[pve-devel] ceph packages for debian jessie

2015-05-10 Thread Alexandre DERUMIER
Hi, I have build ceph packages for debian jessie for testing http://odisoweb1.odiso.net/ceph-jessie/ (I'm currently working with ceph dev to have official builds). Prelimary benchmarks give an big boost on librbd on jessie (maybe related to libc6) fio-rbd 10jobs 4k rand read on 1osd debi

Re: [pve-devel] [PATCH 0/3] Patch to add forward chain control in pve-firewall

2015-05-10 Thread Flavius Bindea
Hello Dietmar, I'm using the a network configuration based on http://help.ovh.co.uk/Proxmox (need to use SNAT or MASQUERADING, and ip_forwarding is turned on). I'll check also the GROUP option and the regression tests. Regards, Flav 2015-05-11 6:22 GMT+02:00 Dietmar Maurer : >> How do are you

Re: [pve-devel] [PATCH 1/2] Added Forward chain management

2015-05-10 Thread Dietmar Maurer
This patch breaks regression tests for me: # make check test-unconfigured/tests line 3: { to => 'vm100', action => 'ACCEPT' } test failed: missing dport at ../src/PVE/FirewallSimulator.pm line 154, line 3. ___ pve-devel mailing list pve-devel@pve.prox

Re: [pve-devel] [PATCH 0/3] Patch to add forward chain control in pve-firewall

2015-05-10 Thread Dietmar Maurer
> How do are you doing that? Creating a group didn't adds anything in > FORWARD chain. And linux netfilter is forwarding all packets from one > bridge to the other (I am using the host as a "router" for the > bridges). The idea is to create a group with all rules you want to apply, for example: #

Re: [pve-devel] [PATCH 0/3] Patch to add forward chain control in pve-firewall

2015-05-10 Thread Flavius Bindea
How do are you doing that? Creating a group didn't adds anything in FORWARD chain. And linux netfilter is forwarding all packets from one bridge to the other (I am using the host as a "router" for the bridges). 2015-05-10 17:04 GMT+02:00 Dietmar Maurer : >> *guests in vmbr1 are allowed to receive

Re: [pve-devel] [PATCH 0/3] Patch to add forward chain control in pve-firewall

2015-05-10 Thread Dietmar Maurer
> *guests in vmbr1 are allowed to receive external traffic only on port 80 > *guests in vmbr2 are allowed only to receive only traffic on mysql > port from 10.1.1.0/24 > > set FORWARDING policy to REJECT or DROP > add rules: > * chain FORWARD from any to 10.1.1.0/24 port tcp/80 accept > * chain FO

Re: [pve-devel] [PATCH 0/3] Patch to add forward chain control in pve-firewall

2015-05-10 Thread Flavius Bindea
Example: the host has several internal bridges: * vmbr0: x.x.x.x that contains eth0 * vmbr1: 10.1.1.0/24 : this bridge has the "front" VMs * vmbr2: 10.1.2.0/24 : this bridge has the "back" VMs vmbr1 and vmbr2 are not connected on an external switch I use kvm guests. *guests in vmbr1 are allowed

Re: [pve-devel] Following tests on PvE 4.0 Jessie

2015-05-10 Thread Dietmar Maurer
> I noticed that : > * The command clustat does not work We do not use redhat-cluster tools anymore. > * In the dashbord : Datacenter ---> Sammary : displays nothing. known bug > * installing ksm -control- daemon never works, it crashes known bug > I installed glusterfs for nfs, everything wo