[Openstack] Need Help

Umar Draz unix.co at gmail.com
Tue Jan 8 20:16:42 UTC 2013


HI Stefano,

Thanks for your reply

I can ping all nodes from their local IP using any virtual machine.

1) I have ubuntu 12.10 on all compute nodes
2) I don't have any iptables on all compute nodes. Nova its self intall
iptables firewall

Please find attached file as per your instructions.

Best Regards,

Umar


On Wed, Jan 9, 2013 at 12:23 AM, Stefano Zanella
<zanella.stefano at gmail.com>wrote:

> Sorry for the delay, it was a busy day.
> I'm missing a step here: are you able to ping all 3 compute nodes from a
> VM inside one of them, or can you ping for each VM only the corresponding
> node?
> Can you now paste the output of:
> ip addr list on hypervisor and VM
> route -n on hypervisor and VM
> brctl show on hypervisor
> iptables -L -nv on hypervisor
> iptables -L -nv -t nat on hypervisor
> (I'm trying to avoid for now to track traffic with tcpdump, but it'll be
> next step if we cannot find the problem this way)
>
> Do you have a standard iptables or do you have some custom rules? Also,
> what OS are the hypervisors running on?
> Thanks,
>     Stefano
>
>
> On Tue, Jan 8, 2013 at 12:10 PM, Umar Draz <unix.co at gmail.com> wrote:
>
>> Hi Stefano,
>>
>> No Luck, Still same,
>>
>> I can ping all 3 compute nodes
>>
>> 192.168.1.133
>> 192.168.1.134
>> 192.168.1.135
>>
>> from any virtual machine, but I can not ping, 192.168.1.136 another linux
>> machine on local network.
>>
>> Best Regards,
>>
>> Umar
>>
>> On Tue, Jan 8, 2013 at 2:56 AM, Stefano Zanella <
>> zanella.stefano at gmail.com> wrote:
>>
>>> I think there's a mismatching here between configuration and intended
>>> behavior, I'm sorry not to have detected it before.
>>> With your configuration, you're bridging (Layer 2) two different
>>> networks (Layer3). They cannot communicate if not properly routed or
>>> masqueraded.
>>>
>>> Do you need to NAT VMs directly with public IPs? If not, I'd suggest you
>>> to change the configuration as follows:
>>> # NETWORK
>>> network_manager=nova.network.manager.FlatDHCPManager
>>> force_dhcp_release=True
>>> dhcpbridge_flagfile=/etc/nova/nova.conf
>>> my_ip=6x.1x.84.132
>>> public_interface=eth1
>>> flat_network_bridge=br100
>>> fixed_range=10.0.0.0/24
>>>
>>> This way, nova-network will setup NAT between 10.0.0.0/24 and
>>> 192.168.1.0/24 and you should be able to reach your LAN. Then, if you
>>> want to reach machines inside VMs private network, you could add a floating
>>> IP range and assign them to VMs.
>>> Hope this could solve the problem.
>>> Regards,
>>>     Stefano
>>>
>>>
>>> On Mon, Jan 7, 2013 at 9:14 PM, Umar Draz <unix.co at gmail.com> wrote:
>>>
>>>> I did this on compute
>>>> root at compute1:~# echo 0 > /proc/sys/net/ipv4/conf/default/rp_filter
>>>>
>>>> and the result from vm
>>>> root at vm:~# ping 192.168.1.134
>>>>
>>>> PING 192.168.1.134 (192.168.1.134) 56(84) bytes of data.
>>>> From 10.0.0.2 icmp_seq=1 Destination Host Unreachable
>>>> From 10.0.0.2 icmp_seq=2 Destination Host Unreachable
>>>> From 10.0.0.2 icmp_seq=3 Destination Host Unreachable
>>>> From 10.0.0.2 icmp_seq=4 Destination Host Unreachable
>>>> From 10.0.0.2 icmp_seq=5 Destination Host Unreachable
>>>> From 10.0.0.2 icmp_seq=6 Destination Host Unreachable
>>>> From 10.0.0.2 icmp_seq=7 Destination Host Unreachable
>>>> From 10.0.0.2 icmp_seq=8 Destination Host Unreachable
>>>> From 10.0.0.2 icmp_seq=9 Destination Host Unreachable
>>>> From 10.0.0.2 icmp_seq=10 Destination Host Unreachable
>>>> From 10.0.0.2 icmp_seq=11 Destination Host Unreachable
>>>> From 10.0.0.2 icmp_seq=12 Destination Host Unreachable
>>>> From 10.0.0.2 icmp_seq=13 Destination Host Unreachable
>>>> From 10.0.0.2 icmp_seq=14 Destination Host Unreachable
>>>> From 10.0.0.2 icmp_seq=15 Destination Host Unreachable
>>>> Best Regards,
>>>>
>>>> Umar
>>>>
>>>> On Tue, Jan 8, 2013 at 1:02 AM, Stefano Zanella <
>>>> zanella.stefano at gmail.com> wrote:
>>>>
>>>>> Can you try to set rp_filter to 0? I needed to disable it today,
>>>>> otherwise I was facing problem similar to yours.
