Wido - Were you able to reproduce and fix the issue? Thanks.


- Rohit

<https://cloudstack.apache.org>



________________________________
From: Wido den Hollander <w...@widodh.nl>
Sent: Friday, January 19, 2018 10:12:45 PM
To: dev@cloudstack.apache.org
Subject: Re: [4.11] KVM Advanced Networking with SG Problem



On 01/19/2018 02:03 PM, Özhan Rüzgar Karaman wrote:
> Hi Daan;
> Wido or others will write a fix, i am not a developer, i do not have a fix,
> i just only want to report it to make it official thats all :)
>

I'll look into this asap. The Python script should parse these rules
properly and then it should be fixed.

I hope to have a fix this weekend.

Wido

> Thanks
> Özhan
>
> On Fri, Jan 19, 2018 at 3:59 PM, Daan Hoogland <daan.hoogl...@gmail.com>
> wrote:
>
>> This is not a PR but a ticket, Özhan. Do you plan to make a pull request on
>> github with your solution for it?
>>
>> On Fri, Jan 19, 2018 at 1:53 PM, Özhan Rüzgar Karaman <
>> oruzgarkara...@gmail.com> wrote:
>>
>>> Hi Daan;
>>> Wido is the previous PR's owner, he will check it. By the way i have
>>> created a PR for this problem which is below:
>>>
>>> https://issues.apache.org/jira/browse/CLOUDSTACK-10242
>>>
>>> I select its priority as blocker, if its wrong developers will update its
>>> priority.
>>>
>>> Thanks
>>> Özhan
>>>
>>>
>>>
>>> On Fri, Jan 19, 2018 at 3:25 PM, Daan Hoogland <daan.hoogl...@gmail.com>
>>> wrote:
>>>
>>>> Özhan, this is sure to break ipv6. can you make it use another
>> delimiter?
>>>>
>>>> On Fri, Jan 19, 2018 at 1:12 PM, Özhan Rüzgar Karaman <
>>>> oruzgarkara...@gmail.com> wrote:
>>>>
>>>>> Hi Rohit;
>>>>> This is a fresh install of 4.11 rc1 and we have only ipv4 setup on
>> our
>>>> test
>>>>> environment no ipv6 addresses, our VR's are new 4.11 rc1 system vms.
>>> Our
>>>>> workaround is 4 lines of code to convert ";" character to ":" on
>>>>> security_group.py
>>>>> code to make it operational for ipv4 addresses but i am sure it will
>>>> break
>>>>> Wido's "Add support for ipv6 address and subnets" PR. Workaround
>> works
>>>> only
>>>>> for us because we have ipv4 only setup.
>>>>>
>>>>> If Wido could check parse_network_rules function on security_group.py
>>>> then
>>>>> that could be great. After his check and possible code fix i like to
>>> make
>>>>> test again on our environment.
>>>>>
>>>>> @Rohit i will create a JIRA ticket to follow it easily by team.
>>>>>
>>>>> Thanks
>>>>> Özhan
>>>>>
>>>>> On Fri, Jan 19, 2018 at 2:51 PM, Rohit Yadav <
>>> rohit.ya...@shapeblue.com>
>>>>> wrote:
>>>>>
>>>>>> Hi Ozhan,
>>>>>>
>>>>>>
>>>>>> Thanks for sharing.
>>>>>>
>>>>>>
>>>>>> I traced the change to the following PR that changes the delimiter
>>>>>> character to ';' than ":" to support ipv6 addresses:
>>>>>>
>>>>>> https://github.com/apache/cloudstack/pull/2028/files
>>>>>>
>>>>>>
>>>>>> Can you share with the workaround, if applicable send a pull
>> request?
>>>>>>
>>>>>>
>>>>>> Were you still using old 4.9.3 VRs post upgrade, does killing old
>> 4.9
>>>> VRs
>>>>>> help fix the issue? /cc Wido
>>>>>>
>>>>>>
>>>>>> - Rohit
>>>>>>
>>>>>> <https://cloudstack.apache.org>
>>>>>>
>>>>>>
>>>>>>
>>>>>> ________________________________
>>>>>> From: Özhan Rüzgar Karaman <oruzgarkara...@gmail.com>
>>>>>> Sent: Friday, January 19, 2018 3:38:19 PM
>>>>>> To: dev@cloudstack.apache.org
>>>>>> Subject: Re: [4.11] KVM Advanced Networking with SG Problem
>>>>>>
>>>>>> Hi;
>>>>>> We solved the bug there and write a small workaround today, the
>>> problem
>>>>> is
>>>>>> generally from the Java code which calls security_group.py. On
>> 4.9.3
>>>>>> release it was using : character but from 4.11 release delimiter
>>>> changed
>>>>> to
>>>>>> ; character but security_group.py expects : as delimeter so
>>>>>> security_group.py could not parse & send rules to the iptables.
>>>>>>
>>>>>> Afternoon i will create a JIRA ticket and if anyone could fix the
>>>>> delimiter
>>>>>> character or code in the Java code for 4.11 release that would be
>>> great
>>>>>> because without this code Security Groups are not operational for
