Whoops sorry about that: nova.conf - http://codepad.org/howA9b1E
The only settings matter for this would be: firewall_driver=nova.virt.firewall.NoopFirewallDriversecurity_group_api=quantumlibvirt_vif_driver=nova.virt.libvirt.vif.LibvirtHybridOVSBridgeDriver On Tue, Oct 29, 2013 at 4:17 PM, Martinx - ジェームズ <thiagocmarti...@gmail.com>wrote: > At nova.conf, firewall_driver is under [DEFAULT]. > > > On 29 October 2013 20:58, Martinx - ジェームズ <thiagocmarti...@gmail.com>wrote: > >> Hello my friend! =) >> >> Yes, firewall_driver is under [securitygroup]. >> >> --- >> root@net-node-1:~# grep -v ^$ >> /etc/neutron/plugins/openvswitch/ovs_neutron_plugin.ini | grep -v ^# >> [ovs] >> tenant_network_type = vxlan >> enable_tunneling = True >> tunnel_type = vxlan >> tunnel_id_ranges = 1:1000 >> integration_bridge = br-int >> tunnel_bridge = br-tun >> local_ip = 10.20.2.52 >> >> [agent] >> polling_interval = 2 >> tunnel_types = vxlan >> >> [securitygroup] >> firewall_driver = >> neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver >> >> [database] >> connection = mysql:// >> neutronUser:pofs4433...@controller-1.yourdomain.com/neutron >> --- >> >> Aaron, your "nova.conf" that you pasted, IS your ovs_neutron_plugin.ini >> ... Can you re-paste it, please? >> >> Tks! >> Thiago >> >> >> On 29 October 2013 19:50, Aaron Rosen <aro...@nicira.com> wrote: >> >>> Hi Martinx, >>> >>> can you confirm that firewall_driver is under the securitygroup section? >>> I can confirm that the following nova.conf and ovs_neutron_plugin.ini work >>> with security groups: >>> >>> nova.conf http://codepad.org/vH3aIs8f >>> ovs_neutron_plugin.ini - http://codepad.org/vH3aIs8f >>> >>> Aaron >>> >>> >>> On Mon, Oct 28, 2013 at 8:41 PM, Martinx - ジェームズ < >>> thiagocmarti...@gmail.com> wrote: >>> >>>> The only way I'm seeing to protect your Havana cloud right now >>>> (topology Per-Tenants Router with Private Networks), is by enabling >>>> FWaaS... >>>> >>>> That's it! FWaaS installed, Tenant network protected. >>>> >>>> I think that there is a bug with Security Groups in Havana / Neutron... >>>> >>>> Comments?! >>>> >>>> Regards, >>>> Thiago >>>> >>>> >>>> On 28 October 2013 22:18, Martinx - ジェームズ <thiagocmarti...@gmail.com>wrote: >>>> >>>>> Guys, >>>>> >>>>> A new test to see that the packages currently did not mach any >>>>> iptables rules at the compute node, completely bypassing "Security >>>>> Groups", >>>>> look: >>>>> >>>>> >>>>> * Instance with ONLY port 80 TCP open: >>>>> >>>>> --- >>>>> root@hypervisor-1:~# *iptables -L neutron-openvswi-i2fa3cfab-a -nv* >>>>> Chain neutron-openvswi-i2fa3cfab-a (1 references) >>>>> pkts bytes target prot opt in out source >>>>> destination >>>>> 0 0 DROP all -- * * 0.0.0.0/0 >>>>> 0.0.0.0/0 state INVALID >>>>> 0 0 RETURN all -- * * 0.0.0.0/0 >>>>> 0.0.0.0/0 state RELATED,ESTABLISHED >>>>> 0 0 RETURN tcp -- * * 0.0.0.0/0 >>>>> 0.0.0.0/0 tcp dpt:80 >>>>> 0 0 RETURN udp -- * * 192.168.50.3 >>>>> 0.0.0.0/0 udp spt:67 dpt:68 >>>>> 0 0 neutron-openvswi-sg-fallback all -- * * >>>>> 0.0.0.0/0 0.0.0.0/0 >>>>> --- >>>>> >>>>> Starting dumping TCP data directly on instance port: >>>>> >>>>> --- >>>>> root@hypervisor-1:~# *tcpdump -ni tap2fa3cfab-a3* >>>>> tcpdump: WARNING: tap2fa3cfab-a3: no IPv4 address assigned >>>>> tcpdump: verbose output suppressed, use -v or -vv for full protocol >>>>> decode >>>>> listening on tap2fa3cfab-a3, link-type EN10MB (Ethernet), capture size >>>>> 65535 bytes >>>>> .... >>>>> --- >>>>> >>>>> ....and trying to connect at its port 22 from the Internet (not >>>>> allowed!!): >>>>> >>>>> --- >>>>> thiago@desktop-1:~$ *telnet 189.8.93.69 22* >>>>> Trying 189.8.93.69... >>>>> Connected to 189.8.93.69. >>>>> Escape character is '^]'. >>>>> SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1.1 >>>>> --- >>>>> >>>>> NOTE: *189.8.93.69* is the 'Floating IP' attached to that Instance >>>>> and *192.168.50.2* is the Instance IP. >>>>> >>>>> --- >>>>> root@hypervisor-1:~# *tcpdump -ni tap2fa3cfab-a3* >>>>> tcpdump: WARNING: tap2fa3cfab-a3: no IPv4 address assigned >>>>> tcpdump: verbose output suppressed, use -v or -vv for full protocol >>>>> decode >>>>> listening on tap2fa3cfab-a3, link-type EN10MB (Ethernet), capture size >>>>> 65535 bytes >>>>> 22:13:40.800122 IP 200.232.113.107.7955 > 192.168.50.2.22: Flags [S], >>>>> seq 2257975349, win 29200, options [mss 1460,sackOK,TS val 52435018 >>>>> ecr 0,nop,wscale 7], length 0 >>>>> 22:13:40.800525 IP 192.168.50.2.22 > 200.232.113.107.7955: Flags [S.], >>>>> seq 2704020835, ack 2257975350, win 14480, options [mss >>>>> 1460,sackOK,TS val 703831 ecr 52435018,nop,wscale 2], length 0 >>>>> 22:13:40.805484 IP 200.232.113.107.7955 > 192.168.50.2.22: Flags [.], >>>>> ack 1, win 229, options [nop,nop,TS val 52435019 ecr 703831], length 0 >>>>> 22:13:40.821804 IP 192.168.50.2.22 > 200.232.113.107.7955: Flags [P.], >>>>> seq 1:42, ack 1, win 3620, options [nop,nop,TS val 703837 ecr 52435019], >>>>> length 41 >>>>> 22:13:40.826058 IP 200.232.113.107.7955 > 192.168.50.2.22: Flags [.], >>>>> ack 42, win 229, options [nop,nop,TS val 52435025 ecr 703837], length 0 >>>>> --- >>>>> >>>>> See?! Security Groups are being ignored. >>>>> >>>>> Please, help! >>>>> >>>>> Thanks! =) >>>>> Thiago >>>>> >>>>> >>>>> On 28 October 2013 22:03, Martinx - ジェームズ >>>>> <thiagocmarti...@gmail.com>wrote: >>>>> >>>>>> Okay, I think I got it... >>>>>> >>>>>> Nova should proxy 'Security Groups' calls to Neutron (and not do it >>>>>> by itself), so, it must have: >>>>>> >>>>>> --- nova.conf --- >>>>>> firewall_driver = nova.virt.firewall.NoopFirewallDriver >>>>>> security_group_api = neutron >>>>>> --- >>>>>> >>>>>> At Neutron OVS Agent (ovs_neutron_plugin.ini), you must set: >>>>>> >>>>>> --- >>>>>> firewall_driver = >>>>>> neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver >>>>>> --- >>>>>> >>>>>> Source: >>>>>> http://docs.openstack.org/havana/install-guide/install/apt/content/install-neutron.install-plugin.ovs.html >>>>>> >>>>>> BUT, it doesn't work. >>>>>> >>>>>> All my Security Groups rules are just being ignored. They are all >>>>>> applied at the Compute Node OVS ports but, no effect at all. >>>>>> >>>>>> Thanks! >>>>>> Thiago >>>>>> >>>>>> >>>>>> On 28 October 2013 21:26, Martinx - ジェームズ >>>>>> <thiagocmarti...@gmail.com>wrote: >>>>>> >>>>>>> Well, >>>>>>> >>>>>>> Now I'm using "firewall_driver = >>>>>>> nova.virt.firewall.NoopFirewallDriver" for both Nova and Neutron (Open >>>>>>> vSwitch Agent) but, Security Groups rules are applied but ignored. >>>>>>> >>>>>>> Tips!? >>>>>>> >>>>>>> Thanks! >>>>>>> Thiago >>>>>>> >>>>>>> >>>>>>> On 28 October 2013 21:13, Martinx - ジェームズ <thiagocmarti...