[Openstack] compute node not sending traffic to br-tun ( patch-tun out , but no patch-int in )
b t
905ben at gmail.com
Mon Sep 29 19:39:21 UTC 2014
patch-int input counter inceases , but no tcpdump traffic showing . any
idea ?
On Mon, Sep 29, 2014 at 1:44 PM, b t <905ben at gmail.com> wrote:
> please provide your sight .
> I am following openstack icehouse ubuntu installation guide .
> I am able to launch install and be able to console in as well .
> no IP address in the vm .
> used udhcpc -T 1 -A 1 to request ip address from dhcp server .
> dhcp server is running on network node .
>
> using traffic mirroring and I see traffic going out br-int patch-tun
> interface .
> when I try to mirror traffic on br-tun patch-int , I don't see any traffic
> coming in .
> and also no traffic going out compute node physical interface .
>
> detail here with first section to mirror patch-tun , next is patch-int ,
> eth2 .
>
> any idea ? thanks !
>
>
> section 1 , able to capture patch-tun traffic .
>
> root at compute1:/var/log/neutron# ovs-vsctl show
> 19ac2f2b-d444-42d4-8883-820c43c83d66
> Bridge br-int
> fail_mode: secure
> Port "qvo07e7d71e-8f"
> tag: 1
> Interface "qvo07e7d71e-8f"
> Port "qvo529a82b4-5d"
> tag: 1
> Interface "qvo529a82b4-5d"
> Port patch-tun
> Interface patch-tun
> type: patch
> options: {peer=patch-int}
> Port br-int
> Interface br-int
> type: internal
> Bridge br-tun
> Port "gre-c0a80251"
> Interface "gre-c0a80251"
> type: gre
> options: {in_key=flow, local_ip="192.168.1.79",
> out_key=flow, remote_ip="192.168.2.81"}
> Port br-tun
> Interface br-tun
> type: internal
> Port "gre-c0a80151"
> Interface "gre-c0a80151"
> type: gre
> options: {in_key=flow, local_ip="192.168.1.79",
> out_key=flow, remote_ip="192.168.1.81"}
> Port "gre-c0a8024f"
> Interface "gre-c0a8024f"
> type: gre
> options: {in_key=flow, local_ip="192.168.1.79",
> out_key=flow, remote_ip="192.168.2.79"}
> Port patch-int
> Interface patch-int
> type: patch
> options: {peer=patch-tun}
> ovs_version: "2.0.2"
> root at compute1:/var/log/neutron# ovs-vsctl add-port br-int snooper0
> root at compute1:/var/log/neutron#
> root at compute1:/var/log/neutron# ovs-vsctl -- set Bridge br-int mirrors=@m
> -- --id=@snooper0 get Port snooper0 -- --id=@patch-tun get Port patch-tun
> -- --id=@m create Mirror name=mymirror select-dst-port=@patch-tun
> select-src-port=@patch-tun output-port=@snooper0
> 66164b82-3cd1-4afd-a8c9-c0c7798f4fb5
> root at compute1:/var/log/neutron#
> root at compute1:/var/log/neutron# ovs-vsctl show
> 19ac2f2b-d444-42d4-8883-820c43c83d66
> Bridge br-int
> fail_mode: secure
> Port "snooper0"
> Interface "snooper0"
> Port "qvo07e7d71e-8f"
> tag: 1
> Interface "qvo07e7d71e-8f"
> Port "qvo529a82b4-5d"
> tag: 1
> Interface "qvo529a82b4-5d"
> Port patch-tun
> Interface patch-tun
> type: patch
> options: {peer=patch-int}
> Port br-int
> Interface br-int
> type: internal
> Bridge br-tun
> Port "gre-c0a80251"
> Interface "gre-c0a80251"
> type: gre
> options: {in_key=flow, local_ip="192.168.1.79",
> out_key=flow, remote_ip="192.168.2.81"}
> Port br-tun
> Interface br-tun
> type: internal
> Port "gre-c0a80151"
> Interface "gre-c0a80151"
> type: gre
> options: {in_key=flow, local_ip="192.168.1.79",
> out_key=flow, remote_ip="192.168.1.81"}
> Port "gre-c0a8024f"
> Interface "gre-c0a8024f"
> type: gre
> options: {in_key=flow, local_ip="192.168.1.79",
> out_key=flow, remote_ip="192.168.2.79"}
> Port patch-int
> Interface patch-int
> type: patch
> options: {peer=patch-tun}
> ovs_version: "2.0.2"
> root at compute1:/var/log/neutron# tcpdump -e -n -i snooper0
> tcpdump: WARNING: snooper0: no IPv4 address assigned
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on snooper0, link-type EN10MB (Ethernet), capture size 65535
> bytes
> 13:40:34.413689 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
> (0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
> 255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
> 13:40:35.422036 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
> (0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
> 255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
> 13:40:36.429280 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
> (0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
> 255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
> 13:40:38.617090 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
> (0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
> 255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
> 13:40:39.622401 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
> (0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
> 255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
> 13:40:40.624290 fa:16:3e:1d:fe:22 > ff:ff:ff:ff:ff:ff, ethertype 802.1Q
> (0x8100), length 326: vlan 1, p 0, ethertype IPv4, 0.0.0.0.68 >
> 255.255.255.255.67: BOOTP/DHCP, Request from fa:16:3e:1d:fe:22, length 280
> ^C
> 6 packets captured
> 6 packets received by filter
> 0 packets dropped by kernel
> root at compute1:/var/log/neutron#
>
>
>
>
>
> section 2 , not able to capture patch-int traffic .