>>> 4.11.
>>>>>>
>>>>>> Also @Rohit do we need to check test codes for Security Groups?
>>>> Because i
>>>>>> do not understand how this bug passed our testing scenarios.
>>>>>>
>>>>>> Thanks
>>>>>> Özhan
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> On Fri, Jan 19, 2018 at 12:00 PM, Rohit Yadav <
>>>> rohit.ya...@shapeblue.com
>>>>>>
>>>>>> wrote:
>>>>>>
>>>>>>> Can anyone help look into this issue, reproduce it and if it's a
>>>>> genuine
>>>>>>> bug help fix it?
>>>>>>>
>>>>>>> Any takers - Wido, Wei, Mike and others who may be using KVM+SG?
>>>>>>>
>>>>>>>
>>>>>>> - Rohit
>>>>>>>
>>>>>>> <https://cloudstack.apache.org>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> ________________________________
>>>>>>> From: Özhan Rüzgar Karaman <oruzgarkara...@gmail.com>
>>>>>>> Sent: Tuesday, January 16, 2018 9:53:59 PM
>>>>>>> To: dev@cloudstack.apache.org
>>>>>>> Subject: [4.11] KVM Advanced Networking with SG Problem
>>>>>>>
>>>>>>> Hi;
>>>>>>> We made a test with 4.11 rc over Ubuntu16.04 KVM hosts and we
>>> noticed
>>>>>> that
>>>>>>> there is a problem on setting & applying security group changes
>> on
>>>> KVM
>>>>>>> host.
>>>>>>>
>>>>>>> All instances could ping vr and they could access internet but no
>>> one
>>>>>> could
>>>>>>> access to the instances.
>>>>>>>
>>>>>>> I checked iptables rules and i noticed that iptables rules for vm
>>> is
>>>> in
>>>>>> all
>>>>>>> drop state for incoming packages while i gave access to all
>> ingress
>>>> and
>>>>>>> egress tcp/udp traffic ports for that instances. Below are
>> iptables
>>>>>> output
>>>>>>> for selected vm:
>>>>>>>
>>>>>>> Chain i-2-6-VM (1 references)
>>>>>>> target     prot opt source               destination
>>>>>>> DROP       all  --  anywhere             anywhere
>>>>>>>
>>>>>>> Chain i-2-6-VM-eg (1 references)
>>>>>>> target     prot opt source               destination
>>>>>>> RETURN     all  --  anywhere             anywhere
>>>>>>>
>>>>>>> Chain i-2-6-def (2 references)
>>>>>>> target     prot opt source               destination
>>>>>>> ACCEPT     all  --  anywhere             anywhere
>>   state
>>>>>>> RELATED,ESTABLISHED
>>>>>>> ACCEPT     udp  --  anywhere             anywhere
>>>   PHYSDEV
>>>>>> match
>>>>>>> --physdev-in vnet9 --physdev-is-bridged udp spt:bootpc dpt:bootps
>>>>>>> ACCEPT     udp  --  anywhere             anywhere
>>>   PHYSDEV
>>>>>> match
>>>>>>> --physdev-out vnet9 --physdev-is-bridged udp spt:bootps
>> dpt:bootpc
>>>>>>> DROP       all  --  anywhere             anywhere
>>>   PHYSDEV
>>>>>> match
>>>>>>> --physdev-in vnet9 --physdev-is-bridged ! match-set i-2-6-VM src
>>>>>>> RETURN     udp  --  anywhere             anywhere
>>>   PHYSDEV
>>>>>> match
>>>>>>> --physdev-in vnet9 --physdev-is-bridged match-set i-2-6-VM src
>> udp
>>>>>>> dpt:domain
>>>>>>> RETURN     tcp  --  anywhere             anywhere
>>>   PHYSDEV
>>>>>> match
>>>>>>> --physdev-in vnet9 --physdev-is-bridged match-set i-2-6-VM src
>> tcp
>>>>>>> dpt:domain
>>>>>>> i-2-6-VM-eg  all  --  anywhere             anywhere
>>>>   PHYSDEV
>>>>>>> match --physdev-in vnet9 --physdev-is-bridged match-set i-2-6-VM
>>> src
>>>>>>> i-2-6-VM   all  --  anywhere             anywhere
>>>   PHYSDEV
>>>>>> match
>>>>>>> --physdev-out vnet9 --physdev-is-bridged
>>>>>>>
>>>>>>> All management and agent logs could be accessed from:
>>>>>>> http://51.15.199.7/4.11r1_Test_20190116.tgz
>>>>>>>
>>>>>>> Thanks
>>>>>>> Özhan
>>>>>>>
>>>>>>> rohit.ya...@shapeblue.com
>>>>>>> www.shapeblue.com<http://www.shapeblue.com>
>>>>>>> 53 Chandos Place, Covent Garden, London  WC2N 4HSUK
>>>>>>> @shapeblue
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>
>>>>>> rohit.ya...@shapeblue.com
>>>>>> www.shapeblue.com<http://www.shapeblue.com>
>>>>>> 53 Chandos Place, Covent Garden, London  WC2N 4HSUK
>>>>>> @shapeblue
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>
>>>>
>>>>
>>>>
>>>> --
>>>> Daan
>>>>
>>>
>>
>>
>>
>> --
>> Daan
>>
>

rohit.ya...@shapeblue.com 
www.shapeblue.com
53 Chandos Place, Covent Garden, London  WC2N 4HSUK
@shapeblue
  
 

Reply via email to