[ovs-discuss] vm can't ping over ovs gre port

JinHwan Hwang calanchue at gmail.com
Mon Jul 8 04:50:07 UTC 2013


tcpdump of vm at host2 interface is missed, so i append it. It seems like
respond to ARP  command. But the vm at host1 only prints 'Destination Host
Unreachable'


[host2]# tcpdump -i vnet0
tcpdump: WARNING: vnet0: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on vnet0, link-type EN10MB (Ethernet), capture size 65535 bytes
13:45:50.570962 ARP, Request who-has 10.123.123.21 tell 10.123.123.20,
length 28
13:45:50.571268 ARP, Reply 10.123.123.21 is-at d2:0d:45:a3:92:ea (oui
Unknown), length 28
13:46:22.571318 ARP, Request who-has 10.123.123.21 tell 10.123.123.20,
length 28
13:46:22.571683 ARP, Reply 10.123.123.21 is-at d2:0d:45:a3:92:ea (oui
Unknown), length 28
13:46:23.571012 ARP, Request who-has 10.123.123.21 tell 10.123.123.20,
length 28
13:46:23.571340 ARP, Reply 10.123.123.21 is-at d2:0d:45:a3:92:ea (oui
Unknown), length 28
13:46:24.573233 ARP, Request who-has 10.123.123.21 tell 10.123.123.20,
length 28
13:46:24.573544 ARP, Reply 10.123.123.21 is-at d2:0d:45:a3:92:ea (oui
Unknown), length 28
13:46:26.571970 ARP, Request who-has 10.123.123.21 tell 10.123.123.20,
length 28
13:46:26.572274 ARP, Reply 10.123.123.21 is-at d2:0d:45:a3:92:ea (oui
Unknown), length 28



2013/7/8 JinHwan Hwang <calanchue at gmail.com>

> Thank you for replys.
>
> I did ping at vm in host1.
> [vm_at_host1]#ping 10.10.123.123.21
>
> Below is what i get from "ovs-dpctl dump-flows" and "tcpdump". I can't
> understands all of it, but at least, GRE works until tep(tunnel end point)
> device at host2. but it fails to seek vm at host2. This point, i felt weird
> about these settings. How this GRE setting can find the vm which  is at the
> bridge not connected with tunnel end point?
>
> [host1]# ovs-dpctl dump-flows
> in_port(2),eth(src=00:01:e8:9a:74:e6,dst=ff:ff:ff:ff:ff:ff),eth_type(0x0806),arp(sip=182.162.143.2,tip=182.162.143.164,op=1,sha=00:01:e8:9a:74:e6,tha=00:00:00:00:00:00),
> packets:0, bytes:0, used:never, actions:1,3
> in_port(3),eth(src=76:ee:e6:89:fe:46,dst=d4:be:d9:ac:f0:cf),eth_type(0x0800),ipv4(src=192.168.100.20,dst=192.168.100.21,proto=47,tos=0,ttl=64,frag=no),
> packets:38, bytes:3040, used:1.192s, actions:2
> in_port(2),eth(src=00:01:e8:9a:74:e6,dst=ff:ff:ff:ff:ff:ff),eth_type(0x0806),arp(sip=117.52.91.2,tip=117.52.91.113,op=1,sha=00:01:e8:9a:74:e6,tha=00:00:00:00:00:00),
> packets:1, bytes:60, used:0.898s, actions:1,3
> skb_priority(0x2),in_port(1),eth(src=78:45:c4:f1:77:d3,dst=f4:ce:46:bf:f2:21),eth_type(0x0800),ipv4(src=182.162.104.20,dst=182.162.104.10,proto=6,tos=0x8,ttl=64,frag=no),tcp(src=22,dst=58954),
> packets:18044, bytes:6239528, used:0.546s, flags:P., actions:2
> in_port(2),eth(src=00:00:5e:00:01:37,dst=01:00:5e:00:00:12),eth_type(0x0800),ipv4(src=182.162.143.2,dst=224.0.0.18,proto=112,tos=0xc0,ttl=255,frag=no),
> packets:252634, bytes:67705912, used:0.988s, actions:1,3
> in_port(1),eth(src=78:45:c4:f1:77:d3,dst=f4:ce:46:bf:f2:21),eth_type(0x0800),ipv4(src=182.162.104.20,dst=182.162.104.10,proto=6,tos=0,ttl=64,frag=no),tcp(src=5900,dst=43591),
> packets:9908, bytes:1004025, used:0.033s, flags:P., actions:2
> in_port(6),eth(src=d2:0d:45:a3:92:ea,dst=ff:ff:ff:ff:ff:ff),eth_type(0x0806),arp(sip=10.123.123.20,tip=10.123.123.21,op=1,sha=d2:0d:45:a3:92:ea,tha=00:00:00:00:00:00),
> packets:38, bytes:1596, used:1.192s,
> actions:set(tunnel(tun_id=0x0,src=0.0.0.0,dst=192.168.100.21,tos=0x0,ttl=64,flags(df))),4,5
> in_port(2),eth(src=f4:ce:46:bf:f2:21,dst=78:45:c4:f1:77:d3),eth_type(0x0800),ipv4(src=182.162.104.10,dst=182.162.104.20,proto=6,tos=0,ttl=64,frag=no),tcp(src=43591,dst=5900),
> packets:5684, bytes:432856, used:0.033s, flags:P., actions:1
> in_port(2),eth(src=d0:67:e5:a7:6f:c0,dst=01:80:c2:00:00:00),
> packets:129312, bytes:8275968, used:0.828s, actions:1,3
> in_port(2),eth(src=f4:ce:46:bf:f2:21,dst=78:45:c4:f1:77:d3),eth_type(0x0800),ipv4(src=182.162.104.10,dst=182.162.104.20,proto=6,tos=0x8,ttl=64,frag=no),tcp(src=58954,dst=22),
> packets:18771, bytes:2510278, used:0.546s, flags:P., actions:1
> in_port(2),eth(src=00:01:e8:a0:d8:40,dst=01:00:5e:00:00:05),eth_type(0x0800),ipv4(src=182.162.143.3,dst=224.0.0.5,proto=89,tos=0xc0,ttl=1,frag=no),
> packets:0, bytes:0, used:never, actions:1,3
>
> [host1]# tcpdump -i vnet0
> tcpdump: WARNING: vnet0: no IPv4 address assigned
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on vnet0, link-type EN10MB (Ethernet), capture size 65535 bytes
> 10:20:32.564181 ARP, Request who-has 10.123.123.21 tell 10.123.123.20,
> length 28
> 10:20:32.564342 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 38, length 64
> 10:20:33.564150 ARP, Request who-has 10.123.123.21 tell 10.123.123.20,
> length 28
> 10:20:33.564296 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 39, length 64
> 10:20:34.565121 ARP, Request who-has 10.123.123.21 tell 10.123.123.20,
> length 28
> 10:20:34.565313 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 40, length 64
> 10:20:35.566074 ARP, Request who-has 10.123.123.21 tell 10.123.123.20,
> length 28
> 10:20:36.569006 ARP, Request who-has 10.123.123.21 tell 10.123.123.20,
> length 28
> 10:20:37.566082 ARP, Request who-has 10.123.123.21 tell 10.123.123.20,
> length 28
> 10:20:37.566710 ARP, Reply 10.123.123.21 is-at d2:0d:45:a3:92:ea (oui
> Unknown), length 28
> 10:20:37.567049 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 41, length 64
> 10:20:37.567135 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 42, length 64
> 10:20:37.567212 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 43, length 64
> 10:20:38.565199 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 44, length 64
> 10:20:39.565200 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 45, length 64
> 10:20:40.565167 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 46, length 64
> 10:20:41.565212 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 47, length 64
> 10:20:42.565195 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 48, length 64
> 10:20:43.569077 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 49, length 64
> 10:20:44.569176 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 50, length 64
> 10:20:45.569232 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 51, length 64