@gmail.com >>>>>>> > wrote: >>>>>>> >>>>>>>> Guys, >>>>>>>> >>>>>>>> I'm back using "libvirt_vif_driver = >>>>>>>> nova.virt.libvirt.vif.LibvirtHybridOVSBridgeDriver" >>>>>>>> (nova-compute.conf) but >>>>>>>> the problem persist for "tenant1". >>>>>>>> >>>>>>>> My nova.conf contains: >>>>>>>> >>>>>>>> --- >>>>>>>> # Network settings >>>>>>>> network_api_class = nova.network.neutronv2.api.API >>>>>>>> neutron_url = http://contrller-1.mydomain.com:9696 >>>>>>>> neutron_auth_strategy = keystone >>>>>>>> neutron_admin_tenant_name = service >>>>>>>> neutron_admin_username = neutron >>>>>>>> neutron_admin_password = 123test123 >>>>>>>> neutron_admin_auth_url = >>>>>>>> http://controller-1.mydomain.com:35357/v2.0 >>>>>>>> >>>>>>>> linuxnet_interface_driver = >>>>>>>> nova.network.linux_net.LinuxOVSInterfaceDriver >>>>>>>> >>>>>>>> # If you want Neutron + Nova Security groups >>>>>>>> firewall_driver = nova.virt.firewall.NoopFirewallDriver >>>>>>>> security_group_api = neutron >>>>>>>> --- >>>>>>>> >>>>>>>> Is that a valid configuration for Havana?! I'm get it from my >>>>>>>> previous Grizzly setup. >>>>>>>> >>>>>>>> Also, I just realized that, there are two places to configure the >>>>>>>> "firewall_driver", first one is located at nova.conf, the second is >>>>>>>> located >>>>>>>> at "ovs_neutron_plugin.ini" under [securitygroups], of course, I >>>>>>>> believe, >>>>>>>> they must "match", I mean, I must be the same for both services, >>>>>>>> right?! >>>>>>>> >>>>>>>> Thanks! >>>>>>>> Thiago >>>>>>>> >>>>>>>> >>>>>>>> On 28 October 2013 20:30, Martinx - ジェームズ < >>>>>>>> thiagocmarti...@gmail.com> wrote: >>>>>>>> >>>>>>>>> Stackers! >>>>>>>>> >>>>>>>>> I'm trying to configure my Security Groups and, I'm seeing that >>>>>>>>> the rules are being applied at the Compute Node OVS ports (iptables / >>>>>>>>> ip6tables) BUT, it does have no effect (or just being ignored?). >>>>>>>>> >>>>>>>>> I'm using Ubuntu 12.04.3 + Havana from Cloud Archive. >>>>>>>>> >>>>>>>>> >>>>>>>>> For example: >>>>>>>>> >>>>>>>>> I have 1 Instance with 1 Floating IP attached to it, open port is: >>>>>>>>> 80. >>>>>>>>> >>>>>>>>> Look: >>>>>>>>> >>>>>>>>> --- >>>>>>>>> root@hypervisor-1:~# iptables -L neutron-openvswi-i9cf07c24-7 -nv >>>>>>>>> Chain neutron-openvswi-i9cf07c24-7 (1 references) >>>>>>>>> pkts bytes target prot opt in out source >>>>>>>>> destination >>>>>>>>> 0 0 DROP all -- * * 0.0.0.0/0 >>>>>>>>> 0.0.0.0/0 state INVALID >>>>>>>>> 0 0 RETURN all -- * * 0.0.0.0/0 >>>>>>>>> 0.0.0.0/0 state RELATED,ESTABLISHED >>>>>>>>> 0 0 RETURN tcp -- * * 0.0.0.0/0 >>>>>>>>> 0.0.0.0/0 tcp dpt:80 >>>>>>>>> 0 0 RETURN udp -- * * 192.168.50.3 >>>>>>>>> 0.0.0.0/0 udp spt:67 dpt:68 >>>>>>>>> 0 0 neutron-openvswi-sg-fallback all -- * * >>>>>>>>> 0.0.0.0/0 0.0.0.0/0 >>>>>>>>> --- >>>>>>>>> >>>>>>>>> >>>>>>>>> The problem is that the respective Instance still answers SSH to >>>>>>>>> the Internet. I mean, ALL ports are OPEN!! Regardless of what I typed >>>>>>>>> at >>>>>>>>> its Security Groups. >>>>>>>>> >>>>>>>>> I created one "Security Group", called "web", only with TCP port >>>>>>>>> 80 on it, nothing more, nothing less. This Instance doesn't belong to >>>>>>>>> the >>>>>>>>> "default" Security Group", only "web". >>>>>>>>> >>>>>>>>> Recently I've changed the *libvirt_vif_driver* from * >>>>>>>>> nova.virt.libvirt.vif.LibvirtHybridOVSBridgeDriver* to * >>>>>>>>> nova.virt.libvirt.vif.LibvirtOpenVswitchDriver*, maybe it is the >>>>>>>>> cause?! >>>>>>>>> >>>>>>>>> Any tips!? >>>>>>>>> >>>>>>>>> Thanks! >>>>>>>>> Thiago >>>>>>>>> >>>>>>>> >>>>>>>> >>>>>>> >>>>>> >>>>> >>>> >>>> _______________________________________________ >>>> Mailing list: >>>> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack >>>> Post to : openstack@lists.openstack.org >>>> Unsubscribe : >>>> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack >>>> >>>> >>> >> >
_______________________________________________ Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack Post to : openstack@lists.openstack.org Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack