From dev-return-112173-archive-asf-public=cust-asf.ponee.io@cloudstack.apache.org Mon Nov 19 14:37:00 2018 Return-Path: X-Original-To: archive-asf-public@cust-asf.ponee.io Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by mx-eu-01.ponee.io (Postfix) with SMTP id 1D43E180671 for ; Mon, 19 Nov 2018 14:36:58 +0100 (CET) Received: (qmail 14567 invoked by uid 500); 19 Nov 2018 13:36:58 -0000 Mailing-List: contact dev-help@cloudstack.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@cloudstack.apache.org Delivered-To: mailing list dev@cloudstack.apache.org Received: (qmail 14551 invoked by uid 99); 19 Nov 2018 13:36:57 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd3-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 19 Nov 2018 13:36:57 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd3-us-west.apache.org (ASF Mail Server at spamd3-us-west.apache.org) with ESMTP id CEE8718166A for ; Mon, 19 Nov 2018 13:36:56 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd3-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: 0.539 X-Spam-Level: X-Spam-Status: No, score=0.539 tagged_above=-999 required=6.31 tests=[DKIMWL_WL_MED=-1.459, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=2, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=disabled Authentication-Results: spamd3-us-west.apache.org (amavisd-new); dkim=pass (1024-bit key) header.d=shapeblue.onmicrosoft.com header.b=RryfqbmG; dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=shapeblue.onmicrosoft.com header.b=iTzAXCBM Received: from mx1-lw-us.apache.org ([10.40.0.8]) by localhost (spamd3-us-west.apache.org [10.40.0.10]) (amavisd-new, port 10024) with ESMTP id u4gDK2Z3t9Cm for ; Mon, 19 Nov 2018 13:36:54 +0000 (UTC) Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-eopbgr130130.outbound.protection.outlook.com [40.107.13.130]) by mx1-lw-us.apache.org (ASF Mail Server at mx1-lw-us.apache.org) with ESMTPS id 936D061AF8 for ; Mon, 19 Nov 2018 13:36:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=shapeblue.onmicrosoft.com; s=selector1-shapeblue-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TYQaHh8UPQ4UDqbk7eXG1nn5Zytm7ZQo38shvekEnnI=; b=RryfqbmGhQqQJn7+ZI9Al/uZQoVvOahr7fGdxvi1jjsLb9Ruo2d7A+Nqo3+Q8IEqXXTDTa3ImCN42UKG0seNvynIhgr31e5Xy00YQMTVIt0cRnw5XDCwZwciqmwQMbsfOmJ07UCLQr/5vOMp/fOed6kuOHMurk8uhEz4vxwROHY= Received: from VI1PR07CA0272.eurprd07.prod.outlook.com (2603:10a6:803:b4::39) by HE1PR0701MB2154.eurprd07.prod.outlook.com (2603:10a6:3:2b::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1361.12; Mon, 19 Nov 2018 13:36:44 +0000 Received: from