[Openstack] Security Group of Quantum ovs plugin (Folsom) is not working

Chandler Li lichandler116 at gmail.com
Tue Jun 18 07:57:17 UTC 2013


Hello Ashok,

Thanks for your reply!

My libvirt_vif_driver parameter setting at compute node is
nova.virt.libvirt.vif.LibvirtHybridOVSBridgeDriver.

Thanks,
Chandler


2013/6/18 Ashok Kumaran <ashokkumaran.b at gmail.com>

> Hi Chandler,
>
> whats your libvirt_vif_driver set in nova-compute.conf?
>
>
> On Tue, Jun 18, 2013 at 1:08 PM, Chandler Li <lichandler116 at gmail.com>wrote:
>
>> Hi, Aaron,
>>
>> Sorry for my unclear explanation.
>>
>> I can ping or ssh into the VM with default security group even there are
>> no rules setting...
>>
>> Here is my security group information,
>>
>> [root at controller ~]# nova secgroup-list
>> +---------+-------------+
>> | Name    | Description |
>> +---------+-------------+
>> | default | default     |
>> +---------+-------------+
>> [root at controller ~]# nova secgroup-list-rules default
>>
>> [root at controller ~]#
>>
>>
>> After I created a VM with default security group, I checked the iptables
>> at compute node:
>>
>> [root at compute1 ~]# iptables -L -v -n
>> Chain INPUT (policy ACCEPT 26495 packets, 22M bytes)
>>  pkts bytes target     prot opt in     out     source
>> destination
>>   289  120K nova-compute-INPUT  all  --  *      *       0.0.0.0/0
>>      0.0.0.0/0
>>     0     0 ACCEPT     udp  --  virbr0 *       0.0.0.0/0
>> 0.0.0.0/0           udp dpt:53
>>      0     0 ACCEPT     tcp  --  virbr0 *       0.0.0.0/0
>> 0.0.0.0/0           tcp dpt:53
>>      0     0 ACCEPT     udp  --  virbr0 *       0.0.0.0/0
>> 0.0.0.0/0           udp dpt:67
>>      0     0 ACCEPT     tcp  --  virbr0 *       0.0.0.0/0
>> 0.0.0.0/0           tcp dpt:67
>>   1036 64284 ACCEPT     tcp  --  *      *       0.0.0.0/0
>> 0.0.0.0/0           tcp dpt:5900
>>
>> Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
>>  pkts bytes target     prot opt in     out     source
>> destination
>>     0     0 nova-filter-top  all  --  *      *       0.0.0.0/0
>>  0.0.0.0/0
>>      0     0 nova-compute-FORWARD  all  --  *      *       0.0.0.0/0
>>        0.0.0.0/0
>>     0     0 ACCEPT     all  --  *      virbr0  0.0.0.0/0
>> 192.168.122.0/24    state RELATED,ESTABLISHED
>>     0     0 ACCEPT     all  --  virbr0 *       192.168.122.0/24
>> 0.0.0.0/0
>>      0     0 ACCEPT     all  --  virbr0 virbr0  0.0.0.0/0
>> 0.0.0.0/0
>>     0     0 REJECT     all  --  *      virbr0  0.0.0.0/0
>> 0.0.0.0/0           reject-with icmp-port-unreachable
>>     0     0 REJECT     all  --  virbr0 *       0.0.0.0/0
>> 0.0.0.0/0           reject-with icmp-port-unreachable
>>
>> Chain OUTPUT (policy ACCEPT 30821 packets, 14M bytes)
>>  pkts bytes target     prot opt in     out     source
>> destination
>> 30218   14M nova-filter-top  all  --  *      *       0.0.0.0/0
>>  0.0.0.0/0
>>    261 80864 nova-compute-OUTPUT  all  --  *      *       0.0.0.0/0
>>        0.0.0.0/0
>>
>> Chain nova-compute-FORWARD (1 references)
>>  pkts bytes target     prot opt in     out     source
>> destination
>>
>> Chain nova-compute-INPUT (1 references)
>>  pkts bytes target     prot opt in     out     source
>> destination
>>
>> Chain nova-compute-OUTPUT (1 references)
>>  pkts bytes target     prot opt in     out     source
>> destination
>>
>> Chain nova-compute-inst-783 (1 references)
>>  pkts bytes target     prot opt in     out     source
>> destination
>>     0     0 DROP       all  --  *      *       0.0.0.0/0
>> 0.0.0.0/0           state INVALID
>>      0     0 ACCEPT     all  --  *      *       0.0.0.0/0
>> 0.0.0.0/0           state RELATED,ESTABLISHED
>>      0     0 nova-compute-provider  all  --  *      *       0.0.0.0/0
>>          0.0.0.0/0
