OVN (Open Virtual Network) を用いる事により、OVS (Open vSwitch)が動作する複数のサーバー(Hypervisor/Chassis)を横断する仮想ネットワークを構築する事ができます。
本スライドはOVNを用いた論理ネットワークの構成と設定サンプルのメモとなります。
Using OVN, you can build logical network among multiple servers (Hypervisor/Chassis) running OVS (Open vSwitch).
This slide is describes HOW TO example of OVN configuration to create 2 logical switch connecting 4 VMs running on 2 chassis.
Quick Start Guide using Virtuozzo 7 (β) on AWS EC2
Virtuozzo 7 was open sourced and available on Amazon EC2 since October 2015.
This document aims to give you a quick overview of steps to setup Virtuozzo on Amazon EC2.
Open vSwitch is an open source virtual switch software that is compatible with the Linux standard bridge. The presentation will provide an overview of Open vSwitch, how to use its basic functions such as setting up bridges and ports, and its data structure that is managed in an ovsdb database.
Quick Start Guide using Virtuozzo 7 (β) on AWS EC2Kentaro Ebisawa
Virtuozzo 7 was open sourced and available on Amazon EC2 since October 2015.
This document aims to give you a quick overview of steps to setup Virtuozzo on Amazon EC2.
Linux のネットワーク設定情報を取得し、描画するツール "plotnetcfg" のインストール方法や描画サンプル。
"How to" for installing / using "plotnetcfg" which scans networking config of Linux machine and plots a diagram of the configuration hierarchy.
Introduction to Ostinato, network packet crafting and generator.Kentaro Ebisawa
Basic "How To" slides for Ostinato, network packet crafter/traffic generator and analyzer with a friendly GUI.
グラフィカルにパケット作成&送信&キャプチャ(解析)が可能な "Ostinato" を初めて使う人向けの How To スライドです。
リモートにあるホストからのパケット送信や、Python API もサポートする便利ツール。
The document discusses installing and configuring Open vSwitch (OVS) on a local PC to be used with KVM virtual machines. It provides instructions to download and compile OVS from source, install kernel modules, initialize the OVS database, and start the OVS daemon. It also describes creating a bridge interface, adding the physical network interface and tap interfaces from VMs to the bridge, and using OVS to provide network connectivity between VMs.
This document provides instructions for setting up a single server SDN testbed environment using Open vSwitch. It describes installing Ubuntu, configuring networking, installing necessary programs like Open vSwitch and DevStack, and configuring Open vSwitch bridges, tunnels, and virtual machines to emulate an SDN network on a single physical server.
OpenNebula can provide virtual infrastructure for virtual machines (VMs) and consists of a typical environment with:
- A frontend node running OpenNebula services and a hypervisor for VMs.
- Additional backend nodes running just hypervisors for VMs and sharing storage and networks.
- VMs communicate via a shared bridge and private network.
The tutorial covers installing OpenNebula on a lab environment with two backend nodes, configuring hosts, images, networks and templates. It then demonstrates basic usage like deploying VMs, managing their life cycle and contextualization using groups, quotas and different user views.
ONOS SDN Controller - Clustering Tests & Experiments Eueung Mulyana
The document describes setting up an ONOS cluster experiment including the target machines, management VM, and manual ONOS installation process. It discusses preparing the target machines by installing dependencies, Java, and manually extracting the ONOS binary. It also covers preparing the management VM by cloning the ONOS source code from Gerrit, checking out the 1.12.0 version, building ONOS, and installing additional tools for management.
1) The document provides an overview of OpenStack, an open source cloud computing platform, describing its main components for compute (Nova), object storage (Swift), and history.
2) It discusses different methods for deploying and testing OpenStack, including using Vagrant and the nova.sh script, and considerations for physical deployment like hardware selection and network configuration.
3) The document concludes with information on monitoring, upcoming features, and thanks/questions.
