Re: [Users] Networking questions (LONG)

2014-01-11 Thread Alan Murrell

Quoting Dan Kenigsberg dan...@redhat.com:


This was devised as a security constraint - otherwise, a VM attached to
the non-VLAN network could sniff traffic from another (VLAN) network.
However, it seems that this is exactly what you need - a special VM that
is designed to do just that.


Well, I would prefer it not be a VM but part of the oVirt networking  
stack itself.  VMware has this built in with just a few clicks (you  
assign a VLAN ID of 4095 to a port group/network and it is basically  
tagging that port group with all VLAN IDs).  VMware of course is not  
using the Linux networking, though; they use their own vSwitch, so  
that is probably how they are able to do it.


So it seems to me the problem of no being able to do exactly what I am  
looking to do within oVirt itself is not really a shortfall of oVirt,  
per se, but the underlying platform on which it relies :-(



And it's not only you: there's another recent request for lifting this
limitation:
Bug 1049476 - [RFE] Mix untagged and tagged Logical Networks on the
same NIC


I actually do not have a problem with not being able to mix untagged  
and tagged Logical Networks on the same NIC; it is very convenient to  
be able to do so, but would not be considered a show-stopper IMO; if  
two physical NICs would need to be used, so be it.



I do not understand what you are trying to do with dummy devices (after
all, they are not going to send any packet anywhere).


Since my test server only has one physical NIC, I am using the dummy  
devices instead of physical ones.  I know they cannot pass traffic  
outside of the server (unless attached to a VM was is also attached to  
the physical NIC), but I am not concerned with that at the moment.  I  
am trying to test with a virtual lab, and as long as the  
traffic/access behaves as expected within it, there should be no  
reason it should not behave as expected with physical NICs, when I get  
to that stage.



But if you are willing to mess with network configuration under the feet
of oVirt, you could do the following:


As long as it does not involve too much complexity, I have no problem  
with having to mess with some configuration outside of oVirt.  It has  
to be kept pretty minimal.


We are looking for a good alternative to VMware so we don't have to  
keep putting up with their onerous licensing.  oVirt is our  
evaluation; if it ticks all our boxes, we would likely go with RHEV  
for those clients who are more comfortable with the commercial  
support, and oVirt for the others.  Unfortunately, this trunk  
capability is a pretty big one :-(



- create a network tagged with an id that is not really used in your
  datacenter, say 999, and attach it to the host.
- build and install vdsm-hook-extnet rpm
- define a vnic profile using this network, and adding a custom propery
  called extnet with the value of (say) untagged.
- set up a bridge named untagged directly on top of your eth0 (say
  breth0)
- define a libvirt bridged network named untagged, that uses breth0.
- attach the vnic of your firewall VM to your vnic profile.


I will give the above a try and let you know.  It might be a few days  
before I can get to it though.  I am really looking to do a trunk  
port though, which actually carries multiple tagged VLANs.  Going back  
to VMware, just for clarification, when VLAN ID 4095 is assigned to  
the trunk port group/network we create, that's the same thing as  
tagging that port group with all VLAN IDs, from 1 through to 4094.  
 It is very different from having it untagged.


OpenvSwitch supports this, but it appears it will be a while until  
full/natural integration is done with OpenvSwitch.  Unfortunately, we  
are not developers, so we are unable help with it's integration :-(


Anyway, we are not ready to give up yet.  We'll see what we can do  
with the above and let you know.  The other work-around, of course, is  
an earlier suggestion of just adding as many vNICs to the firewall VM  
as we need for each VLAN'd Logical Network, but that would raise  
another problem, albeit a rare one: if we were to put oVirt/RHEV in  
our own datacenter, replacing VMware, we have a couple of BGP routers  
that are setup with a few dozen VLANs.  It would be a PITA to add a  
vNIC for each one :-(  Most of our deployments with our clients,  
though, have less than ten VLANs, so it *could* be workable enough in  
those cases.


-Alan
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


Re: [Users] Networking questions (LONG)

2014-01-11 Thread bigclouds

hi,Alan
i  think the best way to solve your question is openvswitch(corresponding to 
vmware vswitch).  but it has not been intigrated with ovirt.
your  solution by adding dummy ethernet,  i do not think it can work as you 
expect.
because  vm's ethernet(vnet)  is vlan-aware or not.   if it is vlan-aware , it 
can be aware of just only one tag.
prosmisc mode  is limited in single vlan scope. 