>>>>> Try to ping with rp_filter disabled, let's see if we can resolve the
>>>>> problem that way.
>>>>> Regards,
>>>>>     Stefano
>>>>>
>>>>>
>>>>> On Mon, Jan 7, 2013 at 8:57 PM, Umar Draz <unix.co at gmail.com> wrote:
>>>>>
>>>>>> Hi
>>>>>>
>>>>>> Here is the result
>>>>>>
>>>>>> root at compute1:~# cat /proc/sys/net/ipv4/ip_forward
>>>>>> 1
>>>>>>
>>>>>> root at compute1:~# cat /proc/sys/net/ipv4/conf/default/rp_filter
>>>>>> 1
>>>>>>
>>>>>> root at compute1:~# nova secgroup-list-rules default
>>>>>> +-------------+-----------+---------+-----------+--------------+
>>>>>> | IP Protocol | From Port | To Port | IP Range  | Source Group |
>>>>>> +-------------+-----------+---------+-----------+--------------+
>>>>>> | icmp        | -1        | -1      | 0.0.0.0/0 |              |
>>>>>> | tcp         | 22        | 22      | 0.0.0.0/0 |              |
>>>>>> | tcp         | 80        | 80      | 0.0.0.0/0 |              |
>>>>>> | tcp         | 443       | 443     | 0.0.0.0/0 |              |
>>>>>> | tcp         | 16667     | 16667   | 0.0.0.0/0 |              |
>>>>>> +-------------+-----------+---------+-----------+--------------+
>>>>>>
>>>>>> Best Regards,
>>>>>>
>>>>>> Umar
>>>>>> On Tue, Jan 8, 2013 at 12:52 AM, Stefano Zanella <
>>>>>> zanella.stefano at gmail.com> wrote:
>>>>>>
>>>>>>> Routing and IP setup looks ok. What's the output of
>>>>>>>   cat /proc/sys/net/ipv4/ip_forward
>>>>>>> and
>>>>>>>   cat /proc/sys/net/ipv4/conf/default/rp_filter
>>>>>>>
>>>>>>> Also, did you setup security groups correctly? What's the output of
>>>>>>>   nova secgroup-list-rules default
>>>>>>>
>>>>>>> You should have setup at least a rule for allowing icmp traffic.
>>>>>>> Thanks,
>>>>>>>     Stefano
>>>>>>>
>>>>>>>
>>>>>>> On Mon, Jan 7, 2013 at 8:39 PM, Umar Draz <unix.co at gmail.com> wrote:
>>>>>>>
>>>>>>>> Hi
>>>>>>>>
>>>>>>>> Here is the result
>>>>>>>>
>>>>>>>> Compute node
>>>>>>>> ------------
>>>>>>>>
>>>>>>>> *brctl show*
>>>>>>>>
>>>>>>>> bridge name     bridge id               STP enabled     interfaces
>>>>>>>> br100           8000.002590976edb       no              eth1
>>>>>>>>                                                         vnet0
>>>>>>>> *ip addr list*
>>>>>>>>
>>>>>>>> 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
>>>>>>>>     link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
>>>>>>>>     inet 127.0.0.1/8 scope host lo
>>>>>>>>     inet 169.254.169.254/32 scope link lo
>>>>>>>>     inet6 ::1/128 scope host
>>>>>>>>        valid_lft forever preferred_lft forever
>>>>>>>> 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state
>>>>>>>> UP qlen 1000
>>>>>>>>     link/ether 00:25:90:97:6e:da brd ff:ff:ff:ff:ff:ff
>>>>>>>>     inet 69.155.84.133/25 brd 85.195.84.255 scope global eth0
>>>>>>>>     inet 69.155.84.142/32 scope global eth0
>>>>>>>>     inet6 fe80::225:90ff:fe97:6eda/64 scope link
>>>>>>>>        valid_lft forever preferred_lft forever
>>>>>>>> 3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq master
>>>>>>>> br100 state UP qlen 1000
>>>>>>>>     link/ether 00:25:90:97:6e:db brd ff:ff:ff:ff:ff:ff
>>>>>>>> 4: br100: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue
>>>>>>>> state UP
>>>>>>>>     link/ether 00:25:90:97:6e:db brd ff:ff:ff:ff:ff:ff
>>>>>>>>     inet 10.0.0.3/24 brd 10.0.0.255 scope global br100
>>>>>>>>     inet 192.168.1.133/24 brd 192.168.1.255 scope global br100
>>>>>>>>     inet6 fe80::225:90ff:fe97:6edb/64 scope link
>>>>>>>>        valid_lft forever preferred_lft forever
>>>>>>>> 9: vnet0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc
>>>>>>>> pfifo_fast master br100 state UNKNOWN qlen 500
>>>>>>>>     link/ether fe:16:3e:41:0c:2a brd ff:ff:ff:ff:ff:ff
>>>>>>>>     inet6 fe80::fc16:3eff:fe41:c2a/64 scope link
>>>>>>>>        valid_lft forever preferred_lft forever
>>>>>>>>
>>>>>>>> *route -n*
>>>>>>>>
>>>>>>>> Kernel IP routing table
>>>>>>>> Destination     Gateway         Genmask         Flags Metric Ref
>>>>>>>> Use Iface
>>>>>>>> 0.0.0.0         69.155.84.129   0.0.0.0         UG    0
>>>>>>>> 0        0 eth0
