8,dl_src=fa<wbr>:16:3e:2a:00:fe actions=NORMAL</div><div> cookie=0xbc2e9105125301dc, duration=6559.641s, table=25, n_packets=34, n_bytes=2940, priority=2,in_port=9,dl_src=fa<wbr>:16:3e:91:95:ee actions=NORMAL</div><div> cookie=0xbc2e9105125301dc, duration=6461.117s, table=25, n_packets=60, n_bytes=5320, priority=2,in_port=11,dl_src=f<wbr>a:16:3e:5e:ed:96 actions=NORMAL</div><div> cookie=0xbc2e9105125301dc, duration=6712.130s, table=25, n_packets=36, n_bytes=3080, priority=2,in_port=7,dl_src=fa<wbr>:16:3e:e7:13:62 actions=NORMAL</div><div> cookie=0xbc2e9105125301dc, duration=6555.801s, table=25, n_packets=0, n_bytes=0, priority=2,in_port=10,dl_src=f<wbr>a:16:3e:76:d9:98 actions=NORMAL</div><div><br></div></div>
</blockquote></div><br></div>
</div></div></blockquote></div><br></div>