At 2014-01-09 16:07:46,Alan Murrell li...@murrell.ca wrote:


Hello,

I am evaluating oVirt as a replacement/alternative to VMware deployments we 
typically do.  I have installed and all-in-one setup on a test box (which 
itself used to be an ESXi server), but it only has one NIC.  I trying to 
duplicate our typical configuration we do in VMware, which is this:

  1.) we create several port groups on the vSwitch, each assigned a VLAN ID, 
such as:

  - VLAN001 (VLAN ID: 1)
  - VLAN002 (VLAN ID: 2)
  - VLAN009 (VLAN ID: 9)
  - VLAN010 (VLAN ID: 10)
  - VLAN200 (VLAN ID: 200)
  - TRUNK (VLAN ID: 4095 - in VMware-world, VLAN ID 4095 is all VLANS 
and basically just passes the VLANs through to whatever is attached to the port 
group for the VM to handle)

  2.) We assign VMs to port groups appropriate for the VLAN they are part of.
  3.) The only VM that has a NIC assigned to the TRUNK port group is the 
firewall (which is Linux), and we create VLAN interfaces on it (i.e., eth1.1, 
eth1.2, eth1.10, eth1.200).  The firewall VM acts as the router between 
the various VLANs.

To replicate the above in oVirt, I created logical networks for each VLAN, and 
assigned the appropriate VLAN ID.  It seems oVirt/KVM does not have an 
equivalent for VMware's VLAN ID of 4095, so after some searching around, so 
for the TRUNK network, I left it with no VLAN assigned.  Because i cannot add 
VLAN and non-VLAN networks to the same physical NIC, after some searching 
around, it looks like I may have to utilise two NICS: one for the VLAN networks 
and one for the TRUNK network.

Because, at this point, I am not yet concerned with making the test VMs I will 
be setting up be accessible from outside the virtual lab environment (i.e., 
everything will communicate within my oVirt server/network for now), I am 
trying to make use of dummy interfaces, but I am not sure the best way to 
make use of this.  I am able to create the dummy* interfaces and have them show 
up in oVirt, but I am not sure of how they should be setup.  Here is what I am 
*thinking* should be done, but want to make sure it is correct before getting 
too deep:

  - I will use the physical NIC for management, therefore the ovirtmgmt 
bridge with eth0 assigned to it will remain as-is
  - Create two dummy interfaces: dummy0 and dummy1
  - Create a new bridge, ovirtvm and assign dummy0 and dummy1 to it
  - Attach the VLAN-enabled networks to dummy0
  - Attach the TRUNK network to dummy1

Would the above be the way to go about this?  The one thing I am not sure of is 
whether or not having no VLAN assigned (on the TRUNK network) accomplishes 
the same this as the VLAN ID 4095 in VMware: will oVirt/KVM just pass the 
traffic through for the VM attached to it to deal with?

Thanks for reading this far, and I appreciate any help you might be able to 
lend in the above.

-Alan
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


Re: [Users] Networking questions (LONG)

2014-01-10 Thread Lior Vernia
Hi Allan,

On 10/01/14 02:16, Alan Murrell wrote:
 Hello Lior,
 
 Thank you for your reply.
 

Sure, let's try to get that setup of yours working :)

 Quoting Lior Vernia lver...@redhat.com:
 
 This way the firewall VM will get something like eth1 for VLAN 1,
 eth2 for VLAN 200 and so forth, which might be close enough to what
 you described on your previous setup (oVirt currently doesn't allow
 creating VLANs inside VMs). And if I correctly understood your needs it
 will save you the trouble you described below (well, you would need the
 one dummy interface).
 
 That would be doable, except I am not sure if there is a limit to the
 number of vNICs a VM could have and/or if there is an OS-level limit to
 how many?  It is also a bit messier IMO, but that is more of a
 personal issue than a technical one, and one I could probably get over :-)
 

oVirt does not enforce any sort of limit on the number of vNICs. I
personally don't know about KVM or your VMs' OS, but this should be
Googleable.

 When you say that oVirt currently doesn't allow creating VLANs inside
 VMs, are you referring to the use of VLAN interfaces like I describe
 (e.g., eth1.1, eth1.2, eth1.10, etc.)?  If so, is that an oVirt
 limitation, or a KVM one?
 

Yes, sorry, I realise now that my phrasing was only half-understandable.
I indeed meant that oVirt doesn't support attaching more than one
network to the same vNIC (be it VLAN-tagged or not). I doubt that this
is a KVM limitation (but I'm no expert on KVM), I think it's just
something that we haven't yet found a strong case for in oVirt.