>>>>>>>> 10.0.0.0        0.0.0.0         255.255.255.0   U     0
>>>>>>>> 0        0 br100
>>>>>>>> 69.155.84.128   0.0.0.0         255.255.255.128 U     0
>>>>>>>> 0        0 eth1
>>>>>>>> 192.168.1.0     0.0.0.0         255.255.255.0   U     0
>>>>>>>> 0        0 br100
>>>>>>>>
>>>>>>>> *virtual machine
>>>>>>>> ----------------------
>>>>>>>> *
>>>>>>>> *ip addr list*
>>>>>>>>
>>>>>>>> 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
>>>>>>>>     link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
>>>>>>>>     inet 127.0.0.1/8 scope host lo
>>>>>>>>     inet6 ::1/128 scope host
>>>>>>>>        valid_lft forever preferred_lft forever
>>>>>>>> 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc
>>>>>>>> pfifo_fast state UP qlen 1000
>>>>>>>>     link/ether fa:16:3e:41:0c:2a brd ff:ff:ff:ff:ff:ff
>>>>>>>>     inet 10.0.0.2/24 brd 10.0.0.255 scope global eth0
>>>>>>>>     inet6 fe80::f816:3eff:fe41:c2a/64 scope link tentative dadfailed
>>>>>>>>        valid_lft forever preferred_lft forever
>>>>>>>>
>>>>>>>> *route -n*
>>>>>>>>
>>>>>>>> Kernel IP routing table
>>>>>>>> Destination     Gateway         Genmask         Flags Metric Ref
>>>>>>>> Use Iface
>>>>>>>> 0.0.0.0         10.0.0.3        0.0.0.0         UG    100
>>>>>>>> 0        0 eth0
>>>>>>>> 10.0.0.0        0.0.0.0         255.255.255.0   U     0
>>>>>>>> 0        0 eth0
>>>>>>>>
>>>>>>>> Best Regards,
>>>>>>>>
>>>>>>>> Umar
>>>>>>>>
>>>>>>>> On Tue, Jan 8, 2013 at 12:24 AM, Stefano Zanella <
>>>>>>>> zanella.stefano at gmail.com> wrote:
>>>>>>>>
>>>>>>>>> Can you please post the output of "ip addr list", "route -n" and
>>>>>>>>> "brctl show" on compute node and virtual machine? More than a firewall
>>>>>>>>> issue, it seems a routing issue to me.
>>>>>>>>> Thanks,
>>>>>>>>>     Stefano
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> On Mon, Jan 7, 2013 at 7:38 PM, Umar Draz <unix.co at gmail.com>wrote:
>>>>>>>>>
>>>>>>>>>> I think My network configuration is ok,
>>>>>>>>>>
>>>>>>>>>> I can ping compute's own ip address 192.168.1.133 from virtual
>>>>>>>>>> machine. But I can't access other local machines.
>>>>>>>>>>
>>>>>>>>>> I think its security firewall issue or need some routing table?
>>>>>>>>>>
>>>>>>>>>> Here is the out put of ping.
>>>>>>>>>>
>>>>>>>>>> root at ubuntu-cloud# ping 192.168.1.133
>>>>>>>>>> PING 192.168.1.133 (192.168.1.133) 56(84) bytes of data.
>>>>>>>>>> 64 bytes from 192.168.1.133: icmp_req=1 ttl=64 time=0.225 ms
>>>>>>>>>> 64 bytes from 192.168.1.133: icmp_req=2 ttl=64 time=0.360 ms
>>>>>>>>>> 64 bytes from 192.168.1.133: icmp_req=3 ttl=64 time=0.271 ms
>>>>>>>>>> root at ubuntu-cloud# ping 192.168.1.130
>>>>>>>>>> PING 192.168.1.130 (192.168.1.130) 56(84) bytes of data.
>>>>>>>>>> From 10.0.0.3: icmp_seq=2 Redirect Host(New nexthop:
>>>>>>>>>> 192.168.1.130)
>>>>>>>>>>
>>>>>>>>>> 10.0.0.3 is the gateway of virtual machine which is the ip of
>>>>>>>>>> compute's br100
>>>>>>>>>>
>>>>>>>>>> Best Regards,
>>>>>>>>>>
>>>>>>>>>> Umar
>>>>>>>>>>
>>>>>>>>>> On Mon, Jan 7, 2013 at 11:26 PM, Stefano Zanella <
>>>>>>>>>> zanella.stefano at gmail.com> wrote:
>>>>>>>>>>
>>>>>>>>>>> If you want to setup DHCP flat networking, maybe this page (and
>>>>>>>>>>> the chapter that contains it) could help:
>>>>>>>>>>>
>>>>>>>>>>> http://docs.openstack.org/essex/openstack-compute/admin/content/libvirt-flat-dhcp-networking.html
>>>>>>>>>>>
>>>>>>>>>>> Regards,
>>>>>>>>>>>     Stefano
>>>>>>>>>>>
>>>>>>>>>>> On Mon, Jan 7, 2013 at 7:03 PM, Umar Draz <unix.co at gmail.com>wrote:
>>>>>>>>>>>
>>>>>>>>>>>> my_ip=6x.1x.84.132
>>>>>>>>>>>> public_interface=eth0
>>>>>>>>>>>> flat_network_bridge=br100
>>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> --
>>>>>>>>>> Umar Draz
>>>>>>>>>> Network Architect
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> --
>>>>>>>> Umar Draz
>>>>>>>> Network Architect
>>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>
>>>>>>
>>>>>> --
>>>>>> Umar Draz
>>>>>> Network Architect
>>>>>>
>>>>>
>>>>>
>>>>
>>>>
>>>> --
>>>> Umar Draz
>>>> Network Architect
>>>>
>>>
>>>
>>
>>
>> --
>> Umar Draz
>> Network Architect
>>
>
>


