Hi Eric, Thank you so much for the reply and for such a complete answer! I will start to carefully grasp all the information provided by you. As soon as I will came to a conclusion related to my specific situation, I'll post my findings ...
Thank you, Ioan. On 2019/10/10 18:08:13, Eric Lee Green <eric.lee.gr...@gmail.com> wrote: > On 10/10/19 5:19 AM, Ioan Marginean wrote: > > Hi users, > > > > I installed CS 4.13 on 3 KVM hypervisors. Every host has 2 interfaces, eno1 > > end eno2. I had defined cloudbr0 on eno1 end here goes Management, Public > > and storage traffic. The guest traffic goes on eno2. All seems perfect > > until I started to create instances on a guest isolated network. If the > > instance VM is on the same host as the VR, all is fine and dandy but if the > > VM instance is created on a different host than VR's the outcome for ping > > is Destination Host Unreachable. > > The network service on that instance appears as failed and ifconfig shows > > eth0 with no ipv4 address as it should... > > I suspect that I didn't configure something wrong but I can't figure out > > what is wrong... Googleing and searching on user mailing list didn't helped > > .... Can anyone point me to the right direction? > > > Isolated guest networks by default operate as a VLAN. Your switch will > need to pass tagged VLAN traffic for those ports. If your switch is not > configured properly then VLAN traffic won't pass and you won't be able > to have isolated networks that extend outside of a single host. > > I used advanced networking and VLANs. Here is how my > /etc/sysconfig/network-scripts looks: > > ifcfg-bond0 ifcfg-bond0.102 ifcfg-enp1s0f1 > ifcfg-bond0.100 ifcfg-br100 ifcfg-enp5s0 > ifcfg-bond0.101 ifcfg-enp1s0f0 > > 'bond0' is my bonded network ports, defined as the Physical Network in > my zone, which actually just happens to have a single port right now on > this particular host, enp5s0 (it can be different ports on different > hosts, my hosts aren't completely homogenous, so keeping it as bond0 > means it doesn't matter if it's enp4s0 on some other host). 100 is my > management network, the one used to get everything else up and running, > and is the only one that has a bridge predefined for it, br100. This is > tagged in the KVM traffic label of the details in the management > network. (Which you get to by clicking the 'bond0' in the network). I > then defined 101 as 'public', 102 as 'Guest', and for storage it's 100 > again with KVM traffic label br100. > > In my Dell managed switch, for the 10 gigabit Ethernet ports connected > to the compute and storage hosts, they look like this: > > interface ethernet 1/xg2 > spanning-tree portfast > mtu 9216 > switchport mode general > switchport general pvid 100 > switchport general acceptable-frame-type tagged-only > switchport general allowed vlan add 1000-2000 > switchport general allowed vlan add 100-104,120,192,200 tagged > exit > > And of course for the ports that lead off to other switches in untagged > mode, like this port that hooks to my main infrastructure switch from > whence it is routed to the Internet, they look like this: > > interface ethernet 1/g4 > spanning-tree portfast > switchport access vlan 101 > exit > > Note that by default all managed switches have all ports defined as > access ports for VLAN 1 and will not accept tagged traffic for any other > VLAN. Now, you can define a port as *BOTH* an access port (i.e., > untagged packets get tagged to a VLAN, outgoing traffic on that VLAN > gets untagged and sent out as plain packets) *and* as a tagged port for > other VLANs in most switches, but it's a hinky way of doing things and > subject to many issues. In general, make a port either an access port > (i.e., untagged, on a single VLAN) or a tagged port (multiple VLANs) or > you are asking for a world of trouble. > > >