> On Thu, Dec 12, 2019 at 4:27 PM
> Not external logical networks, with vNIC profiles, have no network filter
> during the VM is started (or the vNIC is hotplugged),
> allows any MAC address. This works without any hook required.
> In most simple flow for a lab would be to remove the
I have a VM network created with some hosts and I have included a vyos router
acting as a Layer 2 extension to another hypervisor through VXLAN.
I can see traffic reaching VMs from the other hypervisor to the ovirt hosted
I can see traffic leaving the VMs hosted on the ovirt
> On Wed, Dec 11, 2019 at 5:31 PM
> Is VyOS installed on the host, or in a VM?
VyOS is installed on the ovirt node
> Does this mean that the VyOS VM on oVirt should forward layer 2 traffic to
> the VyOS VM on proxmox?
> Is there a way to share a VLAN? (This would avoid additional
We currently have 2 bare metals.
One holds the ovirt and the other proxmox.
As to enable high availability and config sync on the proxmox hosted VMs we
have deployed VyOS on both hyper-visors.
We then use L2TPv3 as to extend VM networks from proxmox to ovirt and vice
When that was
> On Thu, Dec 12, 2019 at 11:29 AM
> I see.
> This will create an external OVN network.
> As far as I know, OVN networks do not allow mac spoofing, even if port
> security is disabled.
I have installed the vdsm hook for allow both promiscuous and mac-spoofing and
have the same experience.
Does anyone know how i can allow my Firewall VM cluster act as the default
gateway to VMs within the same network?
I've configured the GARP functionality on the OPNSENSE firewalls (PFSENSE fork).
VMs within the same network can ping the firewall IP addresses successfully but
not the GARP
Mail list logo