Re: Allow all external traffic (any tcp/udp/icmp) to virtual hosts

2013-11-29 Thread Magnus Janson
Oh I see, I only set egress_default_policy so that doesn't apply to
ingress. But still, the initial issue remains. Is there a way for me to
allow incoming traffic without specifying ingress rules? Disabling security
groups seems to set ingress to reject all incoming traffic (not preceded by
outgoing communication first ofc).

Sorry for the spam.

/Magnus


2013/11/29 Magnus Janson 

> With security groups enabled, I need to set ingress rules to allow
> external traffic to my virtual hosts.
>
> With security groups disabled, I can't allow any external traffic to my
> virtual hosts.
>
> Before creating the zone, I performed this:
> UPDATE `cloud`.`network_offerings` SET `egress_default_policy`=1
>
> Even though the default policy is changed, from reject to allow, I'm still
> only able to get external traffic to my virtual hosts with adding ingress
> rules.
>
> Seems like I have no other option then using security groups, and adding
> ingress rules to every user. Doesn't seem like there's any global ingress
> rules which I could apply to all users.
>
> Maybe this is the way it was designed? I'm looking for an alternative, as
> I don't want to specify the ingress rules for each account.
>
> Hopefully this makes my issue a bit easier to understand.
>
> /Magnus
>
>
> 2013/11/29 Magnus Janson 
>
>> Hi Geoff,
>>
>> Thank you for your reply.
>>
>> I am using a guest gateway, and the gateway IP maps to a physical
>> router/firewall.
>>
>> Initially I was using DefaultSharedNetworkOfferingWithSGService. But that
>> required me to set egress rules for each user to allow all traffic for that
>> users vm instances. However, after setting the egress rules the traffic to
>> the vm instances worked great.
>>
>> As I have plenty of users, I would want to skip this step. So I recreated
>> the zone, with DefaultSharedNetworkOffering instead.
>>
>> My understanding was that if I disabled security groups, they wouldn't
>> block the incoming traffic to my virtual hosts anymore. However, it seems
>> that I'm now stuck with a default policy to block all incoming connections
>> and I don't have any possibility to allow incoming connections as I
>> disabled (removed) the security groups feature.
>>
>> The issue here seems to be that cloudstack by default rejects all
>> incoming traffic, and I can't figure out how to change that behaviours.
>>
>> /Magnus
>>
>>
>> 2013/11/28 Geoff Higginbottom 
>>
>>> Magnus,
>>>
>>> A Shared Network does not provide Source NAT, so therefore does not act
>>> as the Gateway.  When you created the network, you would have specified a
>>> 'Guest Gateway' IP, this IP needs to map to a Physical Router/Firewall
>>> which will provide the Routing/Firewall functionality.
>>>
>>> As the 'Default Shared Network' offering only provides DHCP, DNS & User
>>> Data, none of the Firewall, Egress Rules VPN, LB features etc will be
>>> available to you.
>>>
>>> Regards
>>>
>>> Geoff Higginbottom
>>>
>>> D: +44 20 3603 0542 | S: +44 20 3603 0540 | M: +447968161581
>>>
>>> geoff.higginbot...@shapeblue.com
>>>
>>> -Original Message-
>>> From: Magnus Janson [mailto:mag...@fnutt.us]
>>> Sent: 28 November 2013 16:57
>>> To: users@cloudstack.apache.org
>>> Subject: Re: Allow all external traffic (any tcp/udp/icmp) to virtual
>>> hosts
>>>
>>> I'm not using a firewall provider, so my initial question remains.
>>>
>>> /Magnus
>>>
>>>
>>> 2013/11/28 Magnus Janson 
>>>
>>> > Oh, seems like the answer is found here:
>>> > https://support.getcloudservices.com/entries/21993512-CloudStack-Enabl
>>> > e-External-Access
>>> >
>>> > I'll try this and get back here in case I run into any trouble I can't
>>> > solve.
>>> >
>>> > /Magnus
>>> >
>>> >
>>> > 2013/11/28 Magnus Janson 
>>> >
>>> >> Hi,
>>> >>
>>> >> How do i allow all external traffic (any tcp/udp/icmp) to my virtual
>>> >> hosts?
>>> >>
>>> >> I'm using DefaultSharedNetworkOffering in a BASIC network.
>>> >>
>>> >> Security group and provider is not being used.
>>> >>
>>> >> So far, I've tried to change the egress_default_policy. I cou