> 10:20:46.569197 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 52, length 64
> 10:20:47.569201 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 53, length 64
> 10:20:48.569193 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 54, length 64
> 10:20:49.569188 IP 10.123.123.20 > 10.123.123.21: ICMP echo request, id
> 56071, seq 55, length 64
>
>
> [host1]# tcpdump -i br1
> tcpdump: WARNING: br1: no IPv4 address assigned
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on br1, link-type EN10MB (Ethernet), capture size 65535 bytes
>
> [host1]# tcpdump -i br1
> tcpdump: WARNING: br1: no IPv4 address assigned
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on br1, link-type EN10MB (Ethernet), capture size 65535 bytes
> 10:22:29.601279 ARP, Request who-has 10.123.123.21 tell 10.123.123.20,
> length 28
> 10:22:30.602301 ARP, Request who-has 10.123.123.21 tell 10.123.123.20,
> length 28
> 10:22:31.601106 ARP, Request who-has 10.123.123.21 tell 10.123.123.20,
> length 28
>
> [host2]# ovs-dpctl dump-flows
> in_port(2),eth(src=00:01:e8:9a:74:e6,dst=01:00:5e:00:00:05),eth_type(0x0800),ipv4(src=182.162.143.2,dst=224.0.0.5,proto=89,tos=0xc0,ttl=1,frag=no),
> packets:0, bytes:0, used:never, actions:3,1
> in_port(2),eth(src=d0:67:e5:a7:6f:ab,dst=01:80:c2:00:00:00),
> packets:130005, bytes:8320320, used:0.232s, actions:3,1
> in_port(2),eth(src=f4:ce:46:bf:f2:21,dst=d4:be:d9:ac:f0:cf),eth_type(0x0800),ipv4(src=182.162.104.10,dst=182.162.104.21,proto=6,tos=0x8,ttl=64,frag=no),tcp(src=38555,dst=22),
> packets:15873, bytes:2071730, used:0.025s, flags:P., actions:1
> in_port(2),eth(src=84:2b:2b:fb:ed:2e,dst=01:00:5e:7f:ff:fd),eth_type(0x0800),ipv4(src=182.162.104.4,dst=239.255.255.253,proto=2,tos=0xc0,ttl=1,frag=no),
> packets:0, bytes:0, used:never, actions:3,1
> in_port(2),eth(src=00:01:e8:9a:74:e6,dst=ff:ff:ff:ff:ff:ff),eth_type(0x0806),arp(sip=182.162.104.2,tip=182.162.104.111,op=1,sha=00:01:e8:9a:74:e6,tha=00:00:00:00:00:00),
> packets:0, bytes:0, used:never, actions:3,1
> skb_priority(0x2),in_port(1),eth(src=d4:be:d9:ac:f0:cf,dst=f4:ce:46:bf:f2:21),eth_type(0x0800),ipv4(src=182.162.104.21,dst=182.162.104.10,proto=6,tos=0x8,ttl=64,frag=no),tcp(src=22,dst=38555),
> packets:14029, bytes:3356410, used:0.066s, flags:P., actions:2
> in_port(2),eth(src=00:00:5e:00:01:37,dst=01:00:5e:00:00:12),eth_type(0x0800),ipv4(src=182.162.143.2,dst=224.0.0.18,proto=112,tos=0xc0,ttl=255,frag=no),
> packets:253989, bytes:68069052, used:0.529s, actions:3,1
> in_port(2),eth(src=00:01:e8:9a:74:e6,dst=ff:ff:ff:ff:ff:ff),eth_type(0x0806),arp(sip=117.52.91.2,tip=117.52.91.38,op=1,sha=00:01:e8:9a:74:e6,tha=00:00:00:00:00:00),
> packets:1, bytes:60, used:2.510s, actions:3,1
>
> [host2]# tcpdump -i tep0
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on tep0, link-type EN10MB (Ethernet), capture size 65535 bytes
> 10:32:15.383783 IP 182.162.143.2 > vrrp.mcast.net: VRRPv2, Advertisement,
> vrid 55, prio 110, authtype none, intvl 1s, length 32
> 10:32:15.709863 STP 802.1w, Rapid STP, Flags [Learn, Forward, Agreement],
> bridge-id 8000.d0:67:e5:a7:6f:a9.8002, length 47