OVN is an open source virtual network solution for Open vSwitch that provides logical L2 and L3 networking, including logical switches, routers, security groups, and multiple tunneling protocols. It is designed to scale to thousands of hypervisors and VMs, improve performance over existing plugins, and integrate with OpenStack and other cloud management systems through its databases and daemons. OVN aims to become the default virtual network solution in OpenStack Neutron by replacing the existing OVS plugin.
Quick-and-Easy Deployment of a Ceph Storage Cluster with SLESJan Kalcic
This document discusses quick deployment of a Ceph storage cluster using SUSE Linux Enterprise Server (SLES). It provides an overview of Ceph and its components, and steps for provisioning a Ceph cluster including bootstrapping an initial monitor, adding OSDs, and configuring a PXE boot server for automated installation. It also briefly introduces tools like SUSE Studio for appliance building and SUSE Manager for systems management that can aid in deploying and managing the Ceph cluster.
This document provides an overview of Open vSwitch, including what it is, its main components, features, and how it can be used to build virtual network topologies. Open vSwitch is a software-defined networking switch that can be used to create virtual networks and handle network traffic between virtual machines and tunnels. It uses a distributed database, ovsdb-server, and a userspace daemon, ovs-vswitchd, to implement features like virtual switching, tunneling protocols, and OpenFlow support. Examples are provided for using Open vSwitch with KVM virtual machines and GRE tunnels to create virtual network topologies.
The document provides information on installing and using openMANO, an open source platform for network functions virtualization management and orchestration. It describes:
1. The requirements to run openMANO including compute nodes, storage, and OpenFlow controller.
2. The different modes openMANO can run in including normal, host-only, development, and test modes.
3. How to install openMANO either automatically through scripts or manually by downloading packages and configuring components.
5. hands on - building local development environment with Open Manovideos
This document describes how to build a local development environment using OpenMANO to test network scenarios and virtualized network functions (VNFs). It provides instructions on configuring OpenMANO and OpenVIM, creating tenants, networks, and VNF descriptors, and deploying a sample network scenario with four VNFs connected in series. The deployed scenario can then be managed and monitored using the OpenMANO graphical user interface.
This document provides instructions on how to connect to a guest OS through NAT and how to set up a shared folder between the host and guest systems using VirtualBox. It explains how to install OpenSSH on the guest OS, set up port forwarding on the host to access the guest remotely, and configure a shared folder by defining the host and guest directories and mounting the shared folder in the guest. Troubleshooting tips are also included to check firewall settings and verify the port forwarding and shared folder configurations.
This document discusses using LVS (Linux Virtual Server) and Keepalived to implement high performance and high availability load balancing. It provides instructions on installing LVS and Keepalived, configuring LVS for load balancing, and using Keepalived to realize load balancing and high availability. Key aspects covered include using LVS-DR and real server scripts, and configuring Keepalived on the master and backup servers.
1) The document provides an agenda and instructions for a hands-on tutorial on OVS/NFV basics using Open vSwitch, Linux containers, Docker, and virtual private networks.
2) It describes how to access two provided virtual machines and configure port mirroring with Open vSwitch to monitor network traffic between VMs.
3) Instructions are given for installing Linux containers on the VMs, configuring network interfaces and scripts, and testing connectivity between containers using GRE tunnels.
4) The tutorial also covers installing and configuring Docker containers on the VMs, creating virtual networks between them using GRE tunnels, and deploying example containers from Docker Hub.
The document discusses using Ceph storage as a PaaS platform and service. It describes PASTA, an in-house PaaS platform that uses Ceph for persistent volumes for containers. Ceph provides strong consistency for block and filesystem volumes and is used for stateful containers in Docker Swarm farms for services like Jenkins, Elasticsearch, and DRUID storage. Operational issues with Ceph discussed include multi-mapped volumes, upgrades, network failures, scrub/deep-scrub performance impacts, recovering RBD images, and monitor failures/recovery. Configuration options and methods for addressing these issues are also provided.
