After sending my last reply I realized I might not have thought it out
thoroughly. I guess I could define the real subnets with the IP allocation
pool limited to the IP's I would like assigned to IRB interfaces; then also
add a fake subnet. When adding physical ports to the VN I could then
specify to put it in the fake subnet.  Is this what you were thinking?

I guess this would work though it seems like a hack as I now need to
assign, track, and configure subnets that I don't really need and Contrail
now needs to track state of all these port attributes that aren't really
needed.

-Dan

On Wed, Oct 21, 2015 at 6:12 PM, Dan Houtz <[email protected]> wrote:

> I believe I still need to specify the proper subnets for the VN so that my
> IRB's are configured properly on MX gateways. It seems like maybe we'll
> require additional functionality to completely disable IPAM, aside from
> configuring gateways?
>
> -Dan
>
>
> On Wed, Oct 21, 2015 at 6:05 PM, Harshad Nakil <[email protected]> wrote:
>
>> If you are managing all IPAM outside of contrail and you are only using
>> L2 from contrail, then you can have fake subnets in the VN.
>>
>> Regards
>> -Harshad
>>
>>
>> On Oct 21, 2015, at 3:45 PM, Dan Houtz <[email protected]> wrote:
>>
>> Nischal,
>>
>> Related to the above discussion, is it possible to have Contrail NOT
>> allocate IP addresses for each TOR port I add to a VN? I noticed this when
>> creating an allocation pool of 3 IP addresses, enough for TSN and 2
>> gateways. Because I added the physical device interfaces to the VN first,
>> the IP's were no longer available in the IP pool to assign to the MX's when
>> I later extended the networks.
>>
>> -Dan
>>
>> On Tue, Oct 20, 2015 at 2:50 PM, Dan Houtz <[email protected]> wrote:
>>
>>> Sure, here is an example with IPs sanitized:
>>>
>>> {
>>>     "virtual-network": {
>>>         "display_name": "DefaultPublic",
>>>         "floating_ip_pools": [
>>>             {
>>>                 "href": "
>>> http://10.10.10.4:8082/floating-ip-pool/220e690a-58e3-48f9-8986-cb111964c55a
>>> ",
>>>                 "to": [
>>>                     "default-domain",
>>>                     "admin",
>>>                     "DefaultPublic",
>>>                     "default"
>>>                 ],
>>>                 "uuid": "220e690a-58e3-48f9-8986-cb111964c55a"
>>>             }
>>>         ],
>>>         "flood_unknown_unicast": true,
>>>         "fq_name": [
>>>             "default-domain",
>>>             "admin",
>>>             "DefaultPublic"
>>>         ],
>>>         "href": "
>>> http://10.10.10.4:8082/virtual-network/6fb241e1-80e9-4097-b1d6-ad736e1ad8dc
>>> ",
>>>         "id_perms": {
>>>             "created": "2015-10-14T21:52:48.697076",
>>>             "creator": null,
>>>             "description": null,
>>>             "enable": true,
>>>             "last_modified": "2015-10-17T01:53:28.523888",
>>>             "permissions": {
>>>                 "group": "KeystoneAdmin",
>>>                 "group_access": 7,
>>>                 "other_access": 7,
>>>                 "owner": "admin",
>>>                 "owner_access": 7
>>>             },
>>>             "user_visible": true,
>>>             "uuid": {
>>>                 "uuid_lslong": 12814620501009422556,
>>>                 "uuid_mslong": 8048567920850714775
>>>             }
>>>         },
>>>         "is_shared": false,
>>>         "name": "DefaultPublic",
>>>                "network_ipam_refs": [
>>>             {
>>>                 "attr": {
>>>                     "ipam_subnets": [
>>>                         {
>>>                             "addr_from_start": true,
>>>                             "allocation_pools": [],
>>>                             "default_gateway": "10.10.10.225",
>>>                             "dhcp_option_list": {
>>>                                 "dhcp_option": [
>>>                                     {
>>>                                         "dhcp_option_name": "6",
>>>                                         "dhcp_option_value": "0.0.0.0"
