
On Fri, Jan 10, 2014 at 03:06:28PM +0200, Itamar Heim wrote:
On 01/10/2014 01:32 PM, Dan Kenigsberg wrote:
On Thu, Jan 09, 2014 at 10:53:25PM +0200, Lior Vernia wrote:
Hello Alan,
On 09/01/14 10:07, Alan Murrell wrote:
Hello,
I am evaluating oVirt as a replacement/alternative to VMware deployments we typically do. I have installed and all-in-one setup on a test box (which itself used to be an ESXi server), but it only has one NIC. I trying to duplicate our typical configuration we do in VMware, which is this:
1.) we create several "port groups" on the vSwitch, each assigned a VLAN ID, such as:
- VLAN001 (VLAN ID: 1) - VLAN002 (VLAN ID: 2) - VLAN009 (VLAN ID: 9) - VLAN010 (VLAN ID: 10) - VLAN200 (VLAN ID: 200) - TRUNK (VLAN ID: 4095 - in VMware-world, VLAN ID "4095" is "all VLANS" and basically just passes the VLANs through to whatever is attached to the port group for the VM to handle)
2.) We assign VMs to port groups appropriate for the VLAN they are part of. 3.) The only VM that has a NIC assigned to the "TRUNK" port group is the firewall (which is Linux), and we create VLAN interfaces on it (i.e., "eth1.1", "eth1.2", "eth1.10", "eth1.200"). The firewall VM acts as the router between the various VLANs.
To replicate the above in oVirt, I created logical networks for each VLAN, and assigned the appropriate VLAN ID. It seems oVirt/KVM does not have an equivalent for VMware's VLAN ID of "4095", so after some searching around, so for the "TRUNK" network, I left it with no VLAN assigned. Because i cannot add VLAN and non-VLAN networks to the same physical NIC, after some searching around, it looks like I may have to utilise two NICS: one for the VLAN networks and one for the "TRUNK" network.
That is true. One non-VLAN network can in fact sit on the same NIC with VLAN networks, but it has to be non-VM.
This was devised as a security constraint - otherwise, a VM attached to the non-VLAN network could sniff traffic from another (VLAN) network. However, it seems that this is exactly what you need - a special VM that is designed to do just that.
isn't that was promiscious mode (aka port mirroring) is for?
Oh that makes more sense... But unfortunately, it is impossible to mirror more than a single network onto a vnic. (Engine implementation limitation). However, one can device a tc-based after_network_setup hook, that directs all traffic from all bridges onto a specific target bridge, onto which the firewall VM is connected. Dan.