VE1EUR01FT044.eop-EUR01.prod.protection.outlook.com (2a01:111:f400:7e01::201) by VI1PR07CA0272.outlook.office365.com (2603:10a6:803:b4::39) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1361.9 via Frontend Transport; Mon, 19 Nov 2018 13:36:44 +0000 Authentication-Results: spf=fail (sender IP is 104.40.179.195) smtp.mailfrom=shapeblue.com; widodh.nl; dkim=fail (body hash did not verify) header.d=shapeblue.onmicrosoft.com;widodh.nl; dmarc=none action=none header.from=shapeblue.com; Received-SPF: Fail (protection.outlook.com: domain of shapeblue.com does not designate 104.40.179.195 as permitted sender) receiver=protection.outlook.com; client-ip=104.40.179.195; helo=smtpworker-in-12.xware-eu-1.o365.crossware.co.nz; Received: from smtpworker-in-12.xware-eu-1.o365.crossware.co.nz (104.40.179.195) by VE1EUR01FT044.mail.protection.outlook.com (10.152.3.137) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1339.10 via Frontend Transport; Mon, 19 Nov 2018 13:36:43 +0000 Received: from EUR04-HE1-obe.outbound.protection.outlook.com (23.103.133.179) by smtpworker-in-12.xware-eu-1.o365.crossware.co.nz with Crossware for Office365; Mon, 19 Nov 2018 13:36:42 +0000 Received: from AM4PR07MB3490.eurprd07.prod.outlook.com (10.171.190.27) by AM4PR07MB3395.eurprd07.prod.outlook.com (10.171.189.156) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1361.11; Mon, 19 Nov 2018 13:36:39 +0000 Received: from AM4PR07MB3490.eurprd07.prod.outlook.com ([fe80::39d3:c33f:6205:88bc]) by AM4PR07MB3490.eurprd07.prod.outlook.com ([fe80::39d3:c33f:6205:88bc%4]) with mapi id 15.20.1361.013; Mon, 19 Nov 2018 13:36:39 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=shapeblue.onmicrosoft.com; s=selector1-shapeblue-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=xfqnz30qYjzQQCfx0jOkVwEeUuLg7nLhAak4QIWYYho=; b=iTzAXCBMG3O7ApONbpogI/37ra+2DmFfqBQjeWtB4s8szLYGWZ8qlwfFhSo5AYsidTF4xJ/ynmu8VlIj6fCe6lh3NX3WVQlGTeb7YDLdXOFbM+hNu6AKI95jZwjAN3RTNKXNFtC1/bLeLqUMRQxfJyoVtsfWW5L+RhIM1sq+O9g= From: Rohit Yadav To: Wido den Hollander , "dev@cloudstack.apache.org" Subject: Re: VXLAN and KVm experiences Thread-Topic: VXLAN and KVm experiences Thread-Index: AQHUapjwrV/hTLNOt0WV0yPAuyBDkKUsjmMAgAAQswCAABkhgIAAB16AgAAEoYCAIOE9gIACA2EAgAebxo8= Date: Mon, 19 Nov 2018 13:36:39 +0000 Message-ID: References: <2c61704b-7cbc-b868-80ed-eaf39a0b2d17@widodh.nl> <1c497604-c62d-9b67-3acb-620aed40923e@widodh.nl> ,<0115beb8-e465-840f-a154-0f96ed86adc0@widodh.nl>, In-Reply-To: Accept-Language: en-US, en-IN Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: Authentication-Results-Original: spf=none (sender IP is ) smtp.mailfrom=rohit.yadav@shapeblue.com; x-originating-ip: [40.67.255.213] x-ms-publictraffictype: Email X-Microsoft-Exchange-Diagnostics-untrusted: 1;AM4PR07MB3395;6:FBiy0UxNc8RUbWJczj3cQyYWjXAGR0koP9oKfVUYRunsN+K3hzMqFdNratXkkQ+C1HPZb2Bvz7bl9gs2ywtWhZO9qATS5SuACpkIeegAxUobZeuAIBF/an0Djtu/SLCMid3wWnLvtFS9b/KGzsn3+et2VUeJ/Lf7oUn+7TKOIzcJagv5PqbjfIMiljXB8c72NTF6e9jecJmqmynW7K7Lg409RSwZq4mixIMGaa8D/c+KT6oaSSHTs8hO5QIcpStvowW2bsKXNO0w9Aw1EufcmK6+NwjSIN5HzKOXhHkYeiv55HHpp0c2SFF1BLmi5211F8AOkHreZCpogUpoTTF2sb1/oHBvA8BWbW6b1lrhn1cDBpwnQQ9Lh+T8wC4JllhEaOfHL+RUPU+yZuzpqAKjNjIjQucqF94TpQScz33zNPaJ3zvj28P7kH7c7+dout3m/7MRq9GO99aUerBozbJXKA==;5:Pp1unorzgJdNe1YrAVrBqa8j/guajVJOcoEpETKyDi3kFtYcWxjx0E8IF3+2LKNwoiCagxKM2QdYYRHqtWWmWeHlewV0CmS6c8sYAjZTeOQYIdXi4lWXUXXUxjIs41rDcwW1BIvR/d1mBDuMZtBSBkO2+9rvBFxTCkA4aUfeZRY=;7:WawHpXBPKVM/hlHWwyk8Yyav1W+XVV3fNKxSGiM5P/kLkwhMOfGTRlvyRCnMNQzXq83YlBlSOUxaZpsvmyszIVRA+Q2alDvn2kcEvT+b5YjkLMnzG9xNneEx6QnBKzBF/4Adu0EmbkyCCjH1fTc5uA== x-ms-exchange-antispam-srfa-diagnostics: SOS; X-MS-Office365-Filtering-Correlation-Id: 82d8508f-bbe0-426b-693f-08d64e240b8e X-Microsoft-Antispam-Untrusted: BCL:0;PCL:0;RULEID:(2390098)(7020095)(4652040)(7021145)(8989299)(5600074)(711020)(4534185)(7022145)(4603075)(4627221)(201702281549075)(8990200)(7048125)(7024125)(7027125)(7023125)(2017052603328)(7153060)(7193020);SRVR:AM4PR07MB3395; X-MS-TrafficTypeDiagnostic: AM4PR07MB3395:|HE1PR0701MB2154: X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(6040522)(2401047)(8121501046)(5005006)(93006095)(93001095)(10201501046)(3002001)(3231415)(944501410)(52105112)(148016)(149066)(150057)(6041310)(2016111802025)(20161123564045)(20161123562045)(20161123560045)(20161123558120)(6043046)(201708071742011)(7699051)(76991095);SRVR:AM4PR07MB3395;BCL:0;PCL:0;RULEID:;SRVR:AM4PR07MB3395;BCL:0;PCL:0;RULEID:(6040522)(2401047)(5005006)(8121501046)(3002001)(10201501046)(93006095)(93003095)(3231415)(944501410)(52105112)(148016)(149066)(150057)(6041310)(20161123564045)(2016111802025)(20161123562045)(20161123560045)(20161123558120)(6043046)(201708071742011)(7699051)(76991095);SRVR:HE1PR0701MB2154;BCL:0;PCL:0;RULEID:;SRVR:HE1PR0701MB2154; x-forefront-prvs: 08617F610C X-Forefront-Antispam-Report-Untrusted: SFV:NSPM;SFS:(10019020)(396003)(366004)(136003)(346002)(376002)(39840400004)(199004)(189003)(110136005)(6246003)(26005)(186003)(68736007)(256004)(5024004)(14444005)(229853002)(3480700005)(2900100001)(476003)(6436002)(508600001)(93886005)(14454004)(102836004)(11346002)(446003)(53936002)(55016002)(236005)(486006)(6306002)(54896002)(44832011)(9686003)(2501003)(316002)(81156014)(8936002)(81166006)(8676002)(86362001)(53546011)(76176011)(6506007)(97736004)(5660300001)(25786009)(7736002)(7696005)(966005)(106356001)(66066001)(105586002)(99286004)(606006)(71190400001)(71200400001)(74316002)(2906002)(33656002)(3846002)(6116002)(21314003);DIR:OUT;SFP:1102;SCL:1;SRVR:AM4PR07MB3395;H:AM4PR07MB3490.eurprd07.