>>      0     0 ACCEPT     udp  --  *      *       30.0.0.2
>> 0.0.0.0/0           udp spt:67 dpt:68
>>     0     0 ACCEPT     all  --  *      *       30.0.0.0/24
>> 0.0.0.0/0
>>     0     0 nova-compute-sg-fallback  all  --  *      *       0.0.0.0/0
>> 0.0.0.0/0
>>
>> Chain nova-compute-local (1 references)
>>  pkts bytes target     prot opt in     out     source
>> destination
>>     0     0 nova-compute-inst-783  all  --  *      *       0.0.0.0/0
>>        30.0.0.5
>>
>>  Chain nova-compute-provider (1 references)
>>  pkts bytes target     prot opt in     out     source
>> destination
>>
>> Chain nova-compute-sg-fallback (1 references)
>>  pkts bytes target     prot opt in     out     source
>> destination
>>     0     0 DROP       all  --  *      *       0.0.0.0/0
>> 0.0.0.0/0
>>
>> Chain nova-filter-top (2 references)
>>  pkts bytes target     prot opt in     out     source
>> destination
>>   261 80864 nova-compute-local  all  --  *      *       0.0.0.0/0
>>      0.0.0.0/0
>>
>>
>> If I add rules to security group default:
>>
>> [root at controller ~]# nova secgroup-list-rules default
>> +-------------+-----------+---------+-----------+--------------+
>> | IP Protocol | From Port | To Port | IP Range  | Source Group |
>> +-------------+-----------+---------+-----------+--------------+
>> | icmp        | -1        | -1      | 0.0.0.0/0 |              |
>> | tcp         | 22        | 22      | 0.0.0.0/0 |              |
>> +-------------+-----------+---------+-----------+--------------+
>>
>>
>> the Chain nova-compute-inst-783 will be :
>>
>> Chain nova-compute-inst-783 (1 references)
>>  pkts bytes target     prot opt in     out     source
>> destination
>>     0     0 DROP       all  --  *      *       0.0.0.0/0
>> 0.0.0.0/0           state INVALID
>>     0     0 ACCEPT     all  --  *      *       0.0.0.0/0
>> 0.0.0.0/0           state RELATED,ESTABLISHED
>>     0     0 nova-compute-provider  all  --  *      *       0.0.0.0/0
>>        0.0.0.0/0
>>     0     0 ACCEPT     udp  --  *      *       30.0.0.2
>> 0.0.0.0/0           udp spt:67 dpt:68
>>     0     0 ACCEPT     all  --  *      *       30.0.0.0/24
>> 0.0.0.0/0
>>    * 0     0* ACCEPT     tcp  --  *      *       0.0.0.0/0
>> 0.0.0.0/0           tcp dpt:22
>>     *0     0* ACCEPT     icmp --  *      *       0.0.0.0/0
>> 0.0.0.0/0
>>     0     0 nova-compute-sg-fallback  all  --  *      *       0.0.0.0/0
>> 0.0.0.0/0
>>
>>
>> The iptables chain rule can reflect the security group rules correctly
>> but there are no packets go through this iptables chain rule.
>>
>> Thanks,
>> Chandler
>>
>>
>>
>> 2013/6/18 Aaron Rosen <arosen at nicira.com>
>>
>>> Hi,
>>>
>>> I think it would also be helpful if you attached the output of:
>>>
>>>  nova secgroup-list
>>> then: nova secgroup-list-rules for each group so we could see what rules
>>> you have set in nova.
>>>
>>> Aaron
>>>
>>>
>>> On Mon, Jun 17, 2013 at 6:22 PM, Chandler Li <lichandler116 at gmail.com>wrote:
>>>
>>>> Hi Aaron,
>>>>
>>>> Thanks for your reply!
>>>>
>>>> Yes, I have set /etc/nova/nova.conf as follows, but it seems not
>>>> working.
>>>>
>>>> libvirt_vif_driver=nova.virt.libvirt.vif.LibvirtHybridOVSBridgeDriver
>>>> firewall_driver=nova.virt.libvirt.firewall.IptablesFirewallDriver
>>>> libvirt_use_virtio_for_bridges=True
>>>>
>>>> I can't figure out why network packets didn't follow the rules of
>>>> iptables created by nova.
>>>>
>>>> There are no traffic in FORWARD chain rule and nova-compute-local
>>>> chain rule as I posted before.
>>>>
>>>> Thanks again!
>>>>
>>>> Chandler
>>>>
>>>>
>>>>
>>>> 2013/6/18 Aaron Rosen <arosen at nicira.com>
>>>>
>>>>> Do you have:
>>>>>
>>>>>  firewall_driver=nova.virt.firewall.IptablesFirewallDriver
>>>>>
