On 4/6/2019 2:32 AM, Ammu wrote:
Hey Greg,

Sincere apologies.

I can completely understand. Take care.

In the meantime, I will try my best to debug the issue.

Will update you if I could narrow it down.

Catch you in the next weekend's time.

Thank you :)

-
Keerthana

Thank you!  I'm back and getting caught up.

I'll be looking at this again tomorrow - I need to replicate your configuration in which you place a tunneling port and a network device in promiscuous mode on the same bridge. This is not usually what i see when looking at tunneling configurations and just seems odd to me so maybe there's something going on there.

I'll update after I've had a chance to look into it more.

- Greg


On Fri, Apr 5, 2019 at 4:20 AM Gregory Rose <[email protected] <mailto:[email protected]>> wrote:

    I'm out for a while due to a family matter and will not have a
    chance to look at this until next week.

    - Greg

    On 4/3/2019 5:41 AM, Ammu wrote:
    Hello,

    Do you have any update on this?

    -
    Keerthana

    On Mon, Apr 1, 2019 at 5:27 PM Ammu <[email protected]
    <mailto:[email protected]>> wrote:

        Hello Greg,

        Sorry for the late reply.

        I tried move the source interface to another bridge. But,
        after the configurations made, the expectation is not met.

        I facing few hurdles. The configuration in the attachment.

        Kindly help me with the configuration if I have missed something.

        And, I just have a question, why is it that the source
        interface should not be in the same bridge (according to my
        earlier configuration).
        Is there any limitation?

        -
        Keerthana

        On Fri, Mar 29, 2019 at 9:18 PM Gregory Rose
        <[email protected] <mailto:[email protected]>> wrote:


            On 3/27/2019 10:33 PM, Ammu wrote:
            Hi Greg,

            *ens256:*

              * Source interface which is intended to receive all
                traffic (the reason why promisc mode is ON)
              * Trying to tunnel all traffic that I receive in this
                interface


            *Output for* *ip addr show ens256:*
            *
            *
            4: ens256: <BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP> mtu
            1500 qdisc pfifo_fast state UP group default qlen 1000
                link/ether 00:50:56:95:ed:4f brd ff:ff:ff:ff:ff:ff
                inet6 fe80::26b9:a4a6:c518:8738/64 scope link
            noprefixroute
                   valid_lft forever preferred_lft forever


            Please move this interface to a different bridge and then
            retry.  If you check my configuration I do not have any
            other interface on the bridge where the tunnel is located.

            Thanks,

            - Greg


            -
            Keerthana

            On Wed, Mar 27, 2019 at 11:39 PM Gregory Rose
            <[email protected] <mailto:[email protected]>> wrote:



                On 3/27/2019 2:30 AM, Ammu wrote:
                Hello Greg,

                I still don't see any change to my previous results.

                I am attaching the results along with the
                configurations made.

                I have attached first few packets of the capture.

                Kindly let me know if I am missing something or I
                am obscure in my explanation.

                I'm curious - why do you do this in your configuration?

                ovs-vsctl add-port br0 ens256
                ip link set ens256 up
                ip link set ens256 promisc on

                Can you provide the output of 'ip addr show ens256'?
                And what is the source of that interface?

                Thanks,

                - Greg


                -
                Keerthana



                On Tue, Mar 26, 2019 at 12:24 PM Ammu
                <[email protected]
                <mailto:[email protected]>> wrote:

                    Hi Greg,

                    Thank you for the update!

                    Yeah, we are all in the same page.

                    Maybe I will update the OS version to 7.5 and
                    get back on the result at the earliest.

                    -
                    Keerthana

                    On Tue, Mar 26, 2019 at 2:34 AM Gregory Rose
                    <[email protected]
                    <mailto:[email protected]>> wrote:



                        On 3/25/2019 9:03 AM, Gregory Rose wrote:
                        >
                        > On 3/23/2019 2:28 AM, Ammu wrote:
                        >> Hey Greg,
                        >>
                        >> The recent check with OVS 2.10.1 version
                        was done with CentOS Linux
                        >> release 7.3.1611
                        >>
                        >> But, I will have to support the solution
                        with distributions
                        >> CentOS/Red Hat/Ubuntu.
                        >>
                        >> Currently giving you the output of
                        distribution CentOS alone.
                        >>
                        >> [root@localhost ~]# modinfo openvswitch
                        >> filename:
                        >>
                         
/lib/modules/3.10.0-514.el7.x86_64/kernel/net/openvswitch/openvswitch.ko
                        >> license:        GPL
                        >> description:    Open vSwitch switching
                        datapath
                        >> rhelversion:    7.3
                        >> srcversion:  B31AE95554C9D9A0067F935
                        >> depends:
                        >>
                        
nf_conntrack,nf_nat,libcrc32c,nf_nat_ipv6,nf_nat_ipv4,nf_defrag_ipv6
                        >> intree:         Y
                        >> vermagic:  3.10.0-514.el7.x86_64 SMP
                        mod_unload modversions
                        >> signer:  CentOS Linux kernel signing key
                        >> sig_key:
                        
D4:88:63:A7:C1:6F:CC:27:41:23:E6:29:8F:74:F0:57:AF:19:FC:54
                        >> sig_hashalgo:  sha256
                        >
                        > OK, I wanted to make sure that's the case
                        before I do the repro
                        > attempt today.  I'm using a 7.5 based
                        > driver but it should be substantially the
                        same.  I'll update in a bit
                        > after I try it out.
                        >

                        Hi Ammu,

                        I have tried your setup but am not seeing
                        the same results.