This document provides an introduction to Open vSwitch (OVS), including what a virtual switch is, examples of virtual network topologies using OVS, the main components of OVS, and how to use OVS to build network topologies. It discusses features of OVS like visibility into inter-VM communication and support for tunnels. It also demonstrates OVS configurations for virtual machine to virtual machine communication using GRE tunnels and a demo topology with OVS bridges communicating over a GRE tunnel.
This document provides an overview of Open vSwitch, a software-based virtual switch. It discusses what a virtual switch is, how Open vSwitch uses a userspace controller and kernel datapath to provide network abstractions. The document outlines Open vSwitch components like ovsdb-server and ovs-vswitchd, and demonstrates how to use Open vSwitch to build virtual network topologies with VMs, tunnels, and bridges. Examples of QoS configuration and a GRE tunnel demo are also presented.
This document discusses how to port Erlang and OTP to run on OSv without forking or executing external processes. Erlang ports allow communication with external processes but rely on forking and executing the port executable. As OSv does not support forking or execution, an alternative approach for Erlang ports is needed. Suggested approaches include using linked-in drivers written as shared objects, NIFs, or a custom in-process protocol to communicate with external processes without forking.
Similar to OVN 設定サンプル | OVN config example 2015/12/27 (20)
In Network Computing Prototype Using P4 at KSC/KREONET 2019Kentaro Ebisawa
Case Study of P4 applying to CAN (Control Area Network) data pre-processing using FPGA + Netcope P4 compiler.
Presented at KSC / KREONET WORKSHOP 2019 | DAY 1 Session 1: SDN/NFV/P4
http://www.ksc2019.re.kr/
Comparison of SRv6 Extensions uSID, SRv6+, C-SRHKentaro Ebisawa
Comparing concept, SID and header format of compressed Segment Routing IPv6 proposals such as uSID, SRv6+, C-SRH. Slide presented at SRv6 Consortium @Tokyo on 23rd Aug 2019.
The document describes the design of p4srv6, a P4 program that implements SRv6 (Segment Routing for IPv6) functions. It discusses p4srv6's pipeline design based on the v1model.p4 architecture and includes details on the parser, ingress control, transit and end tables for SRv6, and handling of variable length SID lists. It also provides examples of configuring p4srv6 for GTP to SRv6 encapsulation and decapsulation.
SRv6 Mobile User Plane : Initial POC and ImplementationKentaro Ebisawa
SRv6 Mobile Uplane POC results and findings talked at ENOG55 @Nigata http://enog.jp/archives/2014
SRv6 functions: T.M.Tmap, End.M.GTP4.E using VPP and P4 on Tofino switch.
JANOG43 Forefront of SRv6, Open Source ImplementationsKentaro Ebisawa
Status of SRv6 Open Source Implementations including where you can find the source code. English slide comes after Japanese.
This is a session from JANOG43 "Forefront of SRv6" program held on 23 Jan 2019 @ Kohu Japan.
https://www.janog.gr.jp/meeting/janog43/program/srv6
* Introduction – Miya Kohno
* SRv6 Update – Clarence Filsfils
* SRv6 Mobile user plane Update – Satoru Matsushima
* SRv6 Open Source Implementation Update – Kentaro Ebisawa
* SRv6 Academy Update – Chunghan Lee
* Vendor Update (Huawei) – Ryuichi Takashima
* Vendor Update (Cisco) – Teppei Kamata
The document discusses configuring GTP tunnels on Linux using the libgtpnl library. Key points:
- Linux kernels since 4.7 include GTP tunnel endpoint functionality in the gtp.c driver
- Libgtpnl provides tools to configure GTP tunnels via netlink without a control plane
- Configuration involves creating veth interfaces, loopbacks, GTP devices, and tunnels between endpoints using TEIDs and IP addresses
How to build and use GTPing to generate GTP traffic for testing without eNB, SPGW etc. This work was done as part of the preparation of SRv6 mobile user plane POC at SRv6 Consortium, Data plane Study Group, which is a group of people interested in SRv6.