> 10:32:16.294882 IP 192.168.100.20 > 192.168.100.21: GREv0, length 46:
> ARP, Request who-has 10.123.123.21 tell 10.123.123.20, length 28
> 10:32:16.423330 IP 182.162.143.2 > vrrp.mcast.net: VRRPv2, Advertisement,
> vrid 55, prio 110, authtype none, intvl 1s, length 32
> 10:32:17.294506 IP 192.168.100.20 > 192.168.100.21: GREv0, length 46:
> ARP, Request who-has 10.123.123.21 tell 10.123.123.20, length 28
> 10:32:17.294925 IP 192.168.100.21 > 192.168.100.20: GREv0, length 46:
> ARP, Reply 10.123.123.21 is-at d2:0d:45:a3:92:ea (oui Unknown), length 28
> 10:32:17.394376 IP 182.162.143.3 > ospf-all.mcast.net: OSPFv2, Hello,
> length 48
> 10:32:17.473013 IP 182.162.143.2 > vrrp.mcast.net: VRRPv2, Advertisement,
> vrid 55, prio 110, authtype none, intvl 1s, length 32
> 10:32:17.709773 STP 802.1w, Rapid STP, Flags [Learn, Forward, Agreement],
> bridge-id 8000.d0:67:e5:a7:6f:a9.8002, length 47
> 10:32:17.940722 ARP, Request who-has 117.52.91.94 tell 117.52.91.2, length
> 46
> 10:32:18.076542 ARP, Request who-has 117.52.91.83 tell 117.52.91.2, length
> 46
> 10:32:18.294499 IP 192.168.100.20 > 192.168.100.21: GREv0, length 46:
> ARP, Request who-has 10.123.123.21 tell 10.123.123.20, length 28
> 10:32:18.294833 IP 192.168.100.21 > 192.168.100.20: GREv0, length 46:
> ARP, Reply 10.123.123.21 is-at d2:0d:45:a3:92:ea (oui Unknown), length 28
> 10:32:18.523699 IP 182.162.143.2 > vrrp.mcast.net: VRRPv2, Advertisement,
> vrid 55, prio 110, authtype none, intvl 1s, length 32
> 10:32:19.264393 IP 182.162.143.2 > ospf-all.mcast.net: OSPFv2, Hello,
> length 48
> 10:32:19.293615 IP 192.168.100.20 > 192.168.100.21: GREv0, length 102: IP
> 10.123.123.20 > 10.123.123.21: ICMP echo request, id 56071, seq 687,
> length 64
> 10:32:19.562896 IP 182.162.143.2 > vrrp.mcast.net: VRRPv2, Advertisement,
> vrid 55, prio 110, authtype none, intvl 1s, length 32
> 10:32:19.709651 STP 802.1w, Rapid STP, Flags [Learn, Forward, Agreement],
> bridge-id 8000.d0:67:e5:a7:6f:a9.8002, length 47
> 10:32:19.894332 ARP, Request who-has 117.52.91.12 tell 117.52.91.2, length
> 46
> 10:32:20.562846 IP 182.162.143.2 > vrrp.mcast.net: VRRPv2, Advertisement,
> vrid 55, prio 110, authtype none, intvl 1s, length 32
> 10:32:20.637622 ARP, Request who-has 182.162.104.62 tell 182.162.104.3,
> length 46
> 10:32:20.815462 ARP, Request who-has 117.52.91.94 tell 117.52.91.2, length
> 46
> 10:32:21.590165
> 10:32:21.603010 IP 182.162.143.2 > vrrp.mcast.net: VRRPv2, Advertisement,
> vrid 55, prio 110, authtype none, intvl 1s, length 32
> 10:32:21.709557 STP 802.1w, Rapid STP, Flags [Learn, Forward, Agreement],
> bridge-id 8000.d0:67:e5:a7:6f:a9.8002, length 47
> 10:32:22.294892 ARP, Request who-has 192.168.100.20 tell 192.168.100.21,
> length 28
> 10:32:22.295529 ARP, Reply 192.168.100.20 is-at 76:ee:e6:89:fe:46 (oui
> Unknown), length 46
> 10:32:22.633711 IP 182.162.143.2 > vrrp.mcast.net: VRRPv2, Advertisement,
> vrid 55, prio 110, authtype none, intvl 1s, length 32
> 10:32:22.882354 IP 182.162.104.10.mdns > 224.0.0.251.mdns: 0 [3q] SRV
> (QM)? Virtualization Host gcloudv2-monitoring._libvirt._tcp.local. A (QM)?
