Hi. My need is more complex than that.
I have several set of VM per hypervisor with several VLAN per VM set (data, app, admin, cluster ...). What I plan to do : Having a central server with a bridge. Each hypervisor own two bridges per VM set (for primary and secondary links path in VM through kernel bonding like on ther physical counterpart). Each of thoses bridges are GRE connected to the central bridge with their own GRE key. With this "star" topology, a physical server need exactly 2 hop to reach any other physical servers. I tried for now with just two servers with 802.1Q and GRE with key and it works. Need to try a full star architecture now. ________________________________ De : Dan Wendlandt <[email protected]> À : DarkBls <[email protected]> Cc : discuss <[email protected]> Envoyé le : Mar 29 juin 2010, 1h 53min 49s Objet : Re: [ovs-discuss] Re : Re : ip_gre_mod.ko module On Fri, Jun 25, 2010 at 6:03 AM, DarkBls <[email protected]> wrote: Il fix the problem, thank you for your help. I gave another IP / physical interface for the tunnel. > >I still have some questions about GRE Tunneling. > >For now I have: > >On phosphorus (eth0:192.168.93.201 / eth1:172.16.0.201) >br0 (tap0 + gre0 -> 172.16.0.202) > >On sulphur: (eth0:192.168.93.202 / eth1:172.16.0.202) >br0 (tap0 + gre0 -> 172.16.0.201) > >A VM on phosphorus can ping a Vm on sulphur through the GRE tunnel. > >What if I want to make several br (br1, br2 and br3) on phosphorus and I want >them to be connected through their own GRE tunnel on their sulphur counterpart >(br1, br2 and br3) only ? > Do you want to have multiple bridges on each server just to isolate one set of VMs from another set of VMs? If so, you could just have a single bridge on each server joined by a single tunnel (like your initial example) but place each set of VMs on a different VLAN for isolation. The GRE tunnel will carry the VLAN tagged traffic between the two bridges and the switch at either end will enforce the VLAN isolation. dan > > > > > ________________________________ De : Jesse Gross <[email protected]> > >À : DarkBls <[email protected]> >Cc : Justin Pettit <[email protected]>; [email protected] >Envoyé le : Mar 22 juin 2010, 0h 01min 22s >Objet : Re: [ovs-discuss] Re : ip_gre_mod.ko module > > > >On Mon, Jun 21, 2010 at 3:47 AM, DarkBls <[email protected]> wrote: >>> >> >>ovs-vsctl --db=tcp:192.168.93.201:1977 create interface name=gre0 type=gre >>options:remote_ip=192.168.93.204 >>>>e29c391b-2e07-4a2e-95de-99cf6f23158d >>>>ovs-vsctl --db=tcp:192.168.93.201:1977 create port name=gre0 >>>>interfaces=[e29c391b-2e07-4a2e-95de-99cf6f23158d] >>>>01c689e2-ecab-4ee6-8902-6aba2efe2deb >>>>ovs-vsctl --db=tcp:192.168.93.201:1977 add bridge br0 ports >>>>01c689e2-ecab-4ee6-8902-6aba2efe2deb >> > > >All this looks fine. >> > >>>>I must have missed something since I don't see any port 47 opened on any >>>>server >> > > >GRE runs over IP protocol 47, not TCP or UDP port 47 so you won't see it >listed in netstat -l. > > >Since a flow is being setup that is sending traffic to the GRE port the >configuration should be fine. Can you do a tcpdump on the physical interface >to see if there is GRE traffic? Is it possible that something like iptables >is blocking GRE traffic? > >_______________________________________________ >>discuss mailing list >[email protected] >http://openvswitch.org/mailman/listinfo/discuss_openvswitch.org > >
_______________________________________________ discuss mailing list [email protected] http://openvswitch.org/mailman/listinfo/discuss_openvswitch.org