-- 
Umar Draz
Network Architect
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openstack.org/pipermail/openstack/attachments/20130109/a05037ff/attachment.html>
-------------- next part --------------
compute node
----------------

ip addr list

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
    inet 169.254.169.254/32 scope link lo
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
    link/ether 00:25:90:97:6e:da brd ff:ff:ff:ff:ff:ff
    inet 65.135.84.133/25 brd 65.135.84.255 scope global eth0
    inet 65.135.84.142/32 scope global eth0
    inet6 fe80::225:90ff:fe97:6eda/64 scope link
       valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq master br100 state UP qlen 1000
    link/ether 00:25:90:97:6e:db brd ff:ff:ff:ff:ff:ff
4: br100: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP
    link/ether 00:25:90:97:6e:db brd ff:ff:ff:ff:ff:ff
    inet 10.0.0.3/24 brd 10.0.0.255 scope global br100
    inet 192.168.1.133/24 brd 192.168.1.255 scope global br100
    inet6 fe80::225:90ff:fe97:6edb/64 scope link
       valid_lft forever preferred_lft forever
6: vnet0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast master br100 state UNKNOWN qlen 500
    link/ether fe:16:3e:41:0c:2a brd ff:ff:ff:ff:ff:ff
    inet6 fe80::fc16:3eff:fe41:c2a/64 scope link
       valid_lft forever preferred_lft forever
12: vnet1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast master br100 state UNKNOWN qlen 500
    link/ether fe:16:3e:7b:40:c4 brd ff:ff:ff:ff:ff:ff
    inet6 fe80::fc16:3eff:fe7b:40c4/64 scope link
       valid_lft forever preferred_lft forever

