Hi again, I have more specific information about this.
Problem seems to be related with the addition of veth to bridge interface. Main Host interface eth0 is joined to a bridge in startup in order to VEs can join its veths to the same subnet. This bridge has the host IP, and it takes its MAC from eth0. But when a VE is started, its veth is joined to the same bridge, and the bridge changes its MAC to veth one !! That's when network problems start.
I have made some tests in other servers, and there, bridge MAC remain as eth0 MAC all the time, it does not change with veth additions.
I don't know why bridge MAC change when a new veth is joined. Any ideas or suggestions? Thanks in advance. Frank Al 19/05/10 18:00, En/na [email protected] ha escrit:
Date: Wed, 19 May 2010 09:34:31 +0200 From: frank<[email protected]> Subject: [Users] network problems: eth0: received packet with own address as source address To: [email protected] Message-ID:<[email protected]> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Hi, we have two nodes with Red Hat 5.4 and OpenVZ, sharing a GFS filesystem. kernel is 2.6.18-164.15.1.el5.028stab068.9PAE We are having problems with VEs network some time ago. We have 40 VEs, some of them with venet interfaces and some with veths. Problem seems to be with veths ones. Sometimes Nodes seems to frozen intermitently, and in the logs we see messages like eth0: received packet with own address as source address .... eth1: received packet with own address as source address ...... We have reviewed network configurations, MAC addresses, and so on, but we don't see anything wrong. For instance, now we are in a situation where we have one VE with two veths running in one node, and if we move it to the other one, the other node starts to froze and a lot of messages like later ones (wrong packets) appear. We are quite worried with this, so any suggestions will be greatly appreciated. Thanks and regards. Frank
-- Aquest missatge ha estat analitzat per MailScanner a la cerca de virus i d'altres continguts perillosos, i es considera que està net. _______________________________________________ Users mailing list [email protected] https://openvz.org/mailman/listinfo/users