                        Here is my configuration on machine A:

                        [root@localhost ovs-test-scripts]#
                        ovs-vsctl show
                        a83453d5-27f8-4873-9356-e94b0d488797
                             Bridge "br0"
                                 Port "vxlan1"
                                     Interface "vxlan1"
                                         type: vxlan
                                         options:
                        {df_default="false", key="100",
                        remote_ip="200.0.0.102"}
                                 Port "br0"
                                     Interface "br0"
                                         type: internal
                             ovs_version: "2.10.1"

                        I have the identical configuration on
                        Machine B, with the tunnel
                        pointing back
                        to machine A:

                        [root@localhost ovs-test-scripts]#
                        ovs-vsctl show
                        bd184ee4-6e36-415b-ab90-e447046470c9
                             Bridge "br0"
                                 Port "vxlan1"
                                     Interface "vxlan1"
                                         type: vxlan
                                         options:
                        {df_default="false", key="100",
                        remote_ip="200.0.0.109"}
                                 Port "br0"
                                     Interface "br0"
                                         type: internal
                             ovs_version: "2.10.1"

                        Both machines are running RHEL 7.5 which
                        should be equivalent to CentOS 7.5.

                        I ran an iperf session and captured the
                        first 500 packets.  I have
                        attached the
                        packet capture file.

                        On Frame # 4 below we see the outer IPv4
                        header does not have the DF bit
                        set on the
                        outer IPv4 UDP encapsulating frame.

                        Frame 4: 1514 bytes on wire (12112 bits),
                        1514 bytes captured (12112 bits)
                        Ethernet II, Src: RealtekU_a3:69:97
                        (52:54:00:a3:69:97), Dst:
                        RealtekU_3a:a4:cd (52:54:00:3a:a4:cd)
                        Internet Protocol Version 4, Src:
                        200.0.0.102, Dst: 200.0.0.109
                             0100 .... = Version: 4
                             .... 0101 = Header Length: 20 bytes (5)
                             Differentiated Services Field: 0x00
                        (DSCP: CS0, ECN: Not-ECT)
                             Total Length: 1500
                             Identification: 0xd87c (55420)
                             Flags: 0x0000
                                 0... .... .... .... = Reserved
                        bit: Not set
                                 .0.. .... .... .... = Don't
                        fragment: Not set <---------------
                        not set
                                 ..0. .... .... .... = More
                        fragments: Not set
                                 ...0 0000 0000 0000 = Fragment
                        offset: 0
                             Time to live: 64
                             Protocol: UDP (17)
                             Header checksum: 0x0bc1 [validation
                        disabled]
                             [Header checksum status: Unverified]
                             Source: 200.0.0.102
                             Destination: 200.0.0.109
                        User Datagram Protocol, Src Port: 34290,
                        Dst Port: 4789
                             Source Port: 34290
                             Destination Port: 4789
                             Length: 1480
                             [Checksum: [missing]]
                             [Checksum Status: Not present]
                             [Stream index: 2]

                        CentOS 7.3 is pretty old - could you try
                        upgrading to Centos 7.5 or
                        higher and then
                        see if the issue is resolved? Or is there
                        perhaps some step you're
                        doing that I'm
                        missing?

                        Here is my modinfo for openvswitch:
                        filename:
                        
/lib/modules/3.10.0-862.el7.x86_64/kernel/net/openvswitch/openvswitch.ko.xz
                        alias: net-pf-16-proto-16-family-ovs_packet
                        alias: net-pf-16-proto-16-family-ovs_flow
                        alias: net-pf-16-proto-16-family-ovs_vport
                        alias: net-pf-16-proto-16-family-ovs_datapath
                        license:        GPL
                        description:    Open vSwitch switching datapath
                        retpoline:      Y
                        rhelversion:    7.5
                        srcversion: E70A19E64B8AC42B9A7641F
                        depends:
                        
nf_conntrack,nf_nat,libcrc32c,nf_nat_ipv6,nf_nat_ipv4,nf_defrag_ipv6
                        intree:         Y
                        vermagic: 3.10.0-862.el7.x86_64 SMP
                        mod_unload modversions
                        signer:         Red Hat Enterprise Linux
                        kernel signing key
                        sig_key:
                        
51:73:02:3B:F8:16:37:D7:BF:3C:51:50:13:4E:EC:84:1B:96:FD:0B
                        sig_hashalgo:   sha256

                        Thanks,

                        - Greg





_______________________________________________
discuss mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-discuss

Reply via email to