>>>                                     }
>>>                                 ]
>>>                             },
>>>                             "dns_server_address": "10.10.10.226",
>>>                             "enable_dhcp": false,
>>>                             "host_routes": {
>>>                                 "route": []
>>>                             },
>>>                             "subnet": {
>>>                                 "ip_prefix": "10.10.10.224",
>>>                                 "ip_prefix_len": 28
>>>                             },
>>>                             "subnet_uuid":
>>> "83dab1c7-d7b2-4252-8dfa-53424cba75ca"
>>>                         }
>>>                     ]
>>>                 },
>>>                 "href": "
>>> http://10.10.10.4:8082/network-ipam/023d5322-daef-4323-986e-f45b4b2e6284
>>> ",
>>>                 "to": [
>>>                     "default-domain",
>>>                     "default-project",
>>>                     "default-network-ipam"
>>>                 ],
>>>                 "uuid": "023d5322-daef-4323-986e-f45b4b2e6284"
>>>             }
>>>         ],
>>>         "parent_href": "
>>> http://10.10.10.4:8082/project/c12b460d-4a4d-472e-b931-82d6e45bcde2";,
>>>         "parent_type": "project",
>>>         "parent_uuid": "c12b460d-4a4d-472e-b931-82d6e45bcde2",
>>>         "physical_router_back_refs": [
>>>             {
>>>                 "attr": null,
>>>                 "href": "
>>> http://10.10.10.4:8082/physical-router/7036a9e9-e4b5-42c5-8b7a-c54f3d9b7518
>>> ",
>>>                 "to": [
>>>                     "default-global-system-config",
>>>                     "gw1.ord6"
>>>                 ],
>>>                 "uuid": "7036a9e9-e4b5-42c5-8b7a-c54f3d9b7518"
>>>             }
>>>         ],
>>>         "route_target_list": {},
>>>         "router_external": true,
>>>         "routing_instances": [
>>>             {
>>>                 "href": "
>>> http://10.10.10.4:8082/routing-instance/62318c53-f534-433a-984a-f00f251adbbb
>>> ",
>>>                 "to": [
>>>                     "default-domain",
>>>                     "admin",
>>>                     "DefaultPublic",
>>>                     "DefaultPublic"
>>>                 ],
>>>                 "uuid": "62318c53-f534-433a-984a-f00f251adbbb"
>>>             }
>>>         ],
>>>         "uuid": "6fb241e1-80e9-4097-b1d6-ad736e1ad8dc",
>>>         "virtual_machine_interface_back_refs": [
>>>             {
>>>                 "attr": null,
>>>                 "href": "
>>> http://10.10.10.4:8082/virtual-machine-interface/89dda3c1-6ac9-433a-92db-71749b90b692
>>> ",
>>>                 "to": [
>>>                     "default-domain",
>>>                     "admin",
>>>                     "89dda3c1-6ac9-433a-92db-71749b90b692"
>>>                 ],
>>>                 "uuid": "89dda3c1-6ac9-433a-92db-71749b90b692"
>>>             }
>>>         ],
>>>         "virtual_network_network_id": 5,
>>>         "virtual_network_properties": {
>>>             "allow_transit": false,
>>>             "forwarding_mode": "l2_l3",
>>>             "vxlan_network_identifier": 10000
>>>         }
>>>     }
>>> }
>>>
>>>
>>>
>>> On Tue, Oct 20, 2015 at 12:19 PM, Nischal Sheth <[email protected]>
>>> wrote:
>>>
>>>>
>>>> Hi Dan,
>>>>
>>>> Understand your requirement.
>>>> Can you share the configuration you're using for these VNs?
>>>>
>>>> -Nischal
>>>>
>>>> On Oct 18, 2015, at 12:59 PM, Dan Houtz <[email protected]> wrote:
>>>>
>>>> Hi Nischal,
>>>>
>>>> I can not ping the TSN but I can confirm that I see ARP for it.
>>>>
>>>> I don't see any reason why the TSN should have an IP address assigned
>>>> if we're not using DNS or DHCP functionality. I understand that this isn't
>>>> much of an issue for those who are configuring private /24's on VNs but
>>>> even wasting 1 IP address is unacceptable when configuring a VN with a /29
>>>> or /28 of public address space.
>>>>
>>>> At the end of the day, we really just need Contrail to build us L2
