GitHub user TadiosAbebe added a comment to the discussion: Shared network issue 
on advanced zone with security group

The thing is, I couldn't not say the docker chain is dropping the traffic 
because that chain is on all the other hosts and it is not affecting them

One thing i know for sure right now is that, the security group iptables rules 
are interfering with the isolated network traffic. cause i created a new 
service offering without a security group and launching a vm on that security 
group doesn't interrupt existing isolated network traffic on the same host.

On a similar not i have a follow up question.
1. the reason i needed to create a shared network is mainly for public traffic 
for guest vms that need direct public ip to virtual machine without a VR, and i 
am only able to create the shared network on physical network 3(which is the 
bridge that have guest traffic type), will i be having any issue 
architecturally residing public traffic on guest traffic type

2. what issue would i be having if i create different shared network with the 
same vid(by enabling vlan id overlap) for different domains and set different  
start and end ip range. So for example
    - domain1 -> share-net-domain1[vid: 12 gw: 172.19.1.1 netmask: 
255.255.255.0 start_ip: 172.19.1.5 end_ip: 172.19.1.10]
    - domain2 -> share-net-domain1[vid: 12 gw: 172.19.1.1 netmask: 
255.255.255.0 start_ip: 172.19.1.11 end_ip: 172.19.1.15]
    - domain3 -> share-net-domain1[vid: 12 gw: 172.19.1.1 netmask: 
255.255.255.0 start_ip: 172.19.1.16 end_ip: 172.19.1.20]
- from my understanding if i do the above, user on domain1 can only use ip 
172.19.1.5-172.19.1.10 securiy groups will prevent him from stealing and 
manually assigning an ip from domain2. is this correct? 


GitHub link: 
https://github.com/apache/cloudstack/discussions/11955#discussioncomment-14845753

----
This is an automatically sent email for [email protected].
To unsubscribe, please send an email to: [email protected]

Reply via email to