>
>
>
> root at compute1:/var/log/neutron#
> root at compute1:/var/log/neutron#
> root at compute1:/var/log/neutron#
> root at compute1:/var/log/neutron#
> root at compute1:/var/log/neutron# ovs-vsctl clear Bridge br-int mirrors
> root at compute1:/var/log/neutron# ovs-vsctl del-port br-int snooper0
> root at compute1:/var/log/neutron# ovs-vsctl add-port br-tun snooper0
> root at compute1:/var/log/neutron#
> root at compute1:/var/log/neutron# ovs-vsctl show
> 19ac2f2b-d444-42d4-8883-820c43c83d66
> Bridge br-int
> fail_mode: secure
> Port "qvo07e7d71e-8f"
> tag: 1
> Interface "qvo07e7d71e-8f"
> Port "qvo529a82b4-5d"
> tag: 1
> Interface "qvo529a82b4-5d"
> Port patch-tun
> Interface patch-tun
> type: patch
> options: {peer=patch-int}
> Port br-int
> Interface br-int
> type: internal
> Bridge br-tun
> Port "snooper0"
> Interface "snooper0"
> Port "gre-c0a80251"
> Interface "gre-c0a80251"
> type: gre
> options: {in_key=flow, local_ip="192.168.1.79",
> out_key=flow, remote_ip="192.168.2.81"}
> Port br-tun
> Interface br-tun
> type: internal
> Port "gre-c0a80151"
> Interface "gre-c0a80151"
> type: gre
> options: {in_key=flow, local_ip="192.168.1.79",
> out_key=flow, remote_ip="192.168.1.81"}
> Port "gre-c0a8024f"
> Interface "gre-c0a8024f"
> type: gre
> options: {in_key=flow, local_ip="192.168.1.79",
> out_key=flow, remote_ip="192.168.2.79"}
> Port patch-int
> Interface patch-int
> type: patch
> options: {peer=patch-tun}
> ovs_version: "2.0.2"
> root at compute1:/var/log/neutron#
>
> root at compute1:/var/log/neutron# ovs-vsctl -- set Bridge br-tun mirrors=@m
> -- --id=@snooper0 get Port snooper0 -- --id=@patch-int get Port patch-int
> -- --id=@m create Mirror name=mymirror select-dst-port=@patch-int
> select-src-port=@patch-int output-port=@snooper0
> f38e22e4-c95e-4f06-810a-f63e6d28e7c9
>
> *is the above command correct ?*
>
> root at compute1:/var/log/neutron#
> root at compute1:/var/log/neutron#
> root at compute1:/var/log/neutron#
> root at compute1:/var/log/neutron# tcpdump -e -n -i snooper0
> tcpdump: WARNING: snooper0: no IPv4 address assigned
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on snooper0, link-type EN10MB (Ethernet), capture size 65535
> bytes
>
>
>
> ^[[A^C
> 0 packets captured
> 0 packets received by filter
> 0 packets dropped by kernel
> root at compute1:/var/log/neutron# tcpdump -e -n -i eth1
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
> ^C
> 0 packets captured
> 0 packets received by filter
> 0 packets dropped by kernel
>
>
>
> thanks !
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openstack.org/pipermail/openstack/attachments/20140929/70afbfb7/attachment.html>
More information about the Openstack
mailing list