>>>> networks between TOR ports and configure MX's to act as a gateway. We don't
>>>> expect or even want the TSN to do anything more then flood BUM traffic.
>>>>
>>>> I think 2.21 has brought us really close to meeting our initial use
>>>> cases so I want to thank everyone for their work on this.
>>>>
>>>> -Dan
>>>>
>>>>
>>>> On Sat, Oct 17, 2015 at 1:31 PM, Nischal Sheth <[email protected]>
>>>> wrote:
>>>>
>>>>>
>>>>> Hi Dan,
>>>>>
>>>>> Can you arp/ping the .2 address to check if the TSN responds to it?
>>>>>
>>>>> -Nischal
>>>>>
>>>>> Sent from my iPhone
>>>>>
>>>>> On Oct 17, 2015, at 10:45 AM, Dan Houtz <[email protected]> wrote:
>>>>>
>>>>> Hi Nischal,
>>>>>
>>>>> Thank you for the info. Is there anyway to override the ".2 for DNS"
>>>>> behavior or should I consider opening a feature request? When creating an
>>>>> external network with public IP's losing even 1 of these to an unused
>>>>> service is a bit tough to swallow considering the state of IP availability
>>>>> on the Internet. We're not currently planning to use any of the DNS or 
>>>>> DHCP
>>>>> functionality within Contrail; in fact I would like to operate without any
>>>>> concept of IPAM if at all possible :)
>>>>>
>>>>> -Dan
>>>>>
>>>>>
>>>>>
>>>>> On Sat, Oct 17, 2015 at 12:34 PM, Nischal Sheth <[email protected]>
>>>>> wrote:
>>>>>
>>>>>>
>>>>>> Hi Dan,
>>>>>>
>>>>>> The .2 address is set aside for use as DNS server at the TSN,
>>>>>> irrespective of whether DNS is enabled or not.
>>>>>>
>>>>>> I think you should be able to control assignment of the MX irb
>>>>>> addresses by creating an allocation pool. The pool could have the first 4
>>>>>> addresses in your case. The rest of the addresses in the subnet can be
>>>>>> owned by your DHCP server.
>>>>>>
>>>>>> -Nischal
>>>>>>
>>>>>> Sent from my iPhone
>>>>>>
>>>>>> On Oct 17, 2015, at 9:25 AM, Dan Houtz <[email protected]> wrote:
>>>>>>
>>>>>> Hi fellow Contrailers,
>>>>>>
>>>>>> The 2.21 release adds functionality to configure redundant MX
>>>>>> gateways using the virtual-gateway-address knob. Is anyone able to 
>>>>>> explain
>>>>>> the logic of the per router IP assignments? Are these able to be set in a
>>>>>> deterministic way or must we rely on Contrail to choose them at random 
>>>>>> from
>>>>>> the subnet?
>>>>>>
>>>>>> For example, I created a network using 10.10.10.0/24 with .1 as the
>>>>>> gateway. Contrail configured mx1 with and address of .3 and mx2 with an
>>>>>> address of .4.
>>>>>>
>>>>>> I don't quite understand why .2 is skipped. At least in our
>>>>>> environment where we'll probably only have 2 MX's for a VN, we would 
>>>>>> prefer
>>>>>> that the first 3 usable IP addresses in the subnet ALWAYS be used for 
>>>>>> each
>>>>>> router and the virtual gateway address.
>>>>>>
>>>>>> I'm also concerned about what happens if you remove a physical router
>>>>>> temporarily. In my case above, I removed mx1 and then re-added it to the
>>>>>> VN. When doing this, mx1 was then assigned a new IP address - this time 
>>>>>> .7.
>>>>>> So if seems like, over, time it will cycle through the entire IP block.
>>>>>> What happens if it chooses an IP that a host is already using?
>>>>>>
>>>>>> Again, I would much prefer if I could control this assignment so I
>>>>>> can make sure it gets the same IP address. Removing/Adding a physical
>>>>>> router to a VN might not be super common but I could see it happening for
>>>>>> testing, troubleshooting, and maintenance .
>>>>>>
>>>>>> Thanks!
>>>>>> Dan
>>>>>>
>>>>>> _______________________________________________
>>>>>> Dev mailing list
>>>>>> [email protected]
>>>>>>
>>>>>> http://lists.opencontrail.org/mailman/listinfo/dev_lists.opencontrail.org
>>>>>>
>>>>>>
>>>>>
>>>>
>>>>
>>>
>> _______________________________________________
>> Dev mailing list
>> [email protected]
>> http://lists.opencontrail.org/mailman/listinfo/dev_lists.opencontrail.org
>>
>>
>
_______________________________________________
Dev mailing list
[email protected]
http://lists.opencontrail.org/mailman/listinfo/dev_lists.opencontrail.org

Reply via email to