>>>>> in your nova.conf? In folsom, quantum leveraged nova security groups
>>>>> implementation directly so you need that.  (looks like you have that set
>>>>> though by your output).
>>>>>
>>>>> Aaron
>>>>>
>>>>>
>>>>>
>>>>> On Sun, Jun 16, 2013 at 7:38 PM, Chandler Li <lichandler116 at gmail.com>wrote:
>>>>>
>>>>>> Hi,
>>>>>> I checked the compute node's iptables rules and found out the
>>>>>> nova-compute-inst-xxx have no traffic flow.
>>>>>> The traffic flow stopped at nova-filter-top chain rule, so security
>>>>>> group is not working.
>>>>>> Any idea how to resolve this problem?
>>>>>>
>>>>>> Thanks,
>>>>>> Chandler
>>>>>>
>>>>>> [root at compute1 ~]# iptables -L -v -n
>>>>>> Chain INPUT (policy ACCEPT 714 packets, 335K bytes)
>>>>>>  pkts bytes target     prot opt in     out     source
>>>>>> destination
>>>>>>   369  117K nova-compute-INPUT  all  --  *      *       0.0.0.0/0
>>>>>>          0.0.0.0/0
>>>>>>     0     0 ACCEPT     udp  --  virbr0 *       0.0.0.0/0
>>>>>> 0.0.0.0/0           udp dpt:53
>>>>>>     0     0 ACCEPT     tcp  --  virbr0 *       0.0.0.0/0
>>>>>> 0.0.0.0/0           tcp dpt:53
>>>>>>     0     0 ACCEPT     udp  --  virbr0 *       0.0.0.0/0
>>>>>> 0.0.0.0/0           udp dpt:67
>>>>>>     0     0 ACCEPT     tcp  --  virbr0 *       0.0.0.0/0
>>>>>> 0.0.0.0/0           tcp dpt:67
>>>>>>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
>>>>>> 0.0.0.0/0           tcp dpt:5900
>>>>>>
>>>>>> Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
>>>>>>  pkts bytes target     prot opt in     out     source
>>>>>> destination
>>>>>>     0     0 nova-filter-top  all  --  *      *       0.0.0.0/0
>>>>>>      0.0.0.0/0
>>>>>>     0     0 nova-compute-FORWARD  all  --  *      *       0.0.0.0/0
>>>>>> 0.0.0.0/0
>>>>>>     0     0 ACCEPT     all  --  *      virbr0  0.0.0.0/0
>>>>>> 192.168.122.0/24    state RELATED,ESTABLISHED
>>>>>>     0     0 ACCEPT     all  --  virbr0 *       192.168.122.0/24
>>>>>> 0.0.0.0/0
>>>>>>     0     0 ACCEPT     all  --  virbr0 virbr0  0.0.0.0/0
>>>>>> 0.0.0.0/0
>>>>>>     0     0 REJECT     all  --  *      virbr0  0.0.0.0/0
>>>>>> 0.0.0.0/0           reject-with icmp-port-unreachable
>>>>>>     0     0 REJECT     all  --  virbr0 *       0.0.0.0/0
>>>>>> 0.0.0.0/0           reject-with icmp-port-unreachable
>>>>>>
>>>>>> Chain OUTPUT (policy ACCEPT 779 packets, 378K bytes)
>>>>>>  pkts bytes target     prot opt in     out     source
>>>>>> destination
>>>>>>   437  233K nova-filter-top  all  --  *      *       0.0.0.0/0
>>>>>>      0.0.0.0/0
>>>>>>   396  216K nova-compute-OUTPUT  all  --  *      *       0.0.0.0/0
>>>>>>          0.0.0.0/0
>>>>>>
>>>>>> Chain nova-compute-FORWARD (1 references)
>>>>>>  pkts bytes target     prot opt in     out     source
>>>>>> destination
>>>>>>
>>>>>> Chain nova-compute-INPUT (1 references)
>>>>>>  pkts bytes target     prot opt in     out     source
>>>>>> destination
>>>>>>
>>>>>> Chain nova-compute-OUTPUT (1 references)
>>>>>>  pkts bytes target     prot opt in     out     source
>>>>>> destination
>>>>>>
>>>>>> Chain nova-compute-inst-767 (1 references)
>>>>>>  pkts bytes target     prot opt in     out     source
>>>>>> destination
>>>>>>     0     0 DROP       all  --  *      *       0.0.0.0/0
>>>>>> 0.0.0.0/0           state INVALID
>>>>>>     0     0 ACCEPT     all  --  *      *       0.0.0.0/0
>>>>>> 0.0.0.0/0           state RELATED,ESTABLISHED
>>>>>>     0     0 nova-compute-provider  all  --  *      *       0.0.0.0/0
>>>>>> 0.0.0.0/0
>>>>>>     0     0 ACCEPT     udp  --  *      *       30.0.0.2
>>>>>> 0.0.0.0/0           udp spt:67 dpt:68
>>>>>>     0     0 ACCEPT     all  --  *      *       30.0.0.0/24
>>>>>> 0.0.0.0/0
>>>>>>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
