Hi Eric, 

Thank you. You were right! After we re-configure our switches to allow VLANs 
traffic, the problem is gone and everything works like a charm...

All the best and thank you again!

On 2019/10/11 10:02:36, Ioan Marginean <ionica.margin...@gmail.com> wrote: 
> Hi Eric,
> 
> Thank you so much for the reply and for such a complete answer! I will start 
> to carefully grasp all the information provided by you. As soon as I will 
> came to a conclusion related to my specific situation, I'll post my findings 
> ...
> 
> Thank you, Ioan.
> 
> On 2019/10/10 18:08:13, Eric Lee Green <eric.lee.gr...@gmail.com> wrote: 
> > On 10/10/19 5:19 AM, Ioan Marginean wrote:
> > > Hi users,
> > >
> > > I installed CS 4.13 on 3 KVM hypervisors. Every host has 2 interfaces, 
> > > eno1 end eno2. I had defined cloudbr0 on eno1 end here goes Management, 
> > > Public and storage traffic. The guest traffic goes on eno2. All seems 
> > > perfect until I started to create instances on a guest isolated network. 
> > > If the instance VM is on the same host as the VR, all is fine and dandy 
> > > but if the VM instance is created on a different host than VR's the 
> > > outcome for ping is Destination Host Unreachable.
> > > The network service on that instance appears as failed and ifconfig shows 
> > > eth0 with no ipv4 address as it should...
> > > I suspect that I didn't configure something wrong but I can't figure out 
> > > what is wrong... Googleing and searching on user mailing list didn't 
> > > helped .... Can anyone point me to the right direction?
> > 
> > 
> > Isolated guest networks by default operate as a VLAN. Your switch will 
> > need to pass tagged VLAN traffic for those ports. If your switch is not 
> > configured properly then VLAN traffic won't pass and you won't be able 
> > to have isolated networks that extend outside of a single host.
> > 
> > I used advanced networking and VLANs. Here is how my 
> > /etc/sysconfig/network-scripts looks:
> > 
> > ifcfg-bond0   ifcfg-bond0.102   ifcfg-enp1s0f1
> > ifcfg-bond0.100  ifcfg-br100      ifcfg-enp5s0
> > ifcfg-bond0.101   ifcfg-enp1s0f0
> > 
> > 'bond0' is my bonded network ports, defined as the Physical Network in 
> > my zone, which actually just happens to have a single port right now on 
> > this particular host, enp5s0 (it can be different ports on different 
> > hosts, my hosts aren't completely homogenous, so keeping it as bond0 
> > means it doesn't matter if it's enp4s0 on some other host). 100 is my 
> > management network, the one used to get everything else up and running, 
> > and is the only one that has a bridge predefined for it, br100. This is 
> > tagged in the KVM traffic label of the details in the management 
> > network. (Which you get to by clicking the 'bond0' in the network). I 
> > then defined 101 as 'public', 102 as 'Guest', and for storage it's 100 
> > again with KVM traffic label br100.
> > 
> > In my Dell managed switch, for the 10 gigabit Ethernet ports connected 
> > to the compute and storage hosts, they look like this:
> > 
> > interface ethernet 1/xg2
> > spanning-tree portfast
> > mtu 9216
> > switchport mode general
> > switchport general pvid 100
> > switchport general acceptable-frame-type tagged-only
> > switchport general allowed vlan add 1000-2000
> > switchport general allowed vlan add 100-104,120,192,200 tagged
> > exit
> > 
> > And of course for the ports that lead off to other switches in untagged 
> > mode, like this port that hooks to my main infrastructure switch from 
> > whence it is routed to the Internet, they look like this:
> > 
> > interface ethernet 1/g4
> > spanning-tree portfast
> > switchport access vlan 101
> > exit
> > 
> > Note that by default all managed switches have all ports defined as 
> > access ports for VLAN 1 and will not accept tagged traffic for any other 
> > VLAN. Now, you can define a port as *BOTH* an access port (i.e., 
> > untagged packets get tagged to a VLAN, outgoing traffic on that VLAN 
> > gets untagged and sent out as plain packets) *and* as a tagged port for 
> > other VLANs in most switches, but it's a hinky way of doing things and 
> > subject to many issues. In general, make a port either an access port 
> > (i.e., untagged, on a single VLAN) or a tagged port (multiple VLANs) or 
> > you are asking for a world of trouble.
> > 
> > 
> > 
> 

Reply via email to