--------------------------------------------------

route -n 
root at compute1:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         65.135.84.129   0.0.0.0         UG    0      0        0 eth0
10.0.0.0        0.0.0.0         255.255.255.0   U     0      0        0 br100
65.135.84.128   0.0.0.0         255.255.255.128 U     0      0        0 eth0
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br100

----------------------------------------------------------------------------------

root at compute1:~# iptables -L -nv
Chain INPUT (policy ACCEPT 339K packets, 400M bytes)
 pkts bytes target     prot opt in     out     source               destination
85378   52M nova-compute-INPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
85566   52M nova-network-INPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
84785   52M nova-api-metadat-INPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy ACCEPT 17 packets, 2208 bytes)
 pkts bytes target     prot opt in     out     source               destination
 233K   31M nova-filter-top  all  --  *      *       0.0.0.0/0            0.0.0.0/0
70786 6088K nova-compute-FORWARD  all  --  *      *       0.0.0.0/0            0.0.0.0/0
70822 6091K nova-network-FORWARD  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    5   434 nova-api-metadat-FORWARD  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT 365K packets, 84M bytes)
 pkts bytes target     prot opt in     out     source               destination
 368K   84M nova-filter-top  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 109K   39M nova-compute-OUTPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 109K   39M nova-network-OUTPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 109K   39M nova-api-metadat-OUTPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain nova-api-metadat-FORWARD (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain nova-api-metadat-INPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
  230 19360 ACCEPT     tcp  --  *      *       0.0.0.0/0            65.135.84.133        tcp dpt:8775

Chain nova-api-metadat-OUTPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain nova-api-metadat-local (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain nova-compute-FORWARD (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain nova-compute-INPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain nova-compute-OUTPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain nova-compute-inst-2 (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0            state INVALID
62148   11M ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
  104  8271 nova-compute-provider  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     udp  --  *      *       10.0.0.3             0.0.0.0/0            udp spt:67 dpt:68
    0     0 ACCEPT     all  --  *      *       10.0.0.0/24          0.0.0.0/0
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0
    2    96 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:22
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:80
    1    48 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:443
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:16667
  101  8127 nova-compute-sg-fallback  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain nova-compute-inst-9 (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0            state INVALID
 2206 1834K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
  134 11960 nova-compute-provider  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    2   690 ACCEPT     udp  --  *      *       10.0.0.3             0.0.0.0/0            udp spt:67 dpt:68
   13  1020 ACCEPT     all  --  *      *       10.0.0.0/24          0.0.0.0/0
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0
   13   732 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:22
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:80
    1    48 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:443
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:16667
  105  9470 nova-compute-sg-fallback  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain nova-compute-local (1 references)
 pkts bytes target     prot opt in     out     source               destination
62252   11M nova-compute-inst-2  all  --  *      *       0.0.0.0/0            10.0.0.2
 2340 1846K nova-compute-inst-9  all  --  *      *       0.0.0.0/0            10.0.0.8

Chain nova-compute-provider (2 references)
 pkts bytes target     prot opt in     out     source               destination

Chain nova-compute-sg-fallback (2 references)
 pkts bytes target     prot opt in     out     source               destination
  206 17597 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain nova-filter-top (2 references)
 pkts bytes target     prot opt in     out     source               destination
 244K   58M nova-compute-local  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 180K   45M nova-network-local  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 180K   45M nova-api-metadat-local  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain nova-network-FORWARD (1 references)
 pkts bytes target     prot opt in     out     source               destination
70822 6091K ACCEPT     all  --  br100  *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     all  --  *      br100   0.0.0.0/0            0.0.0.0/0