 I have seen examples where one can create a Trunk with KVM and Open
 vSwitch, and I thought for some reason oVirt used Open vSwitch, but none
 of the commands I tried from the examples were found.  A check of
 http://www.ovirt.org/Features/Node/OpenVSwitchSupport shows that
 indeed there does not appear to be any integration yet, and it is only
 60% done :-(
 

I actually know nothing of the link you provided, but I can offer
alternatives.

If you REALLY want to use OVS with oVirt NOW, you could take advantage
of its integration with OpenStack Neutron. That would require you to
install another machine (should be possible on an all-in-one setup too)
as a Neutron server. This might go smoothly or it might cause you some
headaches.
http://www.ovirt.org/Features/Detailed_OSN_Integration

It will probably become possible in the future to use OVS with oVirt
directly (although I can't promise or commit on the time frame) by
leveraging a development process that's going on in VDSM networking
right now. In fact, if you're a developer you could help make it happen
and control the time frame yourself by contributing to an OVS backend.
http://www.ovirt.org/Feature/NetworkReloaded

 With regards to using the dummy interfaces, I realised I probably do not
 need to add them to a bridge, since they would be physical NICs in
 production (this is just for testing).  I initially did create the
 ovirtvm bridge before I realised that, but have made them
 stand-alone NICs with no IPs attached to them, but they are not
 green in oVirt when I try to attach my logical networks to them under
 Networks  Hosts  vmhost01  Setup Host Networks.
 
 When I am in Setup Host Networks, I see my dummy interfaces, but they
 have a red dot instead of a green one (like what eth0 has). I can my
 logical networks to them, but the Network Device Status has a red
 arrow pointing down.  Here are my ifcfg-dummy* files:
 

I'm not an expert on these things, but this Down status is basically
the administrative link state on the host. From my experience when
logical networks are attached via the Setup Networks dialog, it does go
up, although I haven't tried without an IP address. Also, it's worth
trying to see if the actual networking works even if the NIC shows as
down, or to ifup the NIC manually if it doesn't.

 --- ifcfg-dummy0 ---
 DEVICE=dummy0
 ONBOOT=yes
 TYPE=Ethernet
 DELAY=0
 BOOTPROTO=none
 NM_CONTROLLED=no
 STP=no
 --- ifcfg-dummy0 ---
 
 My ifcfg-dummy1 is identical, except of course it has DEVICE=dummy1
 in it.  The interfaces do come up on the host, but as I said, in Setup
 Host Networks they have a red dot instead of a green one.  Perhaps I do
 need to assign an IP?  I can maybe assign a dummy one (i.e., one that
 I would never use)?
 
 -Alan
 ___
 Users mailing list
 Users@ovirt.org
 http://lists.ovirt.org/mailman/listinfo/users
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


Re: [Users] Networking questions (LONG)

2014-01-10 Thread Dan Kenigsberg
On Thu, Jan 09, 2014 at 10:53:25PM +0200, Lior Vernia wrote:
 Hello Alan,
 
 On 09/01/14 10:07, Alan Murrell wrote:
  Hello,
  
  I am evaluating oVirt as a replacement/alternative to VMware deployments
  we typically do.  I have installed and all-in-one setup on a test box
  (which itself used to be an ESXi server), but it only has one NIC.  I
  trying to duplicate our typical configuration we do in VMware, which is
  this:
  
1.) we create several port groups on the vSwitch, each assigned a
  VLAN ID, such as:
  
- VLAN001 (VLAN ID: 1)
- VLAN002 (VLAN ID: 2)
- VLAN009 (VLAN ID: 9)
- VLAN010 (VLAN ID: 10)
- VLAN200 (VLAN ID: 200)
- TRUNK (VLAN ID: 4095 - in VMware-world, VLAN ID 4095 is all
  VLANS and basically just passes the VLANs through to whatever is
  attached to the port group for the VM to handle)
  
2.) We assign VMs to port groups appropriate for the VLAN they are
  part of.
3.) The only VM that has a NIC assigned to the TRUNK port group is
  the firewall (which is Linux), and we create VLAN interfaces on it
  (i.e., eth1.1, eth1.2, eth1.10, eth1.200).  The firewall VM acts
  as the router between the various VLANs.
  
  To replicate the above in oVirt, I created logical networks for each
  VLAN, and assigned the appropriate VLAN ID.  It seems oVirt/KVM does not
  have an equivalent for VMware's VLAN ID of 4095, so after some
  searching around, so for the TRUNK network, I left it with no VLAN
  assigned.  Because i cannot add VLAN and non-VLAN networks to the same
  physical NIC, after some searching around, it looks like I may have to
  utilise two NICS: one for the VLAN networks and one for the TRUNK network.
 