Slides from ONOS/CORD meetup in Tokyo 2018. 20th April 2018.
http://www.e-side.co.jp/onoscordmeetup/#P4_2
Future Mobile User Plane is heavily discussed in many SDOs like 3GPP, IETF etc. and still not concreate. P4 lang is usefull to prototype such changing protocol on software switch and on ASIC/NPU.
This slide introudce one candidate for future Mobile User Plane protocol, SRv6 for Mobile User Plane and proto-type implemented in P4-14.
https://datatracker.ietf.org/doc/draft-ietf-dmm-srv6-mobile-uplane/
Moved to https://speakerdeck.com/ebiken/zebra-srv6-cli-on-linux-dataplane-enog-number-49
Introduction to SRv6, Linux SRv6 implementation and how to add SRv6 CLI to Zebra 2.0 Open Source Network Operation Stack.
Presented at ENOG (Echigo NOG) #49.
The document discusses requirements for network nodes in the hybrid cloud era. It notes that network nodes will need to have common interfaces regardless of location, provide a seamless experience for operators via CLI, and reduce learning costs. It then provides details on Zebra 2.0, an open source network operating stack, including its architecture, modules, scalable configuration system, and support for protocols like SRv6. It demos Zebra 2.0's SRv6 CLI functionality on a Linux dataplane.
“p4alu” is a P4 program who would parse UDP packet with payload in "p4alu header format" and apply calculation.
This program is tested using BMv2 simple_switch P4 target.
zebra is an open source implementation as a successor of GNU Zebra and Quagga project. Together with openconfigd, it will work as data plane agnostic Network Operation Stack working with variable protocol / functional modules.
Are you interested in dipping your toes in the cloud native observability waters, but as an engineer you are not sure where to get started with tracing problems through your microservices and application landscapes on Kubernetes? Then this is the session for you, where we take you on your first steps in an active open-source project that offers a buffet of languages, challenges, and opportunities for getting started with telemetry data.
The project is called openTelemetry, but before diving into the specifics, we’ll start with de-mystifying key concepts and terms such as observability, telemetry, instrumentation, cardinality, percentile to lay a foundation. After understanding the nuts and bolts of observability and distributed traces, we’ll explore the openTelemetry community; its Special Interest Groups (SIGs), repositories, and how to become not only an end-user, but possibly a contributor.We will wrap up with an overview of the components in this project, such as the Collector, the OpenTelemetry protocol (OTLP), its APIs, and its SDKs.
Attendees will leave with an understanding of key observability concepts, become grounded in distributed tracing terminology, be aware of the components of openTelemetry, and know how to take their first steps to an open-source contribution!
Key Takeaways: Open source, vendor neutral instrumentation is an exciting new reality as the industry standardizes on openTelemetry for observability. OpenTelemetry is on a mission to enable effective observability by making high-quality, portable telemetry ubiquitous. The world of observability and monitoring today has a steep learning curve and in order to achieve ubiquity, the project would benefit from growing our contributor community.
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfNeo4j
Presented at Gartner Data & Analytics, London Maty 2024. BT Group has used the Neo4j Graph Database to enable impressive digital transformation programs over the last 6 years. By re-imagining their operational support systems to adopt self-serve and data lead principles they have substantially reduced the number of applications and complexity of their operations. The result has been a substantial reduction in risk and costs while improving time to value, innovation, and process automation. Join this session to hear their story, the lessons they learned along the way and how their future innovation plans include the exploration of uses of EKG + Generative AI.
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfjackson110191
These fighter aircraft have uses outside of traditional combat situations. They are essential in defending India's territorial integrity, averting dangers, and delivering aid to those in need during natural calamities. Additionally, the IAF improves its interoperability and fortifies international military alliances by working together and conducting joint exercises with other air forces.
