[Openstack] compute node not sending traffic to br-tun ( patch-tun out , but no patch-int in )

b t 905ben at gmail.com
Mon Sep 29 17:44:49 UTC 2014


please provide your sight .
I am following openstack icehouse ubuntu installation guide .
I am able to launch install and be able to console in as well .
no IP address in the vm .
used udhcpc -T 1 -A 1   to request ip address from dhcp server .
dhcp server is running on network node .

using traffic mirroring and I see traffic going out br-int patch-tun
interface .
when I try to mirror traffic on br-tun patch-int , I don't see any traffic
coming in .
and also no traffic going out compute node physical interface .

detail here with first section to mirror patch-tun , next is patch-int ,
eth2 .

any idea ?   thanks !


section 1  , able to capture patch-tun traffic .

root at compute1:/var/log/neutron# ovs-vsctl show
19ac2f2b-d444-42d4-8883-820c43c83d66
    Bridge br-int
        fail_mode: secure
        Port "qvo07e7d71e-8f"
            tag: 1
            Interface "qvo07e7d71e-8f"
        Port "qvo529a82b4-5d"
            tag: 1
            Interface "qvo529a82b4-5d"
        Port patch-tun
            Interface patch-tun
                type: patch
                options: {peer=patch-int}
        Port br-int
            Interface br-int
                type: internal
    Bridge br-tun
        Port "gre-c0a80251"
            Interface "gre-c0a80251"
                type: gre
                options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.2.81"}
        Port br-tun
            Interface br-tun
                type: internal
        Port "gre-c0a80151"
            Interface "gre-c0a80151"
                type: gre
                options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.1.81"}
        Port "gre-c0a8024f"
            Interface "gre-c0a8024f"
                type: gre
                options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.2.79"}
        Port patch-int
            Interface patch-int
                type: patch
                options: {peer=patch-tun}
    ovs_version: "2.0.2"
root at compute1:/var/log/neutron# ovs-vsctl add-port br-int snooper0
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron# ovs-vsctl -- set Bridge br-int mirrors=@m
-- --id=@snooper0 get Port snooper0 -- --id=@patch-tun get Port patch-tun
-- --id=@m create Mirror name=mymirror select-dst-port=@patch-tun
select-src-port=@patch-tun output-port=@snooper0
66164b82-3cd1-4afd-a8c9-c0c7798f4fb5
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron# ovs-vsctl show
19ac2f2b-d444-42d4-8883-820c43c83d66
    Bridge br-int
        fail_mode: secure
        Port "snooper0"
            Interface "snooper0"
        Port "qvo07e7d71e-8f"
            tag: 1
            Interface "qvo07e7d71e-8f"
        Port "qvo529a82b4-5d"
            tag: 1
            Interface "qvo529a82b4-5d"
        Port patch-tun
            Interface patch-tun
                type: patch
                options: {peer=patch-int}
        Port br-int
            Interface br-int
                type: internal
    Bridge br-tun
        Port "gre-c0a80251"
            Interface "gre-c0a80251"
                type: gre
                options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.2.81"}
        Port br-tun
            Interface br-tun
                type: internal
        Port "gre-c0a80151"
            Interface "gre-c0a80151"
                type: gre
                options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.1.81"}
        Port "gre-c0a8024f"
            Interface "gre-c0a8024f"
                type: gre
                options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.2.79"}
        Port patch-int
            Interface patch-int
                type: patch
                options: {peer=patch-tun}
    ovs_version: "2.0.2"
root at compute1:/var/log/neutron# tcpdump -e -n -i snooper0
tcpdump: WARNING: snooper0: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on snooper0, link-type EN10MB (Ethernet), capture size 65535 bytes
13:40:34.413689 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
(0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
13:40:35.422036 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
(0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
13:40:36.429280 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
(0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
13:40:38.617090 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
(0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
13:40:39.622401 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
(0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
13:40:40.624290 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
(0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
^C
6 packets captured
6 packets received by filter
0 packets dropped by kernel
root at compute1:/var/log/neutron#





section 2  , not able to capture patch-int traffic .



root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron# ovs-vsctl clear Bridge br-int mirrors
root at compute1:/var/log/neutron# ovs-vsctl del-port br-int snooper0
root at compute1:/var/log/neutron# ovs-vsctl add-port br-tun snooper0
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron# ovs-vsctl show
19ac2f2b-d444-42d4-8883-820c43c83d66
    Bridge br-int
        fail_mode: secure
        Port "qvo07e7d71e-8f"
            tag: 1
            Interface "qvo07e7d71e-8f"
        Port "qvo529a82b4-5d"
            tag: 1
            Interface "qvo529a82b4-5d"
        Port patch-tun
            Interface patch-tun
                type: patch
                options: {peer=patch-int}
        Port br-int
            Interface br-int
                type: internal
    Bridge br-tun
        Port "snooper0"
            Interface "snooper0"
        Port "gre-c0a80251"
            Interface "gre-c0a80251"
                type: gre
                options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.2.81"}
        Port br-tun
            Interface br-tun
                type: internal
        Port "gre-c0a80151"
            Interface "gre-c0a80151"
                type: gre
                options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.1.81"}
        Port "gre-c0a8024f"
            Interface "gre-c0a8024f"
                type: gre
                options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.2.79"}
        Port patch-int
            Interface patch-int
                type: patch
                options: {peer=patch-tun}
    ovs_version: "2.0.2"
root at compute1:/var/log/neutron#

root at compute1:/var/log/neutron# ovs-vsctl -- set Bridge br-tun mirrors=@m
-- --id=@snooper0 get Port snooper0 -- --id=@patch-int get Port patch-int
-- --id=@m create Mirror name=mymirror select-dst-port=@patch-int
select-src-port=@patch-int output-port=@snooper0
f38e22e4-c95e-4f06-810a-f63e6d28e7c9

*is the above command correct ?*

root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron# tcpdump -e -n -i snooper0
tcpdump: WARNING: snooper0: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on snooper0, link-type EN10MB (Ethernet), capture size 65535 bytes



^[[A^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
root at compute1:/var/log/neutron# tcpdump -e -n -i eth1
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel



thanks !
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openstack.org/pipermail/openstack/attachments/20140929/1c56ae34/attachment.html>


More information about the Openstack mailing list