 That is true. One non-VLAN network can in fact sit on the same NIC with
 VLAN networks, but it has to be non-VM.

This was devised as a security constraint - otherwise, a VM attached to
the non-VLAN network could sniff traffic from another (VLAN) network.
However, it seems that this is exactly what you need - a special VM that
is designed to do just that.

And it's not only you: there's another recent request for lifting this
limitation:
Bug 1049476 - [RFE] Mix untagged and tagged Logical Networks on the
same NIC


 However, I'm not sure that you in fact need a TRUNK VM network in
 oVirt. If you want your firewall VM to get all traffic from the VLANs,
 you could create a vNIC for each network, to which you'll attach a
 profile (oVirt's equivalent of port group if I'm not mistaken) of the
 corresponding network. The host can remain with just the VLAN networks
 attached to its NICs, without a designated TRUNK.

 This way the firewall VM will get something like eth1 for VLAN 1,
 eth2 for VLAN 200 and so forth, which might be close enough to what
 you described on your previous setup (oVirt currently doesn't allow
 creating VLANs inside VMs). And if I correctly understood your needs it
 will save you the trouble you described below (well, you would need the
 one dummy interface).

  
  Because, at this point, I am not yet concerned with making the test VMs
  I will be setting up be accessible from outside the virtual lab
  environment (i.e., everything will communicate within my oVirt
  server/network for now), I am trying to make use of dummy interfaces,
  but I am not sure the best way to make use of this.  I am able to create
  the dummy* interfaces and have them show up in oVirt, but I am not sure
  of how they should be setup.  Here is what I am *thinking* should be
  done, but want to make sure it is correct before getting too deep:
  
- I will use the physical NIC for management, therefore the
  ovirtmgmt bridge with eth0 assigned to it will remain as-is
- Create two dummy interfaces: dummy0 and dummy1
- Create a new bridge, ovirtvm and assign dummy0 and dummy1 to it
 
 This is something that currently can't be done from within the oVirt
 engine, but if my above suggestion works for you then it won't be needed.
 
- Attach the VLAN-enabled networks to dummy0
- Attach the TRUNK network to dummy1

I do not understand what you are trying to do with dummy devices (after
all, they are not going to send any packet anywhere).

But if you are willing to mess with network configuration under the feet
of oVirt, you could do the following:
- create a network tagged with an id that is not really used in your
  datacenter, say 999, and attach it to the host.
- build and install vdsm-hook-extnet rpm
- define a vnic profile using this network, and adding a custom propery
  called extnet with the value of (say) untagged.
- set up a bridge named untagged directly on top of your eth0 (say
  breth0)
- define a libvirt bridged network named untagged, that uses breth0.
- attach the vnic of your firewall VM to your vnic profile.

Now, when you start up your firewall vm, the extnet hook gets into
action, and forces the firewall vm from the 999 network, into using your
hand-crafted network.

This all sounds a bit long 

Re: [Users] Networking questions (LONG)

2014-01-10 Thread Juan Pablo Lorier
Hi Dan,

I take the chance to ask; why is that the untagged IF can see the
traffic of the tagged vlans? Isn't that filtered at kernel level? Is
this a virtualization design limitation or is it down to the kernel?
I don't know how the kernel processes the packages, but I thought that
packages that arrives to the nic are filtered by the kernel and sent to
the respective vif (untagged to the master interface and tagged to the
.XX interfaces). I ask because other virtualization platforms don't have
this limitation and I wonder if it's because they don't care of
because they solved this somehow.
Regards,

On 10/01/14 09:32, Dan Kenigsberg wrote:
 On Thu, Jan 09, 2014 at 10:53:25PM +0200, Lior Vernia wrote:
 Hello Alan,

 On 09/01/14 10:07, Alan Murrell wrote:
 Hello,

 I am evaluating oVirt as a replacement/alternative to VMware deployments
 we typically do.  I have installed and all-in-one setup on a test box
 (which itself used to be an ESXi server), but it only has one NIC.  I
 trying to duplicate our typical configuration we do in VMware, which is
 this:

   1.) we create several port groups on the vSwitch, each assigned a
 VLAN ID, such as:

   - VLAN001 (VLAN ID: 1)
   - VLAN002 (VLAN ID: 2)
   - VLAN009 (VLAN ID: 9)
   - VLAN010 (VLAN ID: 10)
   - VLAN200 (VLAN ID: 200)
   - TRUNK (VLAN ID: 4095 - in VMware-world, VLAN ID 4095 is all
 VLANS and basically just passes the VLANs through to whatever is
 attached to the port group for the VM to handle)

   2.) We assign VMs to port groups appropriate for the VLAN they are
 part of.
   3.) The only VM that has a NIC assigned to the TRUNK port group is
 the firewall (which is Linux), and we create VLAN interfaces on it
 (i.e., eth1.1, eth1.2, eth1.10, eth1.200).  The firewall VM acts
 as the router between the various VLANs.