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;A:1;MX:1; received-spf: None (protection.outlook.com: shapeblue.com does not designate permitted sender hosts) X-Microsoft-Antispam-Message-Info-Original: fTMV3fJnPO8P03YKCoJiZwPBoe+bjMzMn/yD0ygiJ+pfxqPZzkPJdH/Ca1t0a+yaWxnZRubX/Cg6+5s9BO4J48wdSoC54D2CIVHBMTfBGDOLVoR57Jg4Y2z68UbDfrskMvBSU4l0pvDX96TeW1enigEhuIqkSfvgmFIo/ISuduOgMPhLvBZ0mPMIMpemCzKfmPiAi1qsZjOufO03GVkKx3L8V52iA2BdRZtNUmEQDghkt75XRNQhJGfFIZCHKSS+mo7N7lwn7vMNnN60CehJcO9J40+z6w025DFrOOGn8ZcyRiZelgbhNzHvMH5Sjgwn0cdRs6k482iDhFdbsmoBxXe4No8IHAGhGFogd6XcwYY= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-CWesigProcessed: Y X-MAIL_SIG_VERSION: 4.0.2.4832 X-MAIL_SIG_SERVER: smtpworker-in-12.xware-eu-1.o365.crossware.co.nz X-MAIL_SIG_CONFIGNAME: Plain Text for Mailing Lists etc X-MAIL_SIG_CONFIGNAMEPLIED: Plain Text for Mailing Lists etc Content-Type: multipart/alternative; boundary="_000_AM4PR07MB3490543719BC2E67CBDF3AB9E9D80AM4PR07MB3490eurp_" MIME-Version: 1.0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR07MB3395 X-EOPAttributedMessage: 0 X-CrossPremisesHeadersPromoted: VE1EUR01FT044.eop-EUR01.prod.protection.outlook.com X-CrossPremisesHeadersFiltered: VE1EUR01FT044.eop-EUR01.prod.protection.outlook.com X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR01FT044.eop-EUR01.prod.protection.outlook.com X-Forefront-Antispam-Report: CIP:104.40.179.195;IPV:NLI;CTRY:;EFV:NLI;SFV:NSPM;SFS:(10019020)(376002)(39840400004)(396003)(346002)(136003)(2980300002)(1110001)(1109001)(339900001)(199004)(189003)(86362001)(6306002)(54896002)(15974865002)(236005)(6506007)(66066001)(9686003)(53936002)(25786009)(76176011)(5660300001)(61614004)(476003)(446003)(11346002)(186003)(126002)(105606002)(55016002)(336012)(606006)(6116002)(106466001)(44832011)(486006)(102836004)(53546011)(26005)(2900100001)(68736007)(3846002)(14444005)(5024004)(14454004)(8936002)(93886005)(3480700005)(85426001)(84326002)(2501003)(97736004)(71190400001)(4744004)(356004)(33656002)(8676002)(81156014)(99286004)(81166006)(6246003)(7696005)(16586007)(229853002)(7736002)(74316002)(316002)(966005)(508600001)(2906002)(110136005)(21314003);DIR:OUT;SFP:1102;SCL:1;SRVR:HE1PR0701MB2154;H:smtpworker-in-12.xware-eu-1.o365.crossware.co.nz;FPR:;SPF:Fail;LANG:en;PTR:InfoDomainNonexistent;A:1;MX:1; X-Microsoft-Exchange-Diagnostics: 