[Openstack] compute node not sending traffic to br-tun ( patch-tun out , but no patch-int in )
b t
905ben at gmail.com
Mon Sep 29 17:44:49 UTC 2014
please provide your sight .
I am following openstack icehouse ubuntu installation guide .
I am able to launch install and be able to console in as well .
no IP address in the vm .
used udhcpc -T 1 -A 1 to request ip address from dhcp server .
dhcp server is running on network node .
using traffic mirroring and I see traffic going out br-int patch-tun
interface .
when I try to mirror traffic on br-tun patch-int , I don't see any traffic
coming in .
and also no traffic going out compute node physical interface .
detail here with first section to mirror patch-tun , next is patch-int ,
eth2 .
any idea ? thanks !
section 1 , able to capture patch-tun traffic .
root at compute1:/var/log/neutron# ovs-vsctl show
19ac2f2b-d444-42d4-8883-820c43c83d66
Bridge br-int
fail_mode: secure
Port "qvo07e7d71e-8f"
tag: 1
Interface "qvo07e7d71e-8f"
Port "qvo529a82b4-5d"
tag: 1
Interface "qvo529a82b4-5d"
Port patch-tun
Interface patch-tun
type: patch
options: {peer=patch-int}
Port br-int
Interface br-int
type: internal
Bridge br-tun
Port "gre-c0a80251"
Interface "gre-c0a80251"
type: gre
options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.2.81"}
Port br-tun
Interface br-tun
type: internal
Port "gre-c0a80151"
Interface "gre-c0a80151"
type: gre
options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.1.81"}
Port "gre-c0a8024f"
Interface "gre-c0a8024f"
type: gre
options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.2.79"}
Port patch-int
Interface patch-int
type: patch
options: {peer=patch-tun}
ovs_version: "2.0.2"
root at compute1:/var/log/neutron# ovs-vsctl add-port br-int snooper0
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron# ovs-vsctl -- set Bridge br-int mirrors=@m
-- --id=@snooper0 get Port snooper0 -- --id=@patch-tun get Port patch-tun
-- --id=@m create Mirror name=mymirror select-dst-port=@patch-tun
select-src-port=@patch-tun output-port=@snooper0
66164b82-3cd1-4afd-a8c9-c0c7798f4fb5
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron# ovs-vsctl show
19ac2f2b-d444-42d4-8883-820c43c83d66
Bridge br-int
fail_mode: secure
Port "snooper0"
Interface "snooper0"
Port "qvo07e7d71e-8f"
tag: 1
Interface "qvo07e7d71e-8f"
Port "qvo529a82b4-5d"
tag: 1
Interface "qvo529a82b4-5d"
Port patch-tun
Interface patch-tun
type: patch
options: {peer=patch-int}
Port br-int
Interface br-int
type: internal
Bridge br-tun
Port "gre-c0a80251"
Interface "gre-c0a80251"
type: gre
options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.2.81"}
Port br-tun
Interface br-tun
type: internal
Port "gre-c0a80151"
Interface "gre-c0a80151"
type: gre
options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.1.81"}
Port "gre-c0a8024f"
Interface "gre-c0a8024f"
type: gre
options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.2.79"}
Port patch-int
Interface patch-int
type: patch
options: {peer=patch-tun}
ovs_version: "2.0.2"
root at compute1:/var/log/neutron# tcpdump -e -n -i snooper0
tcpdump: WARNING: snooper0: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on snooper0, link-type EN10MB (Ethernet), capture size 65535 bytes
13:40:34.413689 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
(0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
13:40:35.422036 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
(0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
13:40:36.429280 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
(0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
13:40:38.617090 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
(0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
13:40:39.622401 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
(0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
13:40:40.624290 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
(0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
^C
6 packets captured
6 packets received by filter
0 packets dropped by kernel
root at compute1:/var/log/neutron#
section 2 , not able to capture patch-int traffic .
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron# ovs-vsctl clear Bridge br-int mirrors
root at compute1:/var/log/neutron# ovs-vsctl del-port br-int snooper0
root at compute1:/var/log/neutron# ovs-vsctl add-port br-tun snooper0
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron# ovs-vsctl show
19ac2f2b-d444-42d4-8883-820c43c83d66
Bridge br-int
fail_mode: secure
Port "qvo07e7d71e-8f"
tag: 1
Interface "qvo07e7d71e-8f"
Port "qvo529a82b4-5d"
tag: 1
Interface "qvo529a82b4-5d"
Port patch-tun
Interface patch-tun
type: patch
options: {peer=patch-int}
Port br-int
Interface br-int
type: internal
Bridge br-tun
Port "snooper0"
Interface "snooper0"
Port "gre-c0a80251"
Interface "gre-c0a80251"
type: gre
options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.2.81"}
Port br-tun
Interface br-tun
type: internal
Port "gre-c0a80151"
Interface "gre-c0a80151"
type: gre
options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.1.81"}
Port "gre-c0a8024f"
Interface "gre-c0a8024f"
type: gre
options: {in_key=flow, local_ip="192.168.1.79",
out_key=flow, remote_ip="192.168.2.79"}
Port patch-int
Interface patch-int
type: patch
options: {peer=patch-tun}
ovs_version: "2.0.2"
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron# ovs-vsctl -- set Bridge br-tun mirrors=@m
-- --id=@snooper0 get Port snooper0 -- --id=@patch-int get Port patch-int
-- --id=@m create Mirror name=mymirror select-dst-port=@patch-int
select-src-port=@patch-int output-port=@snooper0
f38e22e4-c95e-4f06-810a-f63e6d28e7c9
*is the above command correct ?*
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron#
root at compute1:/var/log/neutron# tcpdump -e -n -i snooper0
tcpdump: WARNING: snooper0: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on snooper0, link-type EN10MB (Ethernet), capture size 65535 bytes
^[[A^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
root at compute1:/var/log/neutron# tcpdump -e -n -i eth1
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
thanks !
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openstack.org/pipermail/openstack/attachments/20140929/1c56ae34/attachment.html>
More information about the Openstack
mailing list