 To replicate the above in oVirt, I created logical networks for each
 VLAN, and assigned the appropriate VLAN ID.  It seems oVirt/KVM does not
 have an equivalent for VMware's VLAN ID of 4095, so after some
 searching around, so for the TRUNK network, I left it with no VLAN
 assigned.  Because i cannot add VLAN and non-VLAN networks to the same
 physical NIC, after some searching around, it looks like I may have to
 utilise two NICS: one for the VLAN networks and one for the TRUNK network.
 That is true. One non-VLAN network can in fact sit on the same NIC with
 VLAN networks, but it has to be non-VM.
 This was devised as a security constraint - otherwise, a VM attached to
 the non-VLAN network could sniff traffic from another (VLAN) network.
 However, it seems that this is exactly what you need - a special VM that
 is designed to do just that.

 And it's not only you: there's another recent request for lifting this
 limitation:
 Bug 1049476 - [RFE] Mix untagged and tagged Logical Networks on the
 same NIC

 However, I'm not sure that you in fact need a TRUNK VM network in
 oVirt. If you want your firewall VM to get all traffic from the VLANs,
 you could create a vNIC for each network, to which you'll attach a
 profile (oVirt's equivalent of port group if I'm not mistaken) of the
 corresponding network. The host can remain with just the VLAN networks
 attached to its NICs, without a designated TRUNK.

 This way the firewall VM will get something like eth1 for VLAN 1,
 eth2 for VLAN 200 and so forth, which might be close enough to what
 you described on your previous setup (oVirt currently doesn't allow
 creating VLANs inside VMs). And if I correctly understood your needs it
 will save you the trouble you described below (well, you would need the
 one dummy interface).

 Because, at this point, I am not yet concerned with making the test VMs
 I will be setting up be accessible from outside the virtual lab
 environment (i.e., everything will communicate within my oVirt
 server/network for now), I am trying to make use of dummy interfaces,
 but I am not sure the best way to make use of this.  I am able to create
 the dummy* interfaces and have them show up in oVirt, but I am not sure
 of how they should be setup.  Here is what I am *thinking* should be
 done, but want to make sure it is correct before getting too deep:

   - I will use the physical NIC for management, therefore the
 ovirtmgmt bridge with eth0 assigned to it will remain as-is
   - Create two dummy interfaces: dummy0 and dummy1
   - Create a new bridge, ovirtvm and assign dummy0 and dummy1 to it
 This is something that currently can't be done from within the oVirt
 engine, but if my above suggestion works for you then it won't be needed.

   - Attach the VLAN-enabled networks to dummy0
   - Attach the TRUNK network to dummy1
 I do not understand what you are trying to do with dummy devices (after
 all, they are not going to send any packet anywhere).

 But if you are willing to mess with network configuration under the feet
 of oVirt, you could do the following:
 - create a network tagged with an id that is not really used in your
   

Re: [Users] Networking questions (LONG)

2014-01-10 Thread Itamar Heim

On 01/10/2014 01:32 PM, Dan Kenigsberg wrote:

On Thu, Jan 09, 2014 at 10:53:25PM +0200, Lior Vernia wrote:

Hello Alan,

On 09/01/14 10:07, Alan Murrell wrote:

Hello,

I am evaluating oVirt as a replacement/alternative to VMware deployments
we typically do.  I have installed and all-in-one setup on a test box
(which itself used to be an ESXi server), but it only has one NIC.  I
trying to duplicate our typical configuration we do in VMware, which is
this:

   1.) we create several port groups on the vSwitch, each assigned a
VLAN ID, such as:

   - VLAN001 (VLAN ID: 1)
   - VLAN002 (VLAN ID: 2)
   - VLAN009 (VLAN ID: 9)
   - VLAN010 (VLAN ID: 10)
   - VLAN200 (VLAN ID: 200)
   - TRUNK (VLAN ID: 4095 - in VMware-world, VLAN ID 4095 is all
VLANS and basically just passes the VLANs through to whatever is
attached to the port group for the VM to handle)

   2.) We assign VMs to port groups appropriate for the VLAN they are
part of.
   3.) The only VM that has a NIC assigned to the TRUNK port group is
the firewall (which is Linux), and we create VLAN interfaces on it
(i.e., eth1.1, eth1.2, eth1.10, eth1.200).  The firewall VM acts
as the router between the various VLANs.

