alright in regards to the example design post it seems i was wrong.
The traffic to cloudstack goes through the PODID interface so things are
fine there.

On Fri, Dec 16, 2022 at 10:55 AM jordan j <yordan...@gmail.com> wrote:

> And one more in regards to SSVM.
>
> If a new system vm  (console or storage) offering is created is there a
> way to select which one is chosen for the zone operation?
> For example, I created one with a host and storage tags so the SSVM sits
> on specific servers, how can i tell the system to use it?
>
>
> On Fri, Dec 16, 2022 at 8:13 AM jordan j <yordan...@gmail.com> wrote:
>
>> By design, Cloudstack networks and user networks should be fully
>> isolated. The problem is that as the Public network is not present the
>> SSVMs user network interface takes the responsibilities of the public one.
>> Here is an example:
>> - ACS server 10.10.10.10/24
>> - XCP-NG hosts 10.10.11.10 to 10.10.11.19/24 (POD network is
>> 10.10.10.11.0/24)
>> - user networks:
>>     -> 192.168.1.0/24
>>     -> 192.168.2.0/24
>>     -> 192.168.3.0/24
>>
>> When SSVMs are created they take 2 ips, one from the pod network and one
>> from a random network below. For example:
>> - Console SVM - 10.10.11.20/24 and 192.168.2.20 - 192.168.2.20 is the ip
>> used by users to view VM consoles in Cloudstack. The problem is that
>> Cloudstack management networks ( ACS and XCP) are accessed from VPN MGMT
>> where user networks are accessed from VPN USERS. So the system admin cannot
>> view consoles.
>> - Storage SVM - 10.10.11.21/24 and 192.168.2.21 - 192.168.2.21' is the
>> ip used to go to the internet and get ISOs.
>> Both of the issues above are not that important. What is important though
>> is that the 192.168.2.X IPs are used to connect SSVM to ACS and report
>> online state and we don't want to do that OR if we do to be from specific
>> IPs that do not change (which is impossible).
>>
>> An alternative that comes to my mind is somehow make the SVMs pod ip (
>> 10.10.11.0/24) to take the role of the public interface instead but i
>> dont know if that is possible at all.
>>
>> Best regards,
>> Jordan
>>
>> On Thu, Dec 15, 2022 at 6:51 PM Nux <n...@li.nux.ro> wrote:
>>
>>> Hello,
>>>
>>> Then I do not think there is a setting to help you.
>>>
>>> What exactly is the problem with the system VMs getting IPs "randomly"
>>> from multiple networks? Perhaps we can find another solution to help you.
>>>
>>> Cheers
>>> ---
>>> Nux
>>> www.nux.ro
>>>
>>>
>>> On 2022-12-15 16:42, jordan j wrote:
>>>
>>> Thank you Nux,
>>>
>>> My question was related to guest networks.
>>> For management I have already dedicated network range.
>>>
>>> I am doing tests with 5 networks but they may become more later in
>>> production.
>>>
>>> Regards,
>>> Jordan
>>>
>>> On Thu, Dec 15, 2022 at 6:36 PM Nux <n...@li.nux.ro> wrote:
>>>
>>> Hi,
>>>
>>> Yes and no, depends how many network traffic types you have. For example
>>> if you have defined 2 physical networks in the zone, one with traffic type
>>> "management" and another one with type "guest", then your system VM will
>>> use an IP from both.
>>> Usually in the "management" traffic type you can add another "IP range"
>>> and dedicate it to system VMs[1], but you can't do this in the "guest"
>>> network.
>>> So at most you can have a dedicated range for system VMs in the
>>> management network, but not in the guest one..
>>> So what is your situation, how many networks do you have?
>>>
>>>
>>> [1] see screenshot below
>>>
>>>
>>>
>>> ---
>>> Nux
>>> www.nux.ro
>>>
>>>
>>> On 2022-12-15 13:12, jordan j wrote:
>>>
>>> Dear all,
>>>
>>> I have the following setup.
>>>
>>> ACS 4.17.1 + XCP-NG 8.2.1 with network bridge + Advanced network with
>>> security groups.
>>> Because Security Groups are enabled there is no public network in the
>>> zone
>>> so instead system VMs use the user network. The setup has multiple such
>>> networks so SSVMs use one randomly during creation, is it possible to
>>> force
>>> them to use a specific network?
>>>
>>> Regards,
>>> Jordan
>>>
>>>

Reply via email to