1;VE1EUR01FT044;1:thwBGgGWCW3VANQTbMBM05Etfr7G2Lb6Uq12e/xpg3tb0ze5PGHo8FH982hup5Ji5Rcl+WdUwPRIm3kynVBqRi3xoLbTgMQH5MlwQP5Z72BvUqEUz5O+YjRbbiFyoTPB X-MS-Office365-Filtering-Correlation-Id-Prvs: 1d9a7c3d-0ba2-44ce-d280-08d64e2408db X-Microsoft-Antispam: BCL:0;PCL:0;RULEID:(2390098)(7020095)(4652040)(7021145)(8989299)(4534185)(7022145)(4603075)(4627221)(201702281549075)(8990200)(7048125)(7024125)(7027125)(7023125)(5600074)(710020)(711020)(2017052603328)(7153060)(7193020);SRVR:HE1PR0701MB2154; X-Microsoft-Exchange-Diagnostics: 1;HE1PR0701MB2154;3:eukmXC6T1ijWIUFUC7yxuyn+l79Dziw4P5CY76vpLir99xpAX0PDCSGN9ukfqV7sreh1KYKmv21q+iMWirwOPEqzlDSASnnE1yEeJz2lNncmfi5zJu51eoVcHMnwbErXoTS5kLXha+yxaKN+j6te1JJRNr7lXDzEKGshhvqMw7ckjnY0W44xFZQg8y5PiQNGQjxRiG+lHyECZWV8QT8VsHXlXpiwP9fFMItMFqgd7MapQTsZMYpubaF+CKWyT/rEPLX9JmbtGbddLATe593egdGJGY6mXaZ98KtmSAI0IBD2IPO7JcMpAOEhV6YMTgV9jK/KmdimtqbnhMMYVde5pg==;25:L9qo3LT2+UDcxHeoiMaOy/BOVxNUPBpnUaOWQljYwg+jZPHAW6BQhyFfy8fUWTbrPtM80caj0y8w8Y86Nwi22hieSfSL8jDYY8IZhbpvohqLRzUUxc716tQ4/yBbit/Vk8CU7OerFchZnsr1TB/P86GbG6YbDs8u7JAE2bf0P+A/mI2dPi/LnN7epgHJQNl8ivPgpWarIbCbiVRkh0MvoOvM+hGs4qMuKJzZtuBrRKjvNeVxgtljfT06hyy+4mDZDoLjySus8GKSWi64J6/rCfK40PUhPYS4Yp2On0e2iQoIa2RB1gxJygrF1KwZiAKnlWzGpiAJFYubrdnx09f1JQ==;31:wz9njRleuoXlOOFuQmk41dYu4Nj6Tkn1QjEbEM31foxoR1OjeHVJgD+M/ZernVdyYoWEJ+3Hfm0WbWH2e+/k2qd3AJhRj4WyWJYZgiY6hLVRS5NLjVtFsUJYCfcv5Qv2sJ19FVTLeQ7i0PBKBziUIC6bHK9Gz3ISCiCERcEVdNqdwSG0DP+Y7WGN79kIPk1TcHtVaL/TJar1/Mb7pkJfPeLkvl7UCo115TSkucBOOHY= X-Microsoft-Exchange-Diagnostics: 1;HE1PR0701MB2154;20:aOxy52VUAqJMC4iEKbAqUZzlbMJzda+r298Go+Gr0JZBdmCJ8KbpNRCWh7mSSBg+PeCTHx+mV2BCYCokemIzxBHfmceTNa4zbei9WL+3ClO0yPIkHAQ6FZDQCZ+7SX1YSA6tswePHN7YAgBALRNoTF45oAU1xu0vc3Af8zopdeQIX4v4tVtvbfHvrVc7xugNGXkQmBJFu8pY96gwEd/njGxvs1EFnaUOAuxuVq4WX7OYRY/IPz58SkphUuLOfnUe;4:IlKcl/BSEJu1RdRBjnOM6kQ8gG9zvWUEO6EkHuOE7wrGKw0ZIqiIow1Bg2ckmbJZWJbMcPB2JU7THiCXreMkcBo7vkcP/sbtlpBjZ29NLCkSBIPOxixAJzO4ik2sSJP+vvh49n8KX/48BDbNasLgBB4IhGAeihN9mpIiz5GpCkfudKCkDn8hHJJq3RfyQAFSSOvDM5YtIhKF+q97kS+fM1TSvJCIlb2zAqmrmJlApMzoH6DotVoVdzhuQTDhqI8UNrg0hy1WIWpmCksqzWcQOg== X-Forefront-PRVS: 08617F610C X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1;HE1PR0701MB2154;23:G6H6JifYi9Oe/khMlaArUx0qxyuy4m3S65rteZM?= =?us-ascii?Q?GQJQgwkdDXNUFySj++QbeO4hDivIa7rWS7DcZzXfJYUeDWaf1uGBBUPKnMRx?= =?us-ascii?Q?PoywIDCmVZqNZR2C/WoQrE6NEzOJMVduKPHPMm2xLfpgAXdFaK3fJkoqe3Mg?= =?us-ascii?Q?7707RiMyrBnA1cTX02BaNZqC/DJivAZWOmJDRF1gTT1PoT3Ja1vfwZCwBce7?= =?us-ascii?Q?/T7ZghllueQDDB7NfcGBuv8W3yNIVYmI34SLgHoYZvOVPubNq4R4XDxrNqh3?= =?us-ascii?Q?1KGhBl9ezT4+axu51k38hMB/xDjF/u11XeIG+/EycTSOLysO/z5JZjivUdBD?= =?us-ascii?Q?qlZEROqAPay5SulMLKFkUY3CIqjH0hINsJPJpqOpoPgYIDVafYGoX1S19HxM?= =?us-ascii?Q?goFmEDAF6NL02j3CllUxx6aMKbAqrPyp+XXBkn1qsKeeHdMT7QgISGNiaYm1?= =?us-ascii?Q?7TpOtDgxB+AbPnC137SLkXowLXOQJ1tKUCZXCXxGf2geYCy8yOUXq6l0AgKE?= =?us-ascii?Q?nX/dj1jPAC4O/xgsqF2VBNSzStqkUcl9fyC1SLIYkePqY7YyTNsR0foxTHss?= =?us-ascii?Q?VqzuvApOmSBMd90+uZCJFxudcC/txeu37bLUF6Cz5FFxiYG6oHyTUIDlCUu5?= =?us-ascii?Q?Qn6Nd9YbJQfB7rEJ92Y8SgqkFPlurL55ckcd7fb7o02xp8MlBupE2sRM6HeI?= =?us-ascii?Q?u2P/Dsb2KxSYCCuivhF9ByJcC5t5+AUgKXbrPP+Q3rQ7EcMluCiZYurYoZ9C?= =?us-ascii?Q?eVc+vvJrzWnZERX0mahd8zyZfuwgQLIVIRAJKj+J0gKDtX+za50NKnFwNfsQ?= =?us-ascii?Q?Kfzy3IKtJgDcTICYWXhd7Vd9hrYmP6jJIU77Q4qj67YlZbCxgLuAGOwI8hAq?= =?us-ascii?Q?ny5zIgeD85yj7P3k8ZbKMDEhrJincJM4fP61SgxWDnbH0VyY/tbwy26pcTc5?= =?us-ascii?Q?r/M0aP8lnwRcMXuJqhQQ/PLNKE44ULSSGunRF/BR9m0aJvP07mu+xaeCQuzF?= =?us-ascii?Q?AYF0uAqz865zFk2YILox+VQKa0xS8xw5IsaCVTWMUw5v/QGvNtsbop1WGnEz?= =?us-ascii?Q?p+Apn8doMbEsQI5QI5jzAZ8keWkFLHUqQK4VyR3VjrwtycsejqrLhHDMJov5?= =?us-ascii?Q?yF45A4HYDf+poAEciBUutrsDy292hrrRVfIl2Faf/bdPTQ/8iOYwfoDrAzUs?= =?us-ascii?Q?9lDWYTac6U0vT2ulSdF1hkyQMNZUYPpeX8DosrFejre0/mmd101S5uHGFkYT?= =?us-ascii?Q?SJQc1XGhqz9+7Y5luzxHh/iwHOxSijhSliBJjM0D25KKNCR4PdUN21Ay4K/M?= =?us-ascii?Q?E3wzJ7aVy+5eL9+7tXpJcYgzAqs++M9QEUOBz4hlYX6JRdrhraJnMpplsLNj?= =?us-ascii?Q?2zwoAkoneV48niW1SIXinNGOM0NrKT+L2CgGsBbMffkCTfXnfUmJgCI5Chkw?= =?us-ascii?Q?gW0A5qPxCojHAa2Z85JtBbqIq1yM6GrD02wXXthaj7md4+6G4ztuzvfcFejo?= =?us-ascii?Q?TEXTIvTrUTZ989wMp6iJxzZO2yZ7GuYCGNOqc1M/wDL32+15W7UWNxC2POfi?= =?us-ascii?Q?142WWKCHViPgzLWpCrQxJDaw9NvtNJrHHD+PrLYyOIOb/8aD1en0Qdv3vGE/?= =?us-ascii?Q?a?= X-Microsoft-Antispam-Message-Info: 3dAQp15EsH70dkfXHk81m/DcO6KpWH5FbcLk986C2q20xAQCV51mGK1nOIdRTSwq5SRDgaaVPXYSINiffd51328ZJZZWFJEIzLQF6R/Cq7XWNLmyjyFf8n99Ao7K/WNm+cvl6TWcdxUCniGdVu8sDscLRKVrweFxKLFDfW5x+9jrlziZNwxnOQay0wZq3EdtuBOy97jJaYvJnc0BCR0lcIcSm61PvpIl+mg4sZ/0drNfR8zB9phVL2MrgZaZ7uqhwJX3dnulmBocBQZur3WTDCLXmRD72PX992oT3DcJryIDMjKffMNWHqejASUoRVD6hXfxT7Zq06bL28i6kBjZydY7yllVf6ZxE9EpLpcKFxg= X-Microsoft-Exchange-Diagnostics: 1;HE1PR0701MB2154;6:+arfGBnL/I3N4XJn2yJxC5c40vgn/ceg2A1Hso8z4djzTEURHU211udg2gYVr6mvG16v3PkGcyx4UH5ORqfb6a3KMhGYhW4qAhjIkf6oet1p2SOKT0BQBqjSf/ZB1iYZoKgNryjppG8NlkPkT2mXqf8kJOPHB/IyfS1IbWc1gpwTqFjtCZpdEBYY/gvk1uPu7D+gk7Cd1SOvF05jVEXYmlCly6euOIdLHVPTiWyvk2tdfc5D6gAGHf6x0NzyoLElls9PzE00hq9wGe10WLtNouBFiYT9GtvP+/5PhWcxWTx9Ecac9vmb5DbwpXDzeS2XBJoQugF7kDUhw5N3xpxRJI69EAybkI7dSHwF6DSuoiZLwxIXx3Y3Cu92I+vWs8ps1bElU5CDSMuHLfl6vcAB5DGiIBViBwLil25IeiZh1+zb1FiFIlcdl8Rf/vZ/CYN9hmHqpHfyv534sCI9B/Inlg==;5:L09jZUfnkhIDqh31rXr8t9METbvkDD83SnYJXTg7IyUQUdstVbrhemlu5Yq/D9dJovJNqL1qfnpnKTpJ4HILuWA3F9q0K1EJpJjKbzUh6ErtBg37ujZiYLZTSs7JyQF/9tuag8wxYAizabPxj8BtQSgcotiK/Gm5nHQlS92B/hA=;7:I2ad8AhN7X30/MS/sEunxmBfq7tn+zmaG+hTvp0LtwcB2DqyUK2wISBpsbUAMCaA3wYdv5GmT5NhCp7NNSC2d4cFs/psGpceDRe6vnG9Le/DZmD2Ve6jHU1U1TnjA5bwpXW1V6JChJVTlqW2bHDXrw== X-OriginatorOrg: shapeblue.