To replicate the above in oVirt, I created logical networks for each
VLAN, and assigned the appropriate VLAN ID.  It seems oVirt/KVM does not
have an equivalent for VMware's VLAN ID of 4095, so after some
searching around, so for the TRUNK network, I left it with no VLAN
assigned.  Because i cannot add VLAN and non-VLAN networks to the same
physical NIC, after some searching around, it looks like I may have to
utilise two NICS: one for the VLAN networks and one for the TRUNK network.


That is true. One non-VLAN network can in fact sit on the same NIC with
VLAN networks, but it has to be non-VM.


This was devised as a security constraint - otherwise, a VM attached to
the non-VLAN network could sniff traffic from another (VLAN) network.
However, it seems that this is exactly what you need - a special VM that
is designed to do just that.



isn't that was promiscious mode (aka port mirroring) is for?


And it's not only you: there's another recent request for lifting this
limitation:
 Bug 1049476 - [RFE] Mix untagged and tagged Logical Networks on the
 same NIC



However, I'm not sure that you in fact need a TRUNK VM network in
oVirt. If you want your firewall VM to get all traffic from the VLANs,
you could create a vNIC for each network, to which you'll attach a
profile (oVirt's equivalent of port group if I'm not mistaken) of the
corresponding network. The host can remain with just the VLAN networks
attached to its NICs, without a designated TRUNK.

This way the firewall VM will get something like eth1 for VLAN 1,
eth2 for VLAN 200 and so forth, which might be close enough to what
you described on your previous setup (oVirt currently doesn't allow
creating VLANs inside VMs). And if I correctly understood your needs it
will save you the trouble you described below (well, you would need the
one dummy interface).



Because, at this point, I am not yet concerned with making the test VMs
I will be setting up be accessible from outside the virtual lab
environment (i.e., everything will communicate within my oVirt
server/network for now), I am trying to make use of dummy interfaces,
but I am not sure the best way to make use of this.  I am able to create
the dummy* interfaces and have them show up in oVirt, but I am not sure
of how they should be setup.  Here is what I am *thinking* should be
done, but want to make sure it is correct before getting too deep:

   - I will use the physical NIC for management, therefore the
ovirtmgmt bridge with eth0 assigned to it will remain as-is
   - Create two dummy interfaces: dummy0 and dummy1
   - Create a new bridge, ovirtvm and assign dummy0 and dummy1 to it


This is something that currently can't be done from within the oVirt
engine, but if my above suggestion works for you then it won't be needed.


   - Attach the VLAN-enabled networks to dummy0
   - Attach the TRUNK network to dummy1


I do not understand what you are trying to do with dummy devices (after
all, they are not going to send any packet anywhere).

But if you are willing to mess with network configuration under the feet
of oVirt, you could do the following:
- create a network tagged with an id that is not really used in your
   datacenter, say 999, and attach it to the host.
- build and install vdsm-hook-extnet rpm
- define a vnic profile using this network, and adding a custom propery
   called extnet with the value of (say) untagged.
- set up a bridge named untagged directly on top of your eth0 (say
   breth0)
- define a libvirt bridged network named untagged, that uses breth0.
- attach the vnic of your firewall VM to your vnic profile.

Now, when you start up your firewall vm, the extnet hook gets into
action, and forces the firewall vm from the 999 network, into using your
hand-crafted network.

This 

Re: [Users] Networking questions (LONG)

2014-01-10 Thread Dan Kenigsberg
On Fri, Jan 10, 2014 at 10:39:20AM -0200, Juan Pablo Lorier wrote:
 Hi Dan,
 
 I take the chance to ask; why is that the untagged IF can see the
 traffic of the tagged vlans? Isn't that filtered at kernel level? Is
 this a virtualization design limitation or is it down to the kernel?
 I don't know how the kernel processes the packages, but I thought that
 packages that arrives to the nic are filtered by the kernel and sent to
 the respective vif (untagged to the master interface and tagged to the
 .XX interfaces). I ask because other virtualization platforms don't have
 this limitation and I wonder if it's because they don't care of
 because they solved this somehow.

I do not know how this is implemented elsewhere, but to the best of my
knowledge, the master interface sees tagged packets, too (which is the
basis of Alan's use case: he wants the trunk VM to see all traffic).

