Re: [ovs-discuss] Monitoring the contents of group table

2018-09-24 Thread pierre.cregut

Here is an example:

    ovs-ofctl -O Openflow14 monitor --unixctl /tmp/sk br0

    ovs-appctl -t /tmp/sk ofctl/send 
"05180018000300038002"

    ovs-appctl -t /tmp/sk ofctl/send "051c0012000a00080001"

    ovs-ofctl -O Openflow15 add-group br0 
group_id=2238,type=all,bucket=output:3
    ovs-ofctl -O Openflow15 insert-buckets br0 
group_id=2238,command_bucket_id:last,bucket=bucket_id:2,output:2


The following will work and the actions will correctly appear in the 
monitor window.


    ovs-ofctl -O Openflow15 monitor --unixctl /tmp/sk br0

    ovs-appctl -t /tmp/sk ofctl/send 
"06180018000300038002"

    ovs-appctl -t /tmp/sk ofctl/send "061c0012000a00080001"


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
discuss mailing list
disc...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-discuss


Re: [ovs-discuss] OVN - MTU path discovery

2018-09-24 Thread Daniel Alvarez Sanchez
Resending this email as I can't see it in [0] for some reason.
[0] https://mail.openvswitch.org/pipermail/ovs-dev/2018-September/




On Fri, Sep 21, 2018 at 2:36 PM Daniel Alvarez Sanchez 
wrote:

> Hi folks,
>
> After talking to Numan and reading log from IRC meeting yesterday,
> looks like there's some confusion around the issue.
>
> jpettit | I should look at the initial bug report again, but is it not
> sufficient to configure a smaller MTU within the VM?
>
> Imagine the case where some host from the external network (MTU 1500)
> sends 1000B UDP packets to the VM (MTU 200). When OVN attempts to deliver
> the packet to the VM it won't fit and the application running there will
> never
> get the packet.
>
> With reference implementation (or if namespaces were used as Han suggests
> that this is what NSX does), the packet would be handled by the IP stack on
> the gateway node. An ICMP need-to-frag would be sent back to the sender
> and - if they're not blocked by some firewall - the IP stack on the sender
> node
> will fragment this and subsequent packets to fit the MTU on the receiver.
>
> Also, generally we don't want to configure small MTUs on the VMs for
> performance as it would also impact on east/west traffic where
> Jumbo frames appear to work.
>
> Thanks a lot for bringing this up on the meeting!
> Daniel
>
> On Mon, Aug 13, 2018 at 5:23 PM Miguel Angel Ajo Pelayo <
> majop...@redhat.com> wrote:
> >
> > Yeah, later on we have found that it was, again, more important that we
> think.
> >
> > For example, there are still cases not covered by TCP MSS negotiation (or
> > for UDP/other protocols):
> >
> > Imagine you have two clouds, both with an internal MTU (let’s imagine
> > MTUb on cloud B, and MTUa on cloud A), and an external transit
> > network with a 1500 MTU (MTUc).
> >
> > MTUb > MTUc. And MTUb > MTUc
> >
> > Also, imagine that VMa in cloud A, has a floating IP (DNAT_SNAT NAT),
> > and VMb in cloud B has also a floating IP.
> >
> > VMa tries to establish  connection to VMb FIP, and announces
> > MSSa = MTUa - (IP + TCP overhead), VMb ACKs the TCP SYN request
> > with  MSSb = MTUb - (IP - TCP overhead).
> >
> > So the agreement will be min(MSSa,MSSb) , but… the transit network MSSc
> > will always be smaller , min(MSSa, MSSb) < MSSc.
> >
> > In ML2/OVS deployments, those big packets will get fragmented at the
> router
> > edge, and a notification ICMP will be sent to the sender of the packets
> to notify
> > fragmenting in source is necessary.
> >
> >
> > I guess we can also replicate this with 2 VMs on the same cloud with
> MSSa > MSSb
> > where they try to talk via floating IP to each other.
> >
> >
> > So going back to the thing, I guess we need to implement some OpenFlow
> extension
> > to match packets per size, redirecting those to an slow path
> (ovn-controller) so we can
> > Fragment/and icmp back the source for source fragmentation?
> >
> > Any advise on what’s the procedure here (OpenFlow land, kernel wise,
> even in terms
> > of our source code and design so we could implement this) ?
> >
> >
> > Best regards,
> > Miguel Ángel.
> >
> >
> > On 3 August 2018 at 17:41:05, Daniel Alvarez Sanchez (
> dalva...@redhat.com) wrote:
> >
> > Maybe ICMP is not that critical but seems like not having the ICMP 'need
> to frag' on UDP communications could break some applications that are aware
> of this to reduce the size of the packets? I wonder...
> >
> > Thanks!
> > Daniel
> >
> > On Fri, Aug 3, 2018 at 5:20 PM Miguel Angel Ajo Pelayo <
> majop...@redhat.com> wrote:
> >>
> >>
> >> We didn’t understand why a MTU missmatch in one direction worked (N/S),
> >> but in other direction (S/N) didn’t work… and we found that that it’s
> actually
> >> working (at least for TCP, via MSS negotiation), we had a
> missconfiguration
> >> In one of the physical interfaces.
> >>
> >> So, in the case of TCP we are fine. TCP is smart enough to negotiate
> properly.
> >>
> >> Other protocols like ICMP with the DF flag, or UDP… would not get the
> ICMP
> >> that notifies the sender about the MTU miss-match.
> >>
> >> I suspect that the most common cases are covered, and that it’s not
> worth
> >> pursuing what I was asking for at least with a high priority, but I’d
> like to hear
> >> opinions.
> >>
> >>
> >> Best regards,
> >> Miguel Ángel.
> >>
> >> On 3 August 2018 at 08:11:01, Miguel Angel Ajo Pelayo (
> majop...@redhat.com) wrote:
> >>
> >> I’m going to capture some example traffic and try to figure out which
> RFCs
> >> talk about that behaviour so we can come up with a consistent solution.
> >> I can document it in the project.
> >>
> >> To be honest, when I looked at it, I was expecting that the router would
> >> fragment, and I ended up discovering that we had this path MTU discovery
> >> mechanism in play for IPv4 .
> >>
> >> On 2 August 2018 at 22:21:28, Ben Pfaff (b...@ovn.org) wrote:
> >>
> >> On Thu, Aug 02, 2018 at 01:19:57PM -0700, Ben Pfaff wrote:
> >> > On Wed, Aug 01, 2018 at 10:46:07AM -0400, M

[ovs-discuss] [OVN][NAT] About stateless processing nat type dnat_and_snat

2018-09-24 Thread 探长0279
I have an idea:
For a one-to-one floating IP, the gateway's processing may not need to care 
about the session, let's say we do this:
When the client accesses the VM through an external IP, only a simple 
stateless DNAT is needed, and a simple stateless SNAT is required for the 
response.
When a VM accesses a public network, only a simple stateless SNAT is 
required at the gateway exit, and a simple stateless DNAT is required for the 
response.

For many-to-one SNATs and LBs with port, stateful processing is also required.

I want to ask everyone for suggestion. Is there any problem with this idea?
Thank you!





temp4cj.png
Description: Binary data
___
discuss mailing list
disc...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-discuss