Re: Allow all external traffic (any tcp/udp/icmp) to virtual hosts

2013-11-29 Thread Magnus Janson
With security groups enabled, I need to set ingress rules to allow external
traffic to my virtual hosts.

With security groups disabled, I can't allow any external traffic to my
virtual hosts.

Before creating the zone, I performed this:
UPDATE `cloud`.`network_offerings` SET `egress_default_policy`=1

Even though the default policy is changed, from reject to allow, I'm still
only able to get external traffic to my virtual hosts with adding ingress
rules.

Seems like I have no other option then using security groups, and adding
ingress rules to every user. Doesn't seem like there's any global ingress
rules which I could apply to all users.

Maybe this is the way it was designed? I'm looking for an alternative, as I
don't want to specify the ingress rules for each account.

Hopefully this makes my issue a bit easier to understand.

/Magnus


2013/11/29 Magnus Janson 

> Hi Geoff,
>
> Thank you for your reply.
>
> I am using a guest gateway, and the gateway IP maps to a physical
> router/firewall.
>
> Initially I was using DefaultSharedNetworkOfferingWithSGService. But that
> required me to set egress rules for each user to allow all traffic for that
> users vm instances. However, after setting the egress rules the traffic to
> the vm instances worked great.
>
> As I have plenty of users, I would want to skip this step. So I recreated
> the zone, with DefaultSharedNetworkOffering instead.
>
> My understanding was that if I disabled security groups, they wouldn't
> block the incoming traffic to my virtual hosts anymore. However, it seems
> that I'm now stuck with a default policy to block all incoming connections
> and I don't have any possibility to allow incoming connections as I
> disabled (removed) the security groups feature.
>
> The issue here seems to be that cloudstack by default rejects all incoming
> traffic, and I can't figure out how to change that behaviours.
>
> /Magnus
>
>
> 2013/11/28 Geoff Higginbottom 
>
>> Magnus,
>>
>> A Shared Network does not provide Source NAT, so therefore does not act
>> as the Gateway.  When you created the network, you would have specified a
>> 'Guest Gateway' IP, this IP needs to map to a Physical Router/Firewall
>> which will provide the Routing/Firewall functionality.
>>
>> As the 'Default Shared Network' offering only provides DHCP, DNS & User
>> Data, none of the Firewall, Egress Rules VPN, LB features etc will be
>> available to you.
>>
>> Regards
>>
>> Geoff Higginbottom
>>
>> D: +44 20 3603 0542 | S: +44 20 3603 0540 | M: +447968161581
>>
>> geoff.higginbot...@shapeblue.com
>>
>> -Original Message-
>> From: Magnus Janson [mailto:mag...@fnutt.us]
>> Sent: 28 November 2013 16:57
>> To: users@cloudstack.apache.org
>> Subject: Re: Allow all external traffic (any tcp/udp/icmp) to virtual
>> hosts
>>
>> I'm not using a firewall provider, so my initial question remains.
>>
>> /Magnus
>>
>>
>> 2013/11/28 Magnus Janson 
>>
>> > Oh, seems like the answer is found here:
>> > https://support.getcloudservices.com/entries/21993512-CloudStack-Enabl
>> > e-External-Access
>> >
>> > I'll try this and get back here in case I run into any trouble I can't
>> > solve.
>> >
>> > /Magnus
>> >
>> >
>> > 2013/11/28 Magnus Janson 
>> >
>> >> Hi,
>> >>
>> >> How do i allow all external traffic (any tcp/udp/icmp) to my virtual
>> >> hosts?
>> >>
>> >> I'm using DefaultSharedNetworkOffering in a BASIC network.
>> >>
>> >> Security group and provider is not being used.
>> >>
>> >> So far, I've tried to change the egress_default_policy. I couldn't
>> >> find any way to perform this through the UI so I did it manually in
>> >> the database and restarted the network:
>> >> UPDATE `cloud`.`network_offerings` SET `egress_default_policy`=1
>> >> WHERE `name`='DefaultSharedNetworkOffering';
>> >>
>> >> Still, it seems that all incoming traffic is rejected.
>> >>
>> >> Any pointers on how to achieve this would be highly appreciated.
>> >>
>> >> Sincerely,
>> >> Magnus
>> >>
>> >
>> >
>> This email and any attachments to it may be confidential and are intended
>> solely for the use of the individual to whom it is addressed. Any views or
>> opinions expressed are solely those of the author and do not necessarily
>> represent those of Shape Blue Ltd or related companies. If you are not the
>> intended recipient of this email, you must neither take any action based
>> upon its contents, nor copy or show it to anyone. Please contact the sender
>> if you believe you have received this email in error. Shape Blue Ltd is a
>> company incorporated in England & Wales. ShapeBlue Services India LLP is a
>> company incorporated in India and is operated under license from Shape Blue
>> Ltd. Shape Blue Brasil Consultoria Ltda is a company incorporated in Brasil
>> and is operated under license from Shape Blue Ltd. ShapeBlue is a
>> registered trademark.
>>
>
>