BTW, Alan, for this to actually work, you need to enable macspoofing on the
relevant nic. Yet another step on the hack I've outlined earlier.

Dan.
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


Re: [Users] Networking questions (LONG)

2014-01-10 Thread Dan Kenigsberg
On Fri, Jan 10, 2014 at 03:06:28PM +0200, Itamar Heim wrote:
 On 01/10/2014 01:32 PM, Dan Kenigsberg wrote:
 On Thu, Jan 09, 2014 at 10:53:25PM +0200, Lior Vernia wrote:
 Hello Alan,
 
 On 09/01/14 10:07, Alan Murrell wrote:
 Hello,
 
 I am evaluating oVirt as a replacement/alternative to VMware deployments
 we typically do.  I have installed and all-in-one setup on a test box
 (which itself used to be an ESXi server), but it only has one NIC.  I
 trying to duplicate our typical configuration we do in VMware, which is
 this:
 
1.) we create several port groups on the vSwitch, each assigned a
 VLAN ID, such as:
 
- VLAN001 (VLAN ID: 1)
- VLAN002 (VLAN ID: 2)
- VLAN009 (VLAN ID: 9)
- VLAN010 (VLAN ID: 10)
- VLAN200 (VLAN ID: 200)
- TRUNK (VLAN ID: 4095 - in VMware-world, VLAN ID 4095 is all
 VLANS and basically just passes the VLANs through to whatever is
 attached to the port group for the VM to handle)
 
2.) We assign VMs to port groups appropriate for the VLAN they are
 part of.
3.) The only VM that has a NIC assigned to the TRUNK port group is
 the firewall (which is Linux), and we create VLAN interfaces on it
 (i.e., eth1.1, eth1.2, eth1.10, eth1.200).  The firewall VM acts
 as the router between the various VLANs.
 
 To replicate the above in oVirt, I created logical networks for each
 VLAN, and assigned the appropriate VLAN ID.  It seems oVirt/KVM does not
 have an equivalent for VMware's VLAN ID of 4095, so after some
 searching around, so for the TRUNK network, I left it with no VLAN
 assigned.  Because i cannot add VLAN and non-VLAN networks to the same
 physical NIC, after some searching around, it looks like I may have to
 utilise two NICS: one for the VLAN networks and one for the TRUNK 
 network.
 
 That is true. One non-VLAN network can in fact sit on the same NIC with
 VLAN networks, but it has to be non-VM.
 
 This was devised as a security constraint - otherwise, a VM attached to
 the non-VLAN network could sniff traffic from another (VLAN) network.
 However, it seems that this is exactly what you need - a special VM that
 is designed to do just that.
 
 
 isn't that was promiscious mode (aka port mirroring) is for?

Oh that makes more sense...

But unfortunately, it is impossible to mirror more than a single network
onto a vnic. (Engine implementation limitation).

However, one can device a tc-based after_network_setup hook, that
directs all traffic from all bridges onto a specific target bridge, onto
which the firewall VM is connected.

Dan.
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


Re: [Users] Networking questions (LONG)

2014-01-09 Thread Alan Murrell
One other question to add: If I do indeed ned to create a new bridge  
(ovirtvm in my example), I do not want to assign any IPs to it, nor  
any of the logical networks I create.  When I did try this in my  
fooling around, oVirt would not let me save the changes, giving me  
an error about network parameters not correct (I have the host shut  
down a the moment, so I can get the exact message, but if necessary, I  
can get it for you when I get in to our shop in the morning)


Thanks! :-)

-Alan

___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


Re: [Users] Networking questions (LONG)

2014-01-09 Thread Sven Kieske
Just as a quick shot:

it is possible to configure it the way you want (ip-less bridges), but I
can't exactly tell you what you're doing wrong atm.

ip-less bridges work here with vlans and stuff, so keep trying or
post more info about your setup :-)

Am 09.01.2014 09:22, schrieb Alan Murrell:
 One other question to add: If I do indeed ned to create a new bridge
 (ovirtvm in my example), I do not want to assign any IPs to it, nor
 any of the logical networks I create.  When I did try this in my
 fooling around, oVirt would not let me save the changes, giving me an
 error about network parameters not correct (I have the host shut down a
 the moment, so I can get the exact message, but if necessary, I can get
 it for you when I get in to our shop in the morning)