Chain nova-network-INPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
  819  270K ACCEPT     udp  --  br100  *       0.0.0.0/0            0.0.0.0/0            udp dpt:67
    0     0 ACCEPT     tcp  --  br100  *       0.0.0.0/0            0.0.0.0/0            tcp dpt:67
   50  3161 ACCEPT     udp  --  br100  *       0.0.0.0/0            0.0.0.0/0            udp dpt:53
    0     0 ACCEPT     tcp  --  br100  *       0.0.0.0/0            0.0.0.0/0            tcp dpt:53

Chain nova-network-OUTPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain nova-network-local (1 references)
 pkts bytes target     prot opt in     out     source               destination

--------------------------------------------------------------------------------------------------------------


root at compute1:~# iptables -L -nv -t nat
Chain PREROUTING (policy ACCEPT 16792 packets, 1271K bytes)
 pkts bytes target     prot opt in     out     source               destination
 9571  728K nova-compute-PREROUTING  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 9578  729K nova-network-PREROUTING  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 9429  718K nova-api-metadat-PREROUTING  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain INPUT (policy ACCEPT 2367 packets, 362K bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain OUTPUT (policy ACCEPT 2209 packets, 158K bytes)
 pkts bytes target     prot opt in     out     source               destination
  991 71421 nova-compute-OUTPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 1000 71997 nova-network-OUTPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 1004 72275 nova-api-metadat-OUTPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain POSTROUTING (policy ACCEPT 2606 packets, 212K bytes)
 pkts bytes target     prot opt in     out     source               destination
 8966  566K nova-compute-POSTROUTING  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 8979  567K nova-network-POSTROUTING  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 8971  566K nova-api-metadat-POSTROUTING  all  --  *      *       0.0.0.0/0            0.0.0.0/0
16156 1025K nova-postrouting-bottom  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain nova-api-metadat-OUTPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain nova-api-metadat-POSTROUTING (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain nova-api-metadat-PREROUTING (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain nova-api-metadat-float-snat (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain nova-api-metadat-snat (1 references)
 pkts bytes target     prot opt in     out     source               destination
 1210  101K nova-api-metadat-float-snat  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain nova-compute-OUTPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain nova-compute-POSTROUTING (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain nova-compute-PREROUTING (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain nova-compute-float-snat (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain nova-compute-snat (1 references)
 pkts bytes target     prot opt in     out     source               destination
 8954  565K nova-compute-float-snat  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain nova-network-OUTPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DNAT       all  --  *      *       0.0.0.0/0            65.135.84.142        to:10.0.0.2

Chain nova-network-POSTROUTING (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       10.0.0.0/24          65.135.84.133
   12  1101 ACCEPT     all  --  *      *       10.0.0.0/24          10.0.0.0/24          ! ctstate DNAT

Chain nova-network-PREROUTING (1 references)
 pkts bytes target     prot opt in     out     source               destination
   46  2760 DNAT       tcp  --  *      *       0.0.0.0/0            169.254.169.254      tcp dpt:80 to:65.135.84.133:8775
  104  8271 DNAT       all  --  *      *       0.0.0.0/0            65.135.84.142        to:10.0.0.2

Chain nova-network-float-snat (1 references)
 pkts bytes target     prot opt in     out     source               destination
 7757  465K SNAT       all  --  *      eth0    10.0.0.2             0.0.0.0/0            to:65.135.84.142

Chain nova-network-snat (1 references)
 pkts bytes target     prot opt in     out     source               destination
 8967  566K nova-network-float-snat  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    3   196 SNAT       all  --  *      eth0    10.0.0.0/24          0.0.0.0/0            to:65.135.84.133

Chain nova-postrouting-bottom (1 references)
 pkts bytes target     prot opt in     out     source               destination
 8954  565K nova-compute-snat  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 8967  566K nova-network-snat  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 1210  101K nova-api-metadat-snat  all  --  *      *       0.0.0.0/0            0.0.0.0/0

------------------------------------------------------------------------------------------------------------------

Virtual Machine

root at vm:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         10.0.0.3        0.0.0.0         UG    100    0        0 eth0
10.0.0.0        0.0.0.0         255.255.255.0   U     0      0        0 eth0

----------------------------------------------------------------------------------

root at vm:~# ip addr list
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
    link/ether fa:16:3e:41:0c:2a brd ff:ff:ff:ff:ff:ff
    inet 10.0.0.2/24 brd 10.0.0.255 scope global eth0
    inet6 fe80::f816:3eff:fe41:c2a/64 scope link tentative dadfailed
       valid_lft forever preferred_lft forever


More information about the Openstack mailing list