Re: Allow all external traffic (any tcp/udp/icmp) to virtual hosts

2013-11-29 Thread Magnus Janson
Hi Geoff,

Thank you for your reply.

I am using a guest gateway, and the gateway IP maps to a physical
router/firewall.

Initially I was using DefaultSharedNetworkOfferingWithSGService. But that
required me to set egress rules for each user to allow all traffic for that
users vm instances. However, after setting the egress rules the traffic to
the vm instances worked great.

As I have plenty of users, I would want to skip this step. So I recreated
the zone, with DefaultSharedNetworkOffering instead.

My understanding was that if I disabled security groups, they wouldn't
block the incoming traffic to my virtual hosts anymore. However, it seems
that I'm now stuck with a default policy to block all incoming connections
and I don't have any possibility to allow incoming connections as I
disabled (removed) the security groups feature.

The issue here seems to be that cloudstack by default rejects all incoming
traffic, and I can't figure out how to change that behaviours.

/Magnus


2013/11/28 Geoff Higginbottom 

> Magnus,
>
> A Shared Network does not provide Source NAT, so therefore does not act as
> the Gateway.  When you created the network, you would have specified a
> 'Guest Gateway' IP, this IP needs to map to a Physical Router/Firewall
> which will provide the Routing/Firewall functionality.
>
> As the 'Default Shared Network' offering only provides DHCP, DNS & User
> Data, none of the Firewall, Egress Rules VPN, LB features etc will be
> available to you.
>
> Regards
>
> Geoff Higginbottom
>
> D: +44 20 3603 0542 | S: +44 20 3603 0540 | M: +447968161581
>
> geoff.higginbot...@shapeblue.com
>
> -Original Message-
> From: Magnus Janson [mailto:mag...@fnutt.us]
> Sent: 28 November 2013 16:57
> To: users@cloudstack.apache.org
> Subject: Re: Allow all external traffic (any tcp/udp/icmp) to virtual hosts
>
> I'm not using a firewall provider, so my initial question remains.
>
> /Magnus
>
>
> 2013/11/28 Magnus Janson 
>
> > Oh, seems like the answer is found here:
> > https://support.getcloudservices.com/entries/21993512-CloudStack-Enabl
> > e-External-Access
> >
> > I'll try this and get back here in case I run into any trouble I can't
> > solve.
> >
> > /Magnus
> >
> >
> > 2013/11/28 Magnus Janson 
> >
> >> Hi,
> >>
> >> How do i allow all external traffic (any tcp/udp/icmp) to my virtual
> >> hosts?
> >>
> >> I'm using DefaultSharedNetworkOffering in a BASIC network.
> >>
> >> Security group and provider is not being used.
> >>
> >> So far, I've tried to change the egress_default_policy. I couldn't
> >> find any way to perform this through the UI so I did it manually in
> >> the database and restarted the network:
> >> UPDATE `cloud`.`network_offerings` SET `egress_default_policy`=1
> >> WHERE `name`='DefaultSharedNetworkOffering';
> >>
> >> Still, it seems that all incoming traffic is rejected.
> >>
> >> Any pointers on how to achieve this would be highly appreciated.
> >>
> >> Sincerely,
> >> Magnus
> >>
> >
> >
> This email and any attachments to it may be confidential and are intended
> solely for the use of the individual to whom it is addressed. Any views or
> opinions expressed are solely those of the author and do not necessarily
> represent those of Shape Blue Ltd or related companies. If you are not the
> intended recipient of this email, you must neither take any action based
> upon its contents, nor copy or show it to anyone. Please contact the sender
> if you believe you have received this email in error. Shape Blue Ltd is a
> company incorporated in England & Wales. ShapeBlue Services India LLP is a
> company incorporated in India and is operated under license from Shape Blue
> Ltd. Shape Blue Brasil Consultoria Ltda is a company incorporated in Brasil
> and is operated under license from Shape Blue Ltd. ShapeBlue is a
> registered trademark.
>


Re: SSVM won't start

2013-11-29 Thread Magnus Janson
Hi Sebastian,

It sounds like you forgot to download the vhd-util. Either that, or you
have not placed it at the right location. It's also possible that you must
set it to executable (chmod +x vhd-util).

http://cloudstack.apache.org/docs/en-US/Apache_CloudStack/4.2.0/html/Installation_Guide/management-server-install-flow.html