-- 
Mit freundlichen Grüßen / Regards

Sven Kieske

Systemadministrator
Mittwald CM Service GmbH  Co. KG
Königsberger Straße 6
32339 Espelkamp
T: +49-5772-293-100
F: +49-5772-293-333
https://www.mittwald.de
Geschäftsführer: Robert Meyer
St.Nr.: 331/5721/1033, USt-IdNr.: DE814773217, HRA 6640, AG Bad Oeynhausen
Komplementärin: Robert Meyer Verwaltungs GmbH, HRB 13260, AG Bad Oeynhausen
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


Re: [Users] Networking questions (LONG)

2014-01-09 Thread Lior Vernia
Hello Alan,

On 09/01/14 10:07, Alan Murrell wrote:
 Hello,
 
 I am evaluating oVirt as a replacement/alternative to VMware deployments
 we typically do.  I have installed and all-in-one setup on a test box
 (which itself used to be an ESXi server), but it only has one NIC.  I
 trying to duplicate our typical configuration we do in VMware, which is
 this:
 
   1.) we create several port groups on the vSwitch, each assigned a
 VLAN ID, such as:
 
   - VLAN001 (VLAN ID: 1)
   - VLAN002 (VLAN ID: 2)
   - VLAN009 (VLAN ID: 9)
   - VLAN010 (VLAN ID: 10)
   - VLAN200 (VLAN ID: 200)
   - TRUNK (VLAN ID: 4095 - in VMware-world, VLAN ID 4095 is all
 VLANS and basically just passes the VLANs through to whatever is
 attached to the port group for the VM to handle)
 
   2.) We assign VMs to port groups appropriate for the VLAN they are
 part of.
   3.) The only VM that has a NIC assigned to the TRUNK port group is
 the firewall (which is Linux), and we create VLAN interfaces on it
 (i.e., eth1.1, eth1.2, eth1.10, eth1.200).  The firewall VM acts
 as the router between the various VLANs.
 
 To replicate the above in oVirt, I created logical networks for each
 VLAN, and assigned the appropriate VLAN ID.  It seems oVirt/KVM does not
 have an equivalent for VMware's VLAN ID of 4095, so after some
 searching around, so for the TRUNK network, I left it with no VLAN
 assigned.  Because i cannot add VLAN and non-VLAN networks to the same
 physical NIC, after some searching around, it looks like I may have to
 utilise two NICS: one for the VLAN networks and one for the TRUNK network.

That is true. One non-VLAN network can in fact sit on the same NIC with
VLAN networks, but it has to be non-VM.

However, I'm not sure that you in fact need a TRUNK VM network in
oVirt. If you want your firewall VM to get all traffic from the VLANs,
you could create a vNIC for each network, to which you'll attach a
profile (oVirt's equivalent of port group if I'm not mistaken) of the
corresponding network. The host can remain with just the VLAN networks
attached to its NICs, without a designated TRUNK.

This way the firewall VM will get something like eth1 for VLAN 1,
eth2 for VLAN 200 and so forth, which might be close enough to what
you described on your previous setup (oVirt currently doesn't allow
creating VLANs inside VMs). And if I correctly understood your needs it
will save you the trouble you described below (well, you would need the
one dummy interface).

 
 Because, at this point, I am not yet concerned with making the test VMs
 I will be setting up be accessible from outside the virtual lab
 environment (i.e., everything will communicate within my oVirt
 server/network for now), I am trying to make use of dummy interfaces,
 but I am not sure the best way to make use of this.  I am able to create
 the dummy* interfaces and have them show up in oVirt, but I am not sure
 of how they should be setup.  Here is what I am *thinking* should be
 done, but want to make sure it is correct before getting too deep:
 
   - I will use the physical NIC for management, therefore the
 ovirtmgmt bridge with eth0 assigned to it will remain as-is
   - Create two dummy interfaces: dummy0 and dummy1
   - Create a new bridge, ovirtvm and assign dummy0 and dummy1 to it

This is something that currently can't be done from within the oVirt
engine, but if my above suggestion works for you then it won't be needed.

   - Attach the VLAN-enabled networks to dummy0
   - Attach the TRUNK network to dummy1
 
 Would the above be the way to go about this?  The one thing I am not
 sure of is whether or not having no VLAN assigned (on the TRUNK
 network) accomplishes the same this as the VLAN ID 4095 in VMware:
 will oVirt/KVM just pass the traffic through for the VM attached to it
 to deal with?
 
 Thanks for reading this far, and I appreciate any help you might be able
 to lend in the above.
 
 -Alan
 
 
 
 ___
 Users mailing list
 Users@ovirt.org
 http://lists.ovirt.org/mailman/listinfo/users
 
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users