[ovirt-users] MAC spoofing for specific VMs
Simone Tiraboschi
stirabos at redhat.com
Tue May 12 08:30:12 UTC 2015
----- Original Message -----
> From: "Christopher Young" <mexigabacho at gmail.com>
> To: users at ovirt.org
> Sent: Monday, May 11, 2015 8:12:22 PM
> Subject: [ovirt-users] MAC spoofing for specific VMs
>
> I'm working on some load-balancing solutions and they appear to require MAC
> spoofing. I did some searching and reading and as I understand it, you can
> disable the MAC spoofing protection through a few methods.
>
> I was wondering about the best manner to enable this for the VMs that require
> it and not across the board (if that is even possible). I'd like to just
> allow my load-balancer VMs to do what they need to, but keep the others
> untouched as a security mechanism.
>
> If anyone has any advice on the best method to handle this scenario, I would
> greatly appreciate it. It seems that this might turn into some type of
> feature request, though I'm not sure if this is something that has to be
> done at the Linux bridge level, the port level, or the VM level. Any
> explanations into that would also help in my education.
You can do it with vdsm-hook-macspoof. You need to install it on all the involved host than you can control its behavior at VM level and also at device/interface level.
Please follow the instruction here at VM-level hooks section to create a custom property to control it:
http://www.ovirt.org/Vdsm_Hooks#VM-level_hooks
> Thanks,
>
> Chris
>
> _______________________________________________
> Users mailing list
> Users at ovirt.org
> http://lists.ovirt.org/mailman/listinfo/users
>
More information about the Users
mailing list