/Magnus


2013/11/29 Sebastian Trampler 

> Hello,
>
> we have problems starting the ssvm.
>
> First of all some facts about our actual test system.
> Cloudstack is installed on Ubuntu 12.04. Primary and secondary storage are
> nfs shares hosted on Cloudstack server.
> Host is a XenServer 6.2.
>
> While starting the ssvm we get the following error messages:
>
> 2013-11-29 08:38:10,103 DEBUG [storage.volume.VolumeServiceImpl]
> (consoleproxy-1:null) Acquire lock on VMTemplateStoragePool 2280 with
> timeout 3600 seconds
> 2013-11-29 08:38:10,107 INFO  [storage.volume.VolumeServiceImpl]
> (consoleproxy-1:null) lock is acquired for VMTemplateStoragePool 2280
> 2013-11-29 08:38:10,109 DEBUG [cloud.storage.VolumeManagerImpl]
> (secstorage-1:null) Checking if we need to prepare 1 volumes for
> VM[SecondaryStorageVm|s-1159-VM]
> 2013-11-29 08:38:10,135 DEBUG [storage.motion.AncientDataMotionStrategy]
> (consoleproxy-1:null) copyAsync inspecting src type TEMPLATE copyAsync
> inspecting dest type TEMPLATE
> 2013-11-29 08:38:10,137 DEBUG [storage.image.TemplateDataFactoryImpl]
> (secstorage-1:null) template 1 is already in store:2, type:Image
> 2013-11-29 08:38:10,171 DEBUG [storage.image.TemplateDataFactoryImpl]
> (secstorage-1:null) template 1 is already in store:2, type:Primary
> 2013-11-29 08:38:10,174 DEBUG [storage.volume.VolumeServiceImpl]
> (secstorage-1:null) Found template routing-1 in storage pool 2 with
> VMTemplateStoragePool id: 2280
> 2013-11-29 08:38:10,185 DEBUG [agent.transport.Request]
> (consoleproxy-1:null) Seq 1-1431371787: Sending  { Cmd , MgmtId:
> 217970788423578, via: 1, Ver: v1, Flags: 100111, [{"org.apache.cloudstack.
> storage.command.CopyCommand":{"srcTO":{"org.apache.cloudstack.storage.to.
> TemplateObjectTO":{"path":"template/tmpl/1/1/","origUrl":"
> http://download.cloud.com/templates/4.2/systemvmtemplate-2013-07-12-
> master-xen.vhd.bz2","uuid":"82cd934b-4d43-11e3-8eab-
> c63e476a579a","id":1,"format":"VHD","accountId":1,"checksum":"
> fb1b6e032a160d86f2c28feb5add6d83","hvm":false,"displayText":"SystemVM
> Template (XenServer)","imageDataStore":{"com.cloud.agent.api.to.
> NfsTO":{"_url":"nfs://172.16.51.47:/export/secondary2","_
> role":"Image"}},"name":"routing-1","hypervisorType":"
> XenServer"}},"destTO":{"org.apache.cloudstack.storage.to.
> TemplateObjectTO":{"origUrl":"http://download.cloud.com/templates/4.2/
> systemvmtemplate-2013-07-12-master-xen.vhd.bz2","uuid":"
