<div dir="ltr"><div>please provide your sight .</div><div>I am following openstack icehouse ubuntu installation guide .</div><div>I am able to launch install and be able to console in as well .</div><div>no IP address in the vm .</div><div>used udhcpc -T 1 -A 1   to request ip address from dhcp server .</div><div>dhcp server is running on network node .</div><div><br></div><div>using traffic mirroring and I see traffic going out br-int patch-tun interface .</div><div>when I try to mirror traffic on br-tun patch-int , I don't see any traffic coming in .</div><div>and also no traffic going out compute node physical interface .</div><div><br></div><div>detail here with first section to mirror patch-tun , next is patch-int , eth2 .</div><div><br></div><div>any idea ?   thanks !</div><div><br></div><div><br></div><div>section 1  , able to capture patch-tun traffic .</div><div><div><br></div><div>root@compute1:/var/log/neutron# ovs-vsctl show</div><div>19ac2f2b-d444-42d4-8883-820c43c83d66</div><div>    Bridge br-int</div><div>        fail_mode: secure</div><div>        Port "qvo07e7d71e-8f"</div><div>            tag: 1</div><div>            Interface "qvo07e7d71e-8f"</div><div>        Port "qvo529a82b4-5d"</div><div>            tag: 1</div><div>            Interface "qvo529a82b4-5d"</div><div>        Port patch-tun</div><div>            Interface patch-tun</div><div>                type: patch</div><div>                options: {peer=patch-int}</div><div>        Port br-int</div><div>            Interface br-int</div><div>                type: internal</div><div>    Bridge br-tun</div><div>        Port "gre-c0a80251"</div><div>            Interface "gre-c0a80251"</div><div>                type: gre</div><div>                options: {in_key=flow, local_ip="192.168.1.79", out_key=flow, remote_ip="192.168.2.81"}</div><div>        Port br-tun</div><div>            Interface br-tun</div><div>                type: internal</div><div>        Port "gre-c0a80151"</div><div>            Interface "gre-c0a80151"</div><div>                type: gre</div><div>                options: {in_key=flow, local_ip="192.168.1.79", out_key=flow, remote_ip="192.168.1.81"}</div><div>        Port "gre-c0a8024f"</div><div>            Interface "gre-c0a8024f"</div><div>                type: gre</div><div>                options: {in_key=flow, local_ip="192.168.1.79", out_key=flow, remote_ip="192.168.2.79"}</div><div>        Port patch-int</div><div>            Interface patch-int</div><div>                type: patch</div><div>                options: {peer=patch-tun}</div><div>    ovs_version: "2.0.2"</div><div>root@compute1:/var/log/neutron# ovs-vsctl add-port br-int snooper0</div><div>root@compute1:/var/log/neutron# </div><div>root@compute1:/var/log/neutron# ovs-vsctl -- set Bridge br-int mirrors=@m -- --id=@snooper0 get Port snooper0 -- --id=@patch-tun get Port patch-tun -- --id=@m create Mirror name=mymirror select-dst-port=@patch-tun select-src-port=@patch-tun output-port=@snooper0</div><div>66164b82-3cd1-4afd-a8c9-c0c7798f4fb5</div><div>root@compute1:/var/log/neutron# </div><div>root@compute1:/var/log/neutron# ovs-vsctl show</div><div>19ac2f2b-d444-42d4-8883-820c43c83d66</div><div>    Bridge br-int</div><div>        fail_mode: secure</div><div>        Port "snooper0"</div><div>            Interface "snooper0"</div><div>        Port "qvo07e7d71e-8f"</div><div>            tag: 1</div><div>            Interface "qvo07e7d71e-8f"</div><div>        Port "qvo529a82b4-5d"</div><div>            tag: 1</div><div>            Interface "qvo529a82b4-5d"</div><div>        Port patch-tun</div><div>            Interface patch-tun</div><div>                type: patch</div><div>                options: {peer=patch-int}</div><div>        Port br-int</div><div>            Interface br-int</div><div>                type: internal</div><div>    Bridge br-tun</div><div>        Port "gre-c0a80251"</div><div>            Interface "gre-c0a80251"</div><div>                type: gre</div><div>                options: {in_key=flow, local_ip="192.168.1.79", out_key=flow, remote_ip="192.168.2.81"}</div><div>        Port br-tun</div><div>            Interface br-tun</div><div>                type: internal</div><div>        Port "gre-c0a80151"</div><div>            Interface "gre-c0a80151"</div><div>                type: gre</div><div>                options: {in_key=flow, local_ip="192.168.1.79", out_key=flow, remote_ip="192.168.1.81"}</div><div>        Port "gre-c0a8024f"</div><div>            Interface "gre-c0a8024f"</div><div>                type: gre</div><div>                options: {in_key=flow, local_ip="192.168.1.79", out_key=flow, remote_ip="192.168.2.79"}</div><div>        Port patch-int</div><div>            Interface patch-int</div><div>                type: patch</div><div>                options: {peer=patch-tun}</div><div>    ovs_version: "2.0.2"</div><div>root@compute1:/var/log/neutron# tcpdump -e -n -i snooper0</div><div>tcpdump: WARNING: snooper0: no IPv4 address assigned</div><div>tcpdump: verbose output suppressed, use -v or -vv for full protocol decode</div><div>listening on snooper0, link-type EN10MB (Ethernet), capture size 65535 bytes</div><div>13:40:34.413689 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q (0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280</div><div>13:40:35.422036 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q (0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280</div><div>13:40:36.429280 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q (0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280</div><div>13:40:38.617090 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q (0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280</div><div>13:40:39.622401 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q (0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280</div><div>13:40:40.624290 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q (0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280</div><div>^C</div><div>6 packets captured</div><div>6 packets received by filter</div><div>0 packets dropped by kernel</div><div>root@compute1:/var/log/neutron# </div></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div>section 2  , not able to capture patch-int traffic .<br></div><div><br></div><div><br></div><div><div><br></div><div>root@compute1:/var/log/neutron# </div><div>root@compute1:/var/log/neutron# </div><div>root@compute1:/var/log/neutron# </div><div>root@compute1:/var/log/neutron# </div><div>root@compute1:/var/log/neutron# ovs-vsctl clear Bridge br-int mirrors</div><div>root@compute1:/var/log/neutron# ovs-vsctl del-port br-int snooper0</div><div>root@compute1:/var/log/neutron# ovs-vsctl add-port br-tun snooper0</div><div>root@compute1:/var/log/neutron# </div><div>root@compute1:/var/log/neutron# ovs-vsctl show</div><div>19ac2f2b-d444-42d4-8883-820c43c83d66</div><div>    Bridge br-int</div><div>        fail_mode: secure</div><div>        Port "qvo07e7d71e-8f"</div><div>            tag: 1</div><div>            Interface "qvo07e7d71e-8f"</div><div>        Port "qvo529a82b4-5d"</div><div>            tag: 1</div><div>            Interface "qvo529a82b4-5d"</div><div>        Port patch-tun</div><div>            Interface patch-tun</div><div>                type: patch</div><div>                options: {peer=patch-int}</div><div>        Port br-int</div><div>            Interface br-int</div><div>                type: internal</div><div>    Bridge br-tun</div><div>        Port "snooper0"</div><div>            Interface "snooper0"</div><div>        Port "gre-c0a80251"</div><div>            Interface "gre-c0a80251"</div><div>                type: gre</div><div>                options: {in_key=flow, local_ip="192.168.1.79", out_key=flow, remote_ip="192.168.2.81"}</div><div>        Port br-tun</div><div>            Interface br-tun</div><div>                type: internal</div><div>        Port "gre-c0a80151"</div><div>            Interface "gre-c0a80151"</div><div>                type: gre</div><div>                options: {in_key=flow, local_ip="192.168.1.79", out_key=flow, remote_ip="192.168.1.81"}</div><div>        Port "gre-c0a8024f"</div><div>            Interface "gre-c0a8024f"</div><div>                type: gre</div><div>                options: {in_key=flow, local_ip="192.168.1.79", out_key=flow, remote_ip="192.168.2.79"}</div><div>        Port patch-int</div><div>            Interface patch-int</div><div>                type: patch</div><div>                options: {peer=patch-tun}</div><div>    ovs_version: "2.0.2"</div><div>root@compute1:/var/log/neutron# </div><div><br></div><div>root@compute1:/var/log/neutron# ovs-vsctl -- set Bridge br-tun mirrors=@m -- --id=@snooper0 get Port snooper0 -- --id=@patch-int get Port patch-int -- --id=@m create Mirror name=mymirror select-dst-port=@patch-int select-src-port=@patch-int output-port=@snooper0</div><div>f38e22e4-c95e-4f06-810a-f63e6d28e7c9</div><div><br></div><div><b style="background-color:rgb(255,0,0)">is the above command correct ?</b></div><div><br></div><div>root@compute1:/var/log/neutron# </div><div>root@compute1:/var/log/neutron# </div><div>root@compute1:/var/log/neutron# </div><div>root@compute1:/var/log/neutron# tcpdump -e -n -i snooper0</div><div>tcpdump: WARNING: snooper0: no IPv4 address assigned</div><div>tcpdump: verbose output suppressed, use -v or -vv for full protocol decode</div><div>listening on snooper0, link-type EN10MB (Ethernet), capture size 65535 bytes</div></div><div><br></div><div><div><br></div><div><br></div><div>^[[A^C</div><div>0 packets captured</div><div>0 packets received by filter</div><div>0 packets dropped by kernel</div><div>root@compute1:/var/log/neutron# tcpdump -e -n -i eth1</div><div>tcpdump: verbose output suppressed, use -v or -vv for full protocol decode</div><div>listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes</div><div>^C</div><div>0 packets captured</div><div>0 packets received by filter</div><div>0 packets dropped by kernel</div></div><div><br></div><div><br></div><div><br></div><div>thanks !</div></div>