hi:
  I have deployed the odl carbon integrated with openstack ocata and it
works well . the neutron network function is controlled by the odl and the
vm can ping with each other very well.
  the environment is :
   openstack controller: 192.168.100.1
   openatck compute1:192.168.100.12
   openatck compute2:192.168.100.13
   odl:192.168.100.14

 and I boot four vms :
  client: on compute1
  server:on compute1
  fw1: on compute2
  fw2: on compute2

  now I want to create a service function chain with logical sff to make
the flow go through
  client ->fw1->fw2->server

but after my configure  ,the odl genius has error
2017-12-13 04:52:38,972 | ERROR | on-dispatcher-56 | SfcGeniusRpcClient
           | 396 - org.opendaylight.sfc.genius - 0.5.1.Carbon |
getTargetInterfaceFromGeniusRPC(GetTunnelInterfaceNameInput
[_destinationDpid=150631136117309, _sourceDpid=62195975568613,
_tunnelType=class
org.opendaylight.yang.gen.v1.urn.opendaylight.genius.interfacemanager.rev160406.TunnelTypeVxlanGpe,
augmentation=[]]) failed


It means the compute1 and compute2 do not have a vxlangpe tunnel.  So what
should I do to solve the problem.?should I create a vxlan-gpe port
mananally? or how can I configure the vxlangpe tunnel. The logical sff can
not create the vxlanppe port  automatically.

my configure information:
def get_service_functions_uri():
    return "/restconf/config/service-function:service-functions"

def get_service_functions_data():
    return {
    "service-functions": {
        "service-function": [
            {
                "name": "dpi-1",

                "type": "dpi",
                "sf-data-plane-locator": [
                    {
                        "name": "dpi-1-dpl",

 "interface-name":"710c4476-8bd8-4a08-aa69-0e66b3373d1d",
                        "transport": "service-locator:eth-nsh",
                        "service-function-forwarder": "SFF1"
                    }
                ]
            },
            {
                "name": "firewall-1",


                "type": "firewall",
                "sf-data-plane-locator": [
                    {
                        "name": "firewall-1-dpl",

"interface-name":"14ee6ffc-e4ff-4ed4-8d20-e33a8afb5bbb",
                        "transport": "service-locator:eth-nsh",
                        "service-function-forwarder": "SFF1"
                    }
                ]
            }
        ]
    }
}

def get_service_function_forwarders_uri():
    return
"/restconf/config/service-function-forwarder:service-function-forwarders"

def get_service_function_forwarders_data():
    return {
    "service-function-forwarders": {
        "service-function-forwarder": [
           {
               "name":"Classifier1"
                            },

            {
                "name": "SFF1",



            }
         ]
      }
   }

def get_service_function_chains_uri():
    return
"/restconf/config/service-function-chain:service-function-chains/"

def get_service_function_chains_data():
    return {
    "service-function-chains": {
        "service-function-chain": [
            {
                "name": "SFC1",
                "sfc-service-function": [
                    {
                        "name": "dpi-abstract1",
                        "type": "dpi"
                    },
                    {
                        "name": "firewall-abstract1",
                        "type": "firewall"
                    }
                ]
            }
        ]
    }
}

def get_service_function_paths_uri():
    return "/restconf/config/service-function-path:service-function-paths/"

def get_service_function_paths_data():
    return {
    "service-function-paths": {
        "service-function-path": [
            {
                "name": "SFP1",
                "service-chain-name": "SFC1",
                "starting-index": 255,
                 "transport-type": "service-locator:vxlan-gpe",

                "symmetric": "true",
                "context-metadata": "NSH1",
                "service-path-hop": [
                    {
                        "hop-number": 0,
                        "service-function-name": "dpi-1"
                    },
                   {
                        "hop-number": 1,
                        "service-function-name": "firewall-1"
                    }
                ]
            }
        ]
    }
}

def get_service_function_metadata_uri():
    return
"/restconf/config/service-function-path-metadata:service-function-metadata/"

def get_service_function_metadata_data():
    return {
  "service-function-metadata": {
    "context-metadata": [
      {
        "name": "NSH1",
        "context-header1": "1",
        "context-header2": "2",
        "context-header3": "3",
        "context-header4": "4"
      }
    ]
  }
}

def get_rendered_service_path_uri():
    return
"/restconf/operations/rendered-service-path:create-rendered-path/"

def get_rendered_service_path_data():
    return {
    "input": {
        "name": "RSP1",
        "parent-service-function-path": "SFP1"
    }
}

def get_service_function_acl_uri():
    return "/restconf/config/ietf-access-control-list:access-lists/"

def get_service_function_acl_data():
    return  {
  "access-lists": {
    "acl": [
      {
        "acl-name": "ACL1",
        "acl-type": "ietf-access-control-list:ipv4-acl",
        "access-list-entries": {
          "ace": [
            {
              "rule-name": "ACE1",
              "actions": {
                "service-function-acl:rendered-service-path": "RSP1"
              },
              "matches": {
                "destination-ipv4-network": "10.10.5.10/32",
                "source-ipv4-network": "10.10.5.8/32",
                "protocol": "1"

              }
            }
          ]
        }
      },
      {
        "acl-name": "ACL2",
        "acl-type": "ietf-access-control-list:ipv4-acl",
        "access-list-entries": {
          "ace": [
            {
              "rule-name": "ACE2",
              "actions": {
                "service-function-acl:rendered-service-path": "RSP1-Reverse"
              },
              "matches": {
                "destination-ipv4-network": "10.10.5.8/32",
                "source-ipv4-network": "10.10.5.10/32",
                "protocol": "1"

              }
            }
          ]
        }
      }
    ]
  }
}

def get_service_function_classifiers_uri():
    return
"/restconf/config/service-function-classifier:service-function-classifiers/"

def get_service_function_classifiers_data():
    return  {
  "service-function-classifiers": {
    "service-function-classifier": [
      {
        "name": "Classifier1",
        "scl-service-function-forwarder": [
          {
            "name": "Classifier1",
            "interface": "9027e9a7-f3eb-42d2-8fbe-ce26a02a5c78"
          }
        ],
        "acl": {
            "name": "ACL1",
            "type": "ietf-access-control-list:ipv4-acl"
         }
      },
      {
        "name": "Classifier2",
        "scl-service-function-forwarder": [
          {
            "name": "Classifier1",
            "interface": "127cf4a4-44e6-427d-b970-8b7b1b00c85d"
          }
        ],
        "acl": {
            "name": "ACL2",
            "type": "ietf-access-control-list:ipv4-acl"
         }
      }
    ]
  }
}



Thanks !

Glend Ren
Best regards!
_______________________________________________
sfc-dev mailing list
[email protected]
https://lists.opendaylight.org/mailman/listinfo/sfc-dev

Reply via email to