> 82cd934b-4d43-11e3-8eab-c63e476a579a","id":1,"format":
> "VHD","accountId":1,"checksum":"fb1b6e032a160d86f2c28feb5add6d
> 83","hvm":false,"displayText":"SystemVM Template
> (XenServer)","imageDataStore":{"org.apache.cloudstack.
> storage.to.PrimaryDataStoreTO":{"uuid":"fefdf148-d326-3fa0-
> 9aca-3f8956fbd8f7","id":2,"poolType":"NetworkFilesystem",
> "host":"172.16.51.47","path":"/export/primary2","port":2049}
> },"name":"routing-1","hypervisorType":"XenServer"}},
> "executeInSequence":true,"wait":10800}}] }
> 2013-11-29 08:38:10,187 DEBUG [agent.transport.Request]
> (consoleproxy-1:null) Seq 1-1431371787: Executing:  { Cmd , MgmtId:
> 217970788423578, via: 1, Ver: v1, Flags: 100111, [{"org.apache.cloudstack.
> storage.command.CopyCommand":{"srcTO":{"org.apache.cloudstack.storage.to.
> TemplateObjectTO":{"path":"template/tmpl/1/1/","origUrl":"
> http://download.cloud.com/templates/4.2/systemvmtemplate-2013-07-12-
> master-xen.vhd.bz2","uuid":"82cd934b-4d43-11e3-8eab-
> c63e476a579a","id":1,"format":"VHD","accountId":1,"checksum":"
> fb1b6e032a160d86f2c28feb5add6d83","hvm":false,"displayText":"SystemVM
> Template (XenServer)","imageDataStore":{"com.cloud.agent.api.to.
> NfsTO":{"_url":"nfs://172.16.51.47:/export/secondary2","_
> role":"Image"}},"name":"routing-1","hypervisorType":"
> XenServer"}},"destTO":{"org.apache.cloudstack.storage.to.
> TemplateObjectTO":{"origUrl":"http://download.cloud.com/templates/4.2/
> systemvmtemplate-2013-07-12-master-xen.vhd.bz2","uuid":"
> 82cd934b-4d43-11e3-8eab-c63e476a579a","id":1,"format":
> "VHD","accountId":1,"checksum":"fb1b6e032a160d86f2c28feb5add6d
> 83","hvm":false,"displayText":"SystemVM Template
> (XenServer)","imageDataStore":{"org.apache.cloudstack.
> storage.to.PrimaryDataStoreTO":{"uuid":"fefdf148-d326-3fa0-
> 9aca-3f8956fbd8f7","id":2,"poolType":"NetworkFilesystem",
> "host":"172.16.51.47","path":"/export/primary2","port":2049}
> },"name":"routing-1","hypervisorType":"XenServer"}},
> "executeInSequence":true,"wait":10800}}] }
> 2013-11-29 08:38:10,188 DEBUG [agent.manager.DirectAgentAttache]
> (DirectAgent-1:null) Seq 1-1431371787: Executing request
> 2013-11-29 08:38:10,190 DEBUG [storage.volume.VolumeServiceImpl]
> (secstorage-1:null) Acquir

Re: Allow all external traffic (any tcp/udp/icmp) to virtual hosts

2013-11-28 Thread Magnus Janson
I'm not using a firewall provider, so my initial question remains.

