Hi,

We want direct routing LB and LVS supports it. So we were trying that option. Can we add some rule in neutron-openvswi chain of the LB VM on compute node to prevent the drop of these packets? If yes please guide us on how can we configure such a rule. As i can see a drop rule in the chain which drops anything other than packet with IP and MAC of the LB VM. But our packet has a different IP. The rule addition would be required at the backend server VM neutron-openvswi chain as well?

Thanks,

Priyanka

On Wednesday 22 June 2016 08:16 PM, Brian Haley wrote:
On 06/22/2016 03:42 AM, Priyanka wrote:
Hi,

We have a Openstack Juno setup with 1 controller+neutron node and 3 compute nodes. 1 VM (LB) has ipvsadm installed and two VMs act as back end server.

On the server with ipvsadm I have eth0:0 IP as 192.168.1.21 which acts as application IP. The ipvsadm uses round robin scheme. This is done using commands
as below:

sudo ipvsadm -A -t 192.168.1.21:6000 -s rr
sudo ipvsadm -a -t 192.168.1.21:6000 -r 192.168.1.77:6000 -g
sudo ipvsadm -a -t 192.168.1.21:6000 -r 192.168.1.79:6000 -g

where 192.168.1.77 and 192.168.1.79 are back end server VM IP.

The problem is that the packets go out of the LB VM but never reach the back end
server.

You had asked a similar question last week, and I had asked why you just weren't using Neutron LBaaS to do this? Seems you are trying to implement your own load-balancer inside a tenant VM.

Also, Juno is very old, using a newer release would give you access to Octavia (LBaaS v2) that has more advanced features.

In the tcpdumps on various interfaces show that the packet reach till qbr of the LB VM but donot reach the qvo interface of LB VM. Are there any rules that get applied here which block these packets. The packets from the client VM are sent to back end server by the LB VM by changing the destination MAC of the packets. The packets that leave LB VM to reach back end VM have source as the client VM IP and destination IP as 192.168.1.21 (application IP) and the src MAC of LB VM and dst MAC of backend server VM. Is this the reason for the packets to be blocked. Is there any way to allow these packets to flow to the back end server?

There are anti-spoofing rules installed that are most likely causing the packets to get dropped.

-Brian


_______________________________________________
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to     : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack

Reply via email to