Coordinate Systems in FME 101 - Webinar SlidesSafe Software
If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights.
During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to:
- Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value
- Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems
- Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors
- Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported
- Look Ahead: Gain insights into where FME is headed with coordinate systems in the future
Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...Toru Tamaki
Jindong Gu, Zhen Han, Shuo Chen, Ahmad Beirami, Bailan He, Gengyuan Zhang, Ruotong Liao, Yao Qin, Volker Tresp, Philip Torr "A Systematic Survey of Prompt Engineering on Vision-Language Foundation Models" arXiv2023
https://arxiv.org/abs/2307.12980
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
The DealBook is our annual overview of the Ukrainian tech investment industry. This edition comprehensively covers the full year 2023 and the first deals of 2024.
YOUR RELIABLE WEB DESIGN & DEVELOPMENT TEAM — FOR LASTING SUCCESS
WPRiders is a web development company specialized in WordPress and WooCommerce websites and plugins for customers around the world. The company is headquartered in Bucharest, Romania, but our team members are located all over the world. Our customers are primarily from the US and Western Europe, but we have clients from Australia, Canada and other areas as well.
Some facts about WPRiders and why we are one of the best firms around:
More than 700 five-star reviews! You can check them here.
1500 WordPress projects delivered.
We respond 80% faster than other firms! Data provided by Freshdesk.
We’ve been in business since 2015.
We are located in 7 countries and have 22 team members.
With so many projects delivered, our team knows what works and what doesn’t when it comes to WordPress and WooCommerce.
Our team members are:
- highly experienced developers (employees & contractors with 5 -10+ years of experience),
- great designers with an eye for UX/UI with 10+ years of experience
- project managers with development background who speak both tech and non-tech
- QA specialists
- Conversion Rate Optimisation - CRO experts
They are all working together to provide you with the best possible service. We are passionate about WordPress, and we love creating custom solutions that help our clients achieve their goals.
At WPRiders, we are committed to building long-term relationships with our clients. We believe in accountability, in doing the right thing, as well as in transparency and open communication. You can read more about WPRiders on the About us page.
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionBert Blevins
Cybersecurity is a major concern in today's connected digital world. Threats to organizations are constantly evolving and have the potential to compromise sensitive information, disrupt operations, and lead to significant financial losses. Traditional cybersecurity techniques often fall short against modern attackers. Therefore, advanced techniques for cyber security analysis and anomaly detection are essential for protecting digital assets. This blog explores these cutting-edge methods, providing a comprehensive overview of their application and importance.
Support en anglais diffusé lors de l'événement 100% IA organisé dans les locaux parisiens d'Iguane Solutions, le mardi 2 juillet 2024 :
- Présentation de notre plateforme IA plug and play : ses fonctionnalités avancées, telles que son interface utilisateur intuitive, son copilot puissant et des outils de monitoring performants.
- REX client : Cyril Janssens, CTO d’ easybourse, partage son expérience d’utilisation de notre plateforme IA plug & play.
How Social Media Hackers Help You to See Your Wife's Message.pdfHackersList
In the modern digital era, social media platforms have become integral to our daily lives. These platforms, including Facebook, Instagram, WhatsApp, and Snapchat, offer countless ways to connect, share, and communicate.