/Magnus


2013/11/28 Magnus Janson 

> Oh, seems like the answer is found here:
> https://support.getcloudservices.com/entries/21993512-CloudStack-Enable-External-Access
>
> I'll try this and get back here in case I run into any trouble I can't
> solve.
>
> /Magnus
>
>
> 2013/11/28 Magnus Janson 
>
>> Hi,
>>
>> How do i allow all external traffic (any tcp/udp/icmp) to my virtual
>> hosts?
>>
>> I'm using DefaultSharedNetworkOffering in a BASIC network.
>>
>> Security group and provider is not being used.
>>
>> So far, I've tried to change the egress_default_policy. I couldn't find
>> any way to perform this through the UI so I did it manually in the database
>> and restarted the network:
>> UPDATE `cloud`.`network_offerings` SET `egress_default_policy`=1 WHERE
>> `name`='DefaultSharedNetworkOffering';
>>
>> Still, it seems that all incoming traffic is rejected.
>>
>> Any pointers on how to achieve this would be highly appreciated.
>>
>> Sincerely,
>> Magnus
>>
>
>


Re: Allow all external traffic (any tcp/udp/icmp) to virtual hosts

2013-11-28 Thread Magnus Janson
Oh, seems like the answer is found here:
https://support.getcloudservices.com/entries/21993512-CloudStack-Enable-External-Access

I'll try this and get back here in case I run into any trouble I can't
solve.

/Magnus


2013/11/28 Magnus Janson 

> Hi,
>
> How do i allow all external traffic (any tcp/udp/icmp) to my virtual hosts?
>
> I'm using DefaultSharedNetworkOffering in a BASIC network.
>
> Security group and provider is not being used.
>
> So far, I've tried to change the egress_default_policy. I couldn't find
> any way to perform this through the UI so I did it manually in the database
> and restarted the network:
> UPDATE `cloud`.`network_offerings` SET `egress_default_policy`=1 WHERE
> `name`='DefaultSharedNetworkOffering';
>
> Still, it seems that all incoming traffic is rejected.
>
> Any pointers on how to achieve this would be highly appreciated.
>
> Sincerely,
> Magnus
>


Allow all external traffic (any tcp/udp/icmp) to virtual hosts

2013-11-28 Thread Magnus Janson
Hi,

How do i allow all external traffic (any tcp/udp/icmp) to my virtual hosts?

I'm using DefaultSharedNetworkOffering in a BASIC network.

Security group and provider is not being used.

So far, I've tried to change the egress_default_policy. I couldn't find any
way to perform this through the UI so I did it manually in the database and
restarted the network:
UPDATE `cloud`.`network_offerings` SET `egress_default_policy`=1 WHERE
`name`='DefaultSharedNetworkOffering';

Still, it seems that all incoming traffic is rejected.

Any pointers on how to achieve this would be highly appreciated.

Sincerely,
Magnus


Basic Network - change bridge for SSVM SAN NFS communication

2013-11-20 Thread Magnus Janson
Hi Folks,

I'm using CS 4.2 with KVM and basic network.

This mail is pretty long, but my questions is quite short. I'm trying to
figure out how I could change which bridge my SSVM uses when it to connects
to my SAN server.

Including some of my thoughts and details below for this
-
When the agent creates the SSVM it seems to be using the default gateway
route for configuring all of the SSVM network interfaces.

This causes my SSVM not to be able to connect to my SAN server. As the SAN
server is on a completely different network (dedicated network
segment&switch).