>>>>>> 0.0.0.0/0           tcp dpt:22
>>>>>>     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
>>>>>> 0.0.0.0/0
>>>>>>     0     0 nova-compute-sg-fallback  all  --  *      *
>>>>>> 0.0.0.0/0            0.0.0.0/0
>>>>>>
>>>>>> Chain nova-compute-local (1 references)
>>>>>>  pkts bytes target     prot opt in     out     source
>>>>>> destination
>>>>>>     0     0 nova-compute-inst-767  all  --  *      *       0.0.0.0/0           30.0.0.5
>>>>>>
>>>>>> Chain nova-compute-provider (1 references)
>>>>>>  pkts bytes target     prot opt in     out     source
>>>>>> destination
>>>>>>
>>>>>> Chain nova-compute-sg-fallback (1 references)
>>>>>>  pkts bytes target     prot opt in     out     source
>>>>>> destination
>>>>>>     0     0 DROP       all  --  *      *       0.0.0.0/0
>>>>>> 0.0.0.0/0
>>>>>>
>>>>>> Chain nova-filter-top (2 references)
>>>>>>  pkts bytes target     prot opt in     out     source
>>>>>> destination
>>>>>>   396  216K nova-compute-local  all  --  *      *       0.0.0.0/0
>>>>>>          0.0.0.0/0
>>>>>>
>>>>>>
>>>>>>
>>>>>> 2013/6/14 Chandler Li <lichandler116 at gmail.com>
>>>>>>
>>>>>>> Hello,
>>>>>>>
>>>>>>> I'm trying to use security group of Quantum ovs plugin(Folsom) in
>>>>>>> CentOS 6.3 (2012.2.3-1.el6 at epel).
>>>>>>>
>>>>>>> Everything looks good, except security group,
>>>>>>>
>>>>>>> and there are no error message in /var/log/nova/compute.log file.
>>>>>>>
>>>>>>> After I created VM, I can see the bridges and interfaces have been
>>>>>>> created normally.
>>>>>>>
>>>>>>>      [root at compute1 ~]# brctl show
>>>>>>>      bridge name     bridge id               STP enabled
>>>>>>> interfaces
>>>>>>>      br-int          0000.3eca2e714b4d       no
>>>>>>>  qvo756ead5d-32
>>>>>>>      br-tun          0000.824651aab541       no
>>>>>>>      qbr756ead5d-32          0000.ca57ea41484c       no
>>>>>>>  qvb756ead5d-32
>>>>>>>                                                              vnet0
>>>>>>>
>>>>>>> The chain rules in filter table of iptables can reflect security
>>>>>>> group rules correctly too.
>>>>>>>
>>>>>>>      Chain nova-compute-inst-749 (1 references)
>>>>>>>      num  target     prot opt source               destination
>>>>>>>      1    DROP       all  --  0.0.0.0/0            0.0.0.0/0
>>>>>>>     state INVALID
>>>>>>>      2    ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
>>>>>>>     state RELATED,ESTABLISHED
>>>>>>>      3    nova-compute-provider  all  --  0.0.0.0/0
>>>>>>> 0.0.0.0/0
>>>>>>>      4    ACCEPT     udp  --  10.0.0.2             0.0.0.0/0
>>>>>>>     udp spt:67 dpt:68
>>>>>>>      5    ACCEPT     all  --  10.0.0.0/24          0.0.0.0/0
>>>>>>>      6    nova-compute-sg-fallback  all  --  0.0.0.0/0
>>>>>>> 0.0.0.0/0
>>>>>>>
>>>>>>> Obviously, the packets do not follow these rules correctly.
>>>>>>>
>>>>>>> Please advise me how to resolve this problem.
>>>>>>>
>>>>>>> Thanks a lot,
>>>>>>> Chandler
>>>>>>>
>>>>>>
>>>>>>
>>>>>> _______________________________________________
>>>>>> Mailing list: https://launchpad.net/~openstack
>>>>>> Post to     : openstack at lists.launchpad.net
>>>>>> Unsubscribe : https://launchpad.net/~openstack
>>>>>> More help   : https://help.launchpad.net/ListHelp
>>>>>>
>>>>>>
>>>>>
>>>>
>>>
>>
>> _______________________________________________
>> Mailing list: https://launchpad.net/~openstack
>> Post to     : openstack at lists.launchpad.net
>> Unsubscribe : https://launchpad.net/~openstack
>> More help   : https://help.launchpad.net/ListHelp
>>
>>
>
>
> --
> Regds,
>
> Ashok ,
> Delivery Consultant,
> HP.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openstack.org/pipermail/openstack/attachments/20130618/8f49315c/attachment.html>


More information about the Openstack mailing list