Hello

Thats great, thanks for the support! I will check it out and let you
know.

> For the record we used "ZZCI - CentOS 7 - docker - 20180110-1659" to
> test. I'm not sure which docker image you're using but you might want
> to switch to using one of the ZZCI ones moving forward.

We are using the releng defaults:

jjb/releng-defaults.yaml:    docker_system_image: ZZCI - CentOS 7 - docker - 
20180109-0346

I don't know what's the change between the two but maybe we should step
this one.

BR
Jaime.

-----Original Message-----
From: Thanh Ha <thanh...@linuxfoundation.org>
To: jcaam...@suse.de
Cc: integration-...@lists.opendaylight.org <integration-dev@lists.opend
aylight.org>, sfc-dev@lists.opendaylight.org <sfc-dev@lists.opendayligh
t.org>
Subject: Re: [integration-dev] [sfc-dev] sfc csit failure
Date: Mon, 22 Jan 2018 15:04:59 -0500

On Mon, Jan 22, 2018 at 5:14 AM, Jaime Caamaño Ruiz <jcaam...@suse.de>
wrote:
> > - clean ip tables in B        sudo iptables -F        sudo iptables
> > -t nat -FIn my testing cleaning the iptables in this way breaks the
> > docker container's ability to route to the outside world so I would
> > not recommend cleaning the iptables as this will make the container
> > not be able to reach anything at all.
> 
> A requirement of our test setup is that the docker container can
> reach
> the builder with no nat'ing in between. By default docker network
> does
> masquerading to the outside world and cleaning ip tables gets rid of
> it. Is a rather rudimentary way of achieving it but worked for us.
> The
> proper way to do it is by creating a separate docker network with the
> option com.docker.network.bridge.enable_ip_masquerade disabled.
> 
> Disable masquerading also requires adding a route in the builder back
> to the docker network. Otherwise, as you say, there wont be
> connectivity:
> 
> route add -net <docker network> netmask <docker netmask> gw <docker
> host ip>
> 
> Worth mentioning is that this whole setup worked for us pre cloud
> provider change.
> 


After working with our cloud provider this morning we were able to
resolve this with this patch https://git.opendaylight.org/gerrit/67436
to allow the docker IPs to be route-able rather than dropped by the
network.

This should allow your csit tests to communicate between hosts and
containers now but let us know if there continues to be issues. For the
record we used "ZZCI - CentOS 7 - docker - 20180110-1659" to test. I'm
not sure which docker image you're using but you might want to switch
to using one of the ZZCI ones moving forward.

I can also confirm that even calling the 2 iptables -F commands won't
break the routing with the patch above so you should be able to
continue with your existing tests that do this.


> > We should be setting iptables -P FORWARD ACCEPT to allow another
> host
> > to reach inside the docker container on the docker host however
> even
> > after setting this things are still unrouteable.
> 
> This is one more thing that docker did by default but no longer does.
> I
> will crosscheck if it affects us but I dont think so. Our specific
> problem is packets going out of the container towards the builder,
> being forwarded in the docker host, but getting lost somewhere
> between
> the docker host and the builder.
> 

I can confirm that at least in my test environment I had to set this
parameter.

Regards,
Thanh

 
_______________________________________________
sfc-dev mailing list
sfc-dev@lists.opendaylight.org
https://lists.opendaylight.org/mailman/listinfo/sfc-dev

Reply via email to