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxSynapseIndia
Your comprehensive guide to RPA in healthcare for 2024. Explore the benefits, use cases, and emerging trends of robotic process automation. Understand the challenges and prepare for the future of healthcare automation
14. Server ovn02,ovn03: ovs-vswitchd, ovn-controller設定・開始
Open Virtual Network : OVN Config example | 2015/12/27 14
3) Start ovs-vswitchd
$ sudo ovs-vswitchd --pidfile --detach --log-file
4) Set external-ids on conf.db:Open_vSwitch Table
• conf.db:Open_vSwitch Table にexternal-idsを設定。(”set open” は “set Open_vSwitch” の略)
• ovn-controller 起動時に external-idsを元に ovn-controller は Chassis (Hypervisor/Server) を ovnsb.db: Chassis table に登録。
• Bridge “br-int” はovn-controller 起動時に自動生成(br-int = integration bridge)
Server: ovn02
$ sudo ovs-vsctl set open . external-ids:system-id=56b18105-5706-46ef-80c4-ff20979ab002
$ sudo ovs-vsctl set open . external-ids:ovn-remote=tcp:172.16.0.10:6632
$ sudo ovs-vsctl set open . external-ids:ovn-encap-type=geneve
$ sudo ovs-vsctl set open . external-ids:ovn-encap-ip=172.16.0.20
Server: ovn03
$ sudo ovs-vsctl set open . external-ids:system-id=56b18105-5706-46ef-80c4-ff20979ab003
$ sudo ovs-vsctl set open . external-ids:ovn-remote=tcp:172.16.0.10:6632
$ sudo ovs-vsctl set open . external-ids:ovn-encap-type=geneve
$ sudo ovs-vsctl set open . external-ids:ovn-encap-ip=172.16.0.30
5) Start ovn-controller(8), ovn-controller-vtep(8)
$ sudo ovn-controller --pidfile --detach --log-file
bridge: br-int
ovn-
controller
172.16.0.20,30/24
server: ovn02,03
OVS DB
(conf.db, vtep.db)
15. Server ovn02,ovn03: namespace (VM) host1 / host2 の設定
Open Virtual Network : OVN Config example | 2015/12/27 15
1) vtap / veth の作成
Server: ovn02
$ sudo ip link add veth1 type veth peer name vtap1
$ sudo ip link add veth2 type veth peer name vtap2
Server: ovn03
$ sudo ip link add veth3 type veth peer name vtap3
$ sudo ip link add veth4 type veth peer name vtap4
2) create namespace and attach veth
• namespaceを作成しvethを紐付け。
• これにより vethX は各namespace(hostY)からのみ参照可能となる。
Server: ovn02
$ sudo ip netns add host1
$ sudo ip netns add host2
$ sudo ip link set veth1 netns host1
$ sudo ip link set veth2 netns host2
Server: ovn03
$ sudo ip netns add host3
$ sudo ip netns add host4
$ sudo ip link set veth3 netns host3
$ sudo ip link set veth4 netns host4
vtap1
veth1
ns: host1
vtap2
veth2
ns: host2
bridge: br-int
ovn-
controller
172.16.0.20,30/24
server: ovn02,03
OVS DB
(conf.db, vtep.db)
16. Server ovn02,ovn03: namespace (VM) host1 / host2 の設定
Open Virtual Network : OVN Config example | 2015/12/27 16
3) change interface status to “up” and assign IP address
Server: ovn02
$ sudo ip link set dev vtap1 up
$ sudo ip link set dev vtap2 up
$ sudo ip netns exec host1 ip link set veth1 up
$ sudo ip netns exec host2 ip link set veth2 up
$ sudo ip netns exec host1 ifconfig lo up
$ sudo ip netns exec host2 ifconfig lo up
$ sudo ip netns exec host1 ip addr add 172.16.2.1/24 dev veth1