> gcloudv2-monitoring.local. AAAA (QM)? gcloudv2-monitoring.local. (109)
> 10:32:22.882373 IP 182.162.104.10.mdns > 224.0.0.251.mdns: 0*- [0q] 3/0/0
> (Cache flush) AAAA fe80::f6ce:46ff:febf:f221, (Cache flush) SRV
> gcloudv2-monitoring.local.:65535 0 0, (Cache flush) A 182.162.104.10 (155)
> 10:32:23.464329 ARP, Request who-has 117.52.91.54 tell 117.52.91.3, length
> 46
> 10:32:23.653579 IP 182.162.143.2 > vrrp.mcast.net: VRRPv2, Advertisement,
> vrid 55, prio 110, authtype none, intvl 1s, length 32
> 10:32:23.709460 STP 802.1w, Rapid STP, Flags [Learn, Forward, Agreement],
> bridge-id 8000.d0:67:e5:a7:6f:a9.8002, length 47
>
>
>
>
>
> 2013/7/6 Alex Wang <alexw at nicira.com>
>
>> Hey JinHwan,
>>
>> Could you also provide the "ovs-dpctl dump-flows" and "tcpdump" output?
>>
>> Kind Regards,
>> Alex Wang,
>>
>>
>> On Fri, Jul 5, 2013 at 12:23 AM, JinHwan Hwang <calanchue at gmail.com>wrote:
>>
>>> I've followed ovs gre setting described at this<http://blog.scottlowe.org/2013/05/07/using-gre-tunnels-with-open-vswitch/>.
>>> But i couldn't ping from a vm to other vm over gre. I just got packet loss
>>> message from ping command. As i understand ping should go through gre0 and
>>> so on br0 and em0(physical ethernet interface). I'm currently can't figured
>>> out where to start to solve this problem. I attached all data which is
>>> relevant to this problem as i think.
>>>
>>> thanks for your help
>>>
>>>
>>> em1, 2 : physical ethernet interface.
>>> vnet0 : virtual interface for the vm at host.
>>> default policy for iptables is ACCEPT.
>>>
>>> host1
>>> -----------------------------------------------
>>> # ovs-vsctl show
>>> a27e5053-57f1-4abc-ad16-740b991deaf4
>>>     Bridge "br1"
>>>         Port "vnet0"
>>>             Interface "vnet0"
>>>         Port "gre1"
>>>             Interface "gre1"
>>>                 type: gre
>>>                 options: {remote_ip="192.168.100.21"}
>>>         Port "br1"
>>>             Interface "br1"
>>>                 type: internal
>>>     Bridge "br0"
>>>         Port "tep0"
>>>             Interface "tep0"
>>>                 type: internal
>>>         Port "em2"
>>>             Interface "em2"
>>>         Port "br0"
>>>             Interface "br0"
>>>                 type: internal
>>>
>>> # ifconfig
>>> br0       Link encap:Ethernet  HWaddr 78:45:C4:F1:77:D3
>>>           inet addr:111.111.104.20  Bcast:111.111.255.255
>>>  Mask:255.255.0.0
>>>           UP BROADCAST RUNNING  MTU:1500  Metric:1
>>>           RX packets:87798 errors:0 dropped:0 overruns:0 frame:0
>>>           TX packets:8311 errors:0 dropped:0 overruns:0 carrier:0
>>>           collisions:0 txqueuelen:0
>>>           RX bytes:16964268 (16.1 MiB)  TX bytes:4102764 (3.9 MiB)
>>>
>>> br1       Link encap:Ethernet  HWaddr 06:6F:5E:19:8E:43
>>>           UP BROADCAST RUNNING  MTU:1500  Metric:1
>>>           RX packets:70 errors:0 dropped:0 overruns:0 frame:0
>>>           TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
>>>           collisions:0 txqueuelen:0
>>>           RX bytes:7424 (7.2 KiB)  TX bytes:0 (0.0 b)
>>>
>>> em1       Link encap:Ethernet  HWaddr 78:45:C4:F1:77:D1
>>>           inet addr:172.16.143.20  Bcast:172.16.143.255
>>>  Mask:255.255.255.0
>>>           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>>>           RX packets:1013749 errors:0 dropped:0 overruns:0 frame:0
>>>           TX packets:591839 errors:0 dropped:0 overruns:0 carrier:0
>>>           collisions:0 txqueuelen:1000
>>>           RX bytes:116551436 (111.1 MiB)  TX bytes:190337381 (181.5 MiB)