My agent.properties file contains the following rows:
guest.network.device=cloudbr0
private.network.device=cloudbr0
public.network.device=cloudbr0

I would like my storage network communication to go over cloudbr1, which is
my agent network interface for my SAN network.

I'm very unsure about which, if any of these, that I should change. And I'm
also unsure if changing them would solve this issue.

Of course I could go ahead and do some manual NIC and route changes over at
my SSVM but that feels like the wrong solution to this issue.




Agent interfaces

cloudbr0 - addr: 10.100.38.150 mask:255.255.255.128
cloudbr1 - addr: 172.30.11.200 mask:255.255.255.0
cloud0 - inet addr:169.254.0.1 mask:255.255.0.0
eth0 - bridged to cloudbr0
eth1 - bridge to cloudbr1


Agent default route

$ip route|grep default
default via 10.100.38.129 dev cloudbr0


SSVM network interfaces

root@s-1-VM:~# ifconfig -a
eth0  Link encap:Ethernet  HWaddr 0e:00:a9:fe:00:f7
  inet addr:169.254.0.247  Bcast:169.254.255.255  Mask:255.255.0.0

eth1  Link encap:Ethernet  HWaddr 06:11:d0:00:00:02
  inet addr:10.100.38.131  Bcast:10.100.38.255  Mask:255.255.255.128

eth2  Link encap:Ethernet  HWaddr 06:f5:ce:00:00:07
  inet addr:10.100.38.136  Bcast:10.100.38.255  Mask:255.255.255.128

eth3  Link encap:Ethernet  HWaddr 06:df:14:00:00:01
  inet addr:10.100.38.130  Bcast:10.100.38.255  Mask:255.255.255.128


Manual mount test from SSVM, will reach timeout as it can't route to the
destination ip

root@s-1-VM:/tmp# mount -v -t nfs 172.30.11.20:/mnt/vg2/vol2/nfs2 /tmp/test
mount.nfs: timeout set for Wed Nov 20 16:19:50 2013
mount.nfs: trying text-based options
'vers=4,addr=172.30.11.20,clientaddr=10.100.38.131'


Best Regards,
Magnus


Re: CloudStack secondary storage capacity issue

2013-11-19 Thread Magnus Janson
So I did some more digging, and found out that I couldn't mount my drive
correctly via the SSVM either. It takes extremely long time to mount it,
and it seems like the routes are all messed up so it's not correctly
mounting it in the end either.

It seems that my management and storage networks are not separated in
CloudStack. My SAN storage network is on 172.30.11. and management on
10.100.38.

The SSVM tries to route the traffic for my SAN storage over my management
network. It seems like it's using IP's from the range specified for my
management network.

I've added the SAN ip range to PhysicalNetworksInBasicZone->Storage but
that doesn't seem to have any effect at all.

root@s-19-VM:~# ip route
default via 10.100.38.129 dev eth2
10.100.32.20 via 10.100.38.129 dev eth1
10.100.37.26 via 10.100.38.129 dev eth1
10.100.38.128/25 dev eth1  proto kernel  scope link  src 10.100.38.130
10.100.38.128/25 dev eth2  proto kernel  scope link  src 10.100.38.135
10.100.38.128/25 dev eth3  proto kernel  scope link  src 10.100.38.131
169.254.0.0/16 dev eth0  proto kernel  scope link  src 169.254.0.167
172.30.11.20 via 10.100.38.129 dev eth1

How do I configure the SSVM to use 172.30.11. network for SAN?