$ sudo ip netns exec host2 ip addr add 172.16.2.2/24 dev veth2
Server: ovn03
$ sudo ip link set dev vtap3 up
$ sudo ip link set dev vtap4 up
$ sudo ip netns exec host3 ip link set veth3 up
$ sudo ip netns exec host4 ip link set veth4 up
$ sudo ip netns exec host3 ifconfig lo up
$ sudo ip netns exec host4 ifconfig lo up
$ sudo ip netns exec host3 ip addr add 172.16.2.3/24 dev veth3
$ sudo ip netns exec host4 ip addr add 172.16.2.4/24 dev veth4
vtap1
veth1
172.16.2.1/24
ns: host1
vtap2
veth2
172.16.2.2/24
ns: host2
bridge: br-int
ovn-
controller
172.16.0.20,30/24
server: ovn02,03
OVS DB
(conf.db, vtep.db)
17. 3) Set MAC address to each logical ports
• “2)” で確認したMAC address を各論理ポートに設定
Server: ovn01
$ sudo ovn-nbctl lport-set-addresses sw-port1 62:1a:d6:91:49:3d
$ sudo ovn-nbctl lport-set-addresses sw-port2 ae:de:c6:a4:f9:e4
$ sudo ovn-nbctl lport-set-addresses sw-port3 c2:5b:26:02:7f:87
$ sudo ovn-nbctl lport-set-addresses sw-port4 92:89:78:df:69:c9
OVN Logical Network の設定
Open Virtual Network : OVN Config example | 2015/12/27 17
1) Create a logical switch named "sw0“ and 4 logical ports on "sw0"
• ovn01 にて2つの論理スイッチ(sw0, sw1)と4つの論理ポートを作成
Server: ovn01
$ sudo -i
# ovn-nbctl lswitch-add sw0
# ovn-nbctl lswitch-add sw1
# ovn-nbctl lport-add sw0 sw-port1
# ovn-nbctl lport-add sw1 sw-port2
# ovn-nbctl lport-add sw1 sw-port3
# ovn-nbctl lport-add sw0 sw-port4
2) Check MAC address of veth1,2,3,4 on Server: ovn02, 03
• veth1,2,3,4 の MAC address を確認。以下はovn02: veth1の例。
root@ovn02:~$ sudo ip netns exec host1 ip a
…
9: veth1@if8: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc
pfifo_fast state UP group default qlen 1000
link/ether 62:1a:d6:91:49:3d brd ff:ff:ff:ff:ff:ff link-netnsid 0
inet 172.16.2.1/24 scope global veth1
valid_lft forever preferred_lft forever
inet6 fe80::601a:d6ff:fe91:493d/64 scope link
valid_lft forever preferred_lft forever
18. OVN Logical Network の設定
Open Virtual Network : OVN Config example | 2015/12/27 18
4) Bind Logical ports (sw-portX) and Physical ports (vtapX)
• 論理ポート(sw-portX)と物理ポート(vtapX)の紐づけ
Server: ovn02
$ sudo ovs-vsctl add-port br-int vtap1 -- set Interface vtap1 external_ids:iface-id=sw-port1
sudo ovs-vsctl add-port br-int vtap2 -- set Interface vtap2 external_ids:iface-id=sw-port2
Server: ovn03
$ sudo ovs-vsctl add-port br-int vtap3 -- set Interface vtap3 external_ids:iface-id=sw-port3
$ sudo ovs-vsctl add-port br-int vtap4 -- set Interface vtap4 external_ids:iface-id=sw-port4
5) ping による疎通確認
Server: ovn02
• host1-> host2, host3 :異なる論理スイッチ上のため ping 不可
$ sudo ip netns exec host1 ping 172.16.2.2
PING 172.16.2.2 (172.16.2.2) 56(84) bytes of data.
From 172.16.2.1 icmp_seq=1 Destination Host Unreachable
$ sudo ip netns exec host1 ping 172.16.2.3
PING 172.16.2.3 (172.16.2.3) 56(84) bytes of data.
From 172.16.2.1 icmp_seq=1 Destination Host Unreachable
• OK: host1 -> host4 : 同じ論理スイッチ上のため ping 可能
$ sudo ip netns exec host1 ping 172.16.2.4
PING 172.16.2.4 (172.16.2.4) 56(84) bytes of data.
64 bytes from 172.16.2.4: icmp_seq=1 ttl=64 time=1.58 ms