>>>           Interrupt:36 Memory:d6000000-d6012800
>>>
>>> em2       Link encap:Ethernet  HWaddr 78:45:C4:F1:77:D3
>>>           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>>>           RX packets:271696 errors:0 dropped:0 overruns:0 frame:0
>>>           TX packets:31348 errors:0 dropped:0 overruns:0 carrier:0
>>>           collisions:0 txqueuelen:1000
>>>           RX bytes:52996899 (50.5 MiB)  TX bytes:13088219 (12.4 MiB)
>>>           Interrupt:48 Memory:d8000000-d8012800
>>>
>>> lo        Link encap:Local Loopback
>>>           inet addr:127.0.0.1  Mask:255.0.0.0
>>>           UP LOOPBACK RUNNING  MTU:16436  Metric:1
>>>           RX packets:77086 errors:0 dropped:0 overruns:0 frame:0
>>>           TX packets:77086 errors:0 dropped:0 overruns:0 carrier:0
>>>           collisions:0 txqueuelen:0
>>>           RX bytes:9595600 (9.1 MiB)  TX bytes:9595600 (9.1 MiB)
>>>
>>> tep0      Link encap:Ethernet  HWaddr 76:EE:E6:89:FE:46
>>>           inet addr:192.168.100.20  Bcast:192.168.100.255
>>>  Mask:255.255.255.0
>>>           UP BROADCAST RUNNING  MTU:1500  Metric:1
>>>           RX packets:79785 errors:0 dropped:0 overruns:0 frame:0
>>>           TX packets:155 errors:0 dropped:0 overruns:0 carrier:0
>>>           collisions:0 txqueuelen:0
>>>           RX bytes:9641257 (9.1 MiB)  TX bytes:15049 (14.6 KiB)
>>>
>>> vnet0     Link encap:Ethernet  HWaddr FE:0D:45:A3:92:EA
>>>           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>>>           RX packets:271 errors:0 dropped:0 overruns:0 frame:0
>>>           TX packets:35 errors:0 dropped:0 overruns:0 carrier:0
>>>           collisions:0 txqueuelen:500
>>>           RX bytes:25038 (24.4 KiB)  TX bytes:3498 (3.4 KiB)
>>>
>>> # route
>>> Kernel IP routing table
>>> Destination     Gateway         Genmask         Flags Metric Ref    Use
>>> Iface
>>> 192.168.100.0   *               255.255.255.0   U     0      0        0
>>> tep0
>>> 172.16.143.0    *               255.255.255.0   U     0      0        0
>>> em1
>>> link-local      *               255.255.0.0     U     1002   0        0
>>> em1
>>> 111.111.0.0     *               255.255.0.0     U     0      0        0
>>> br0
>>> default         111.111.104.1   0.0.0.0         UG    0      0        0
>>> br0
>>>
>>>
>>>
>>>
>>>
>>> host2
>>> -----------------------------------------------
>>> # ovs-vsctl show
>>> 5dcbfca3-e518-4214-8c23-7b89b30719ad
>>>     Bridge "br0"
>>>         Port "br0"
>>>             Interface "br0"
>>>                 type: internal
>>>         Port "tep0"
>>>             Interface "tep0"
>>>                 type: internal
>>>         Port "em2"
>>>             Interface "em2"
>>>     Bridge "br1"
>>>         Port "br1"
>>>             Interface "br1"
>>>                 type: internal
>>>         Port "gre1"
>>>             Interface "gre1"
>>>                 type: gre
>>>                 options: {remote_ip="192.168.100.20"}
>>>         Port "vnet0"
>>>             Interface "vnet0"
>>>
>>>
>>> # ifconfig
>>> br0       Link encap:Ethernet  HWaddr D4:BE:D9:AC:F0:CF
>>>           inet addr:111.111.104.21  Bcast:111.111.255.255
>>>  Mask:255.255.0.0
>>>           UP BROADCAST RUNNING  MTU:1500  Metric:1
>>>           RX packets:87006 errors:0 dropped:0 overruns:0 frame:0
>>>           TX packets:13260 errors:0 dropped:0 overruns:0 carrier:0
>>>           collisions:0 txqueuelen:0
>>>           RX bytes:12556550 (11.9 MiB)  TX bytes:4318048 (4.1 MiB)
>>>
>>> br1       Link encap:Ethernet  HWaddr CA:5A:E9:93:13:4A
>>>           UP BROADCAST RUNNING  MTU:1500  Metric:1