2013/11/19 Magnus Janson 

> Hi All,
>
> I'm having an issue with CloudStack 4.2 (KVM) and secondary storage.
> CloudStack reports that 100% is used, according to CloudStack the capacity
> is 275.98MB but the capacity is actually 1.7T.
>
> Dashboard reports:
> Secondary Storage
> 275.98 MB / 275.98 MB
>
> Infrastructure -> Secondary Storage settings:
> Name: secondary
> URL: nfs://172.30.11.20/mnt/vg2/vol2/nfs2
> Provider: NFS
>
> Checking the storage from centos (mounted the nfs share temporarily):
> [root@host root]# df -h
> FilesystemSize  Used   Avail  Use%
>  Mounted on
> 172.30.11.20:/mnt/vg2/vol2/nfs2  1.8T  460M  1.7T   1%
>  /mnt/secondary
>
> select id,name,status,type,resource_state,available,capabilities,version
> from cloud.host where type='SecondaryStorageVM';
> > '2', 's-19-VM', 'Up', 'SecondaryStorageVM', 'Enabled', '1', NULL, '4.2.0'
>
> I've been checking the management-servers logfiles but can't find any clue
> to what's causing this.
>
> As far as I can see the, the device is mounted correctly. I really don't
> understand why df -h would report 1.7T when the device is mounted, while
> CloudStack can only find/use a total of 275.98 MB.
>
> I don't know how to continue the troubleshooting, any help in the right
> direction from you guys would be highly appreciated.
>
> Best Regards,
> Magnus Jansson
>


CloudStack secondary storage capacity issue

2013-11-19 Thread Magnus Janson
Hi All,

I'm having an issue with CloudStack 4.2 (KVM) and secondary storage.
CloudStack reports that 100% is used, according to CloudStack the capacity
is 275.98MB but the capacity is actually 1.7T.

Dashboard reports:
Secondary Storage
275.98 MB / 275.98 MB

Infrastructure -> Secondary Storage settings:
Name: secondary
URL: nfs://172.30.11.20/mnt/vg2/vol2/nfs2
Provider: NFS

Checking the storage from centos (mounted the nfs share temporarily):
[root@host root]# df -h
FilesystemSize  Used   Avail  Use%  Mounted
on
172.30.11.20:/mnt/vg2/vol2/nfs2  1.8T  460M  1.7T   1%/mnt/secondary

select id,name,status,type,resource_state,available,capabilities,version
from cloud.host where type='SecondaryStorageVM';
> '2', 's-19-VM', 'Up', 'SecondaryStorageVM', 'Enabled', '1', NULL, '4.2.0'

I've been checking the management-servers logfiles but can't find any clue
to what's causing this.

As far as I can see the, the device is mounted correctly. I really don't
understand why df -h would report 1.7T when the device is mounted, while
CloudStack can only find/use a total of 275.98 MB.

I don't know how to continue the troubleshooting, any help in the right
direction from you guys would be highly appreciated.

Best Regards,
Magnus Jansson


CloudStack secondary storage capacity issue

2013-11-19 Thread Magnus Janson
Hi All,

I'm having an issue with CloudStack 4.2 (KVM) and secondary storage.
CloudStack reports that 100% is used, according to CloudStack the capacity
is 275.98MB but the capacity is actually 1.7T.

Dashboard reports:
Secondary Storage
275.98 MB / 275.98 MB

Infrastructure -> Secondary Storage settings:
Name: secondary
URL: nfs://172.30.11.20/mnt/vg2/vol2/nfs2
Provider: NFS

Checking the storage from centos (mounted the nfs share temporarily):
[root@host root]# df -h
FilesystemSize  Used   Avail  Use%  Mounted
on
172.30.11.20:/mnt/vg2/vol2/nfs2  1.8T  460M  1.7T   1%/mnt/secondary

select id,name,status,type,resource_state,available,capabilities,version
from cloud.host where type='SecondaryStorageVM';
> '2', 's-19-VM', 'Up', 'SecondaryStorageVM', 'Enabled', '1', NULL, '4.2.0'

I've been checking the management-servers logfiles but can't find any clue
to what's causing this.

As far as I can see the, the device is mounted correctly. I really don't
understand why df -h would report 1.7T when the device is mounted, while
CloudStack can only find/use a total of 275.98 MB.

I don't know how to continue the troubleshooting, any help in the right
direction from you guys would be highly appreciated.

Best Regards,
Magnus Jansson