>>>           RX packets:70 errors:0 dropped:0 overruns:0 frame:0
>>>           TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
>>>           collisions:0 txqueuelen:0
>>>           RX bytes:7424 (7.2 KiB)  TX bytes:0 (0.0 b)
>>>
>>> em1       Link encap:Ethernet  HWaddr D4:BE:D9:AC:F0:CD
>>>           inet addr:172.16.143.21  Bcast:172.16.143.255
>>>  Mask:255.255.255.0
>>>           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>>>           RX packets:903898 errors:0 dropped:0 overruns:0 frame:0
>>>           TX packets:417417 errors:0 dropped:0 overruns:0 carrier:0
>>>           collisions:0 txqueuelen:1000
>>>           RX bytes:101599551 (96.8 MiB)  TX bytes:116662118 (111.2 MiB)
>>>           Interrupt:36 Memory:d6000000-d6012800
>>>
>>> em2       Link encap:Ethernet  HWaddr D4:BE:D9:AC:F0:CF
>>>           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>>>           RX packets:287767 errors:0 dropped:0 overruns:0 frame:0
>>>           TX packets:48626 errors:0 dropped:0 overruns:0 carrier:0
>>>           collisions:0 txqueuelen:1000
>>>           RX bytes:54416236 (51.8 MiB)  TX bytes:14369437 (13.7 MiB)
>>>           Interrupt:48 Memory:d8000000-d8012800
>>>
>>> lo        Link encap:Local Loopback
>>>           inet addr:127.0.0.1  Mask:255.0.0.0
>>>           UP LOOPBACK RUNNING  MTU:16436  Metric:1
>>>           RX packets:186515 errors:0 dropped:0 overruns:0 frame:0
>>>           TX packets:186515 errors:0 dropped:0 overruns:0 carrier:0
>>>           collisions:0 txqueuelen:0
>>>           RX bytes:21395412 (20.4 MiB)  TX bytes:21395412 (20.4 MiB)
>>>
>>> tep0      Link encap:Ethernet  HWaddr 5A:97:DC:14:AD:B8
>>>           inet addr:192.168.100.21  Bcast:192.168.100.255
>>>  Mask:255.255.255.0
>>>           UP BROADCAST RUNNING  MTU:1500  Metric:1
>>>           RX packets:77121 errors:0 dropped:0 overruns:0 frame:0
>>>           TX packets:156 errors:0 dropped:0 overruns:0 carrier:0
>>>           collisions:0 txqueuelen:0
>>>           RX bytes:13815665 (13.1 MiB)  TX bytes:14693 (14.3 KiB)
>>>
>>> vnet0     Link encap:Ethernet  HWaddr FE:0D:45:A3:92:EA
>>>           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>>>           RX packets:51 errors:0 dropped:0 overruns:0 frame:0
>>>           TX packets:26 errors:0 dropped:0 overruns:0 carrier:0
>>>           collisions:0 txqueuelen:500
>>>           RX bytes:4170 (4.0 KiB)  TX bytes:1136 (1.1 KiB)
>>>
>>> # route
>>> Kernel IP routing table
>>> Destination     Gateway         Genmask         Flags Metric Ref    Use
>>> Iface
>>> 192.168.100.0   *               255.255.255.0   U     0      0        0
>>> tep0
>>> 172.16.143.0    *               255.255.255.0   U     0      0        0
>>> em1
>>> link-local      *               255.255.0.0     U     1002   0        0
>>> em1
>>> 111.111.0.0     *               255.255.0.0     U     0      0        0
>>> br0
>>> default         111.111.104.1   0.0.0.0         UG    0      0        0
>>> br0
>>>
>>>
>>> vm at host 1
>>> -----------------------------------------
>>> eth0 : 10.123.123.20
>>>
>>> vm at host 2
>>> -----------------------------------------
>>> eth0 : 10.123.123.21
>>>
>>>
>>> _______________________________________________
>>> discuss mailing list
>>> discuss at openvswitch.org
>>> http://openvswitch.org/mailman/listinfo/discuss
>>>
>>>
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://openvswitch.org/pipermail/ovs-discuss/attachments/20130708/be3e2197/attachment.html>


More information about the discuss mailing list