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Nov 2018 13:36:43.6519 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 82d8508f-bbe0-426b-693f-08d64e240b8e X-MS-Exchange-CrossTenant-Id: fc8906f6-e50e-4dad-98a0-ec2e3abe14f5 X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=fc8906f6-e50e-4dad-98a0-ec2e3abe14f5;Ip=[104.40.179.195];Helo=[smtpworker-in-12.xware-eu-1.o365.crossware.co.nz] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0701MB2154 --_000_AM4PR07MB3490543719BC2E67CBDF3AB9E9D80AM4PR07MB3490eurp_ Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable All, I need some pointers around vxlan debugging and configuration: (sorry for t= he long email) I'm working on a concept CI system where the idea is to setup CloudStack wi= th kvm hosts and use vxlan isolation for guest, mgmt and public networks, = and then run CI jobs as CloudStack projects where monkeybox VMs (nested kvm= VMs) run in isolated networks and are used to test a CloudStack build/bran= ch/PR. I've two Ubuntu 18.04.1 based i7 mini pcs running KVM, where there is a sin= gle bridge/nic cloudbr0 to carry public, guest and mgmt network that is vxl= an based. I've set max_igmp_memberships to 200 and to see console proxy etc= I used vxlan://untagged for the public IP address range. The gigabit switc= h between them does not support igmp snooping. Now the problem is that in t= he nested VMs in an isolated network (VRs public nic plugs into cloudbr0, a= nd guest nic plugs into a bridge that has vxlan end point for some VNI) , t= he download speed from public network is very slow. I've enabled the defaul= t udp port for vxlan on both hosts. How do I debug vxlans, what's going wro= ng? (do note that I've a single bridge for all those networks, with no vlan= s) Regards, Rohit Yadav ________________________________ From: Simon Weller Sent: Wednesday, November 14, 2018 10:55:18 PM To: Wido den Hollander; dev@cloudstack.apache.org Subject: Re: VXLAN and KVm experiences Wido, Here is the original document on the implemention for VXLAN in ACS - https:= //cwiki.apache.org/confluence/display/CLOUDSTACK/Linux+native+VXLAN+support= +on+KVM+hypervisor It may shed some light on the reasons for the different multicast groups. - Si ________________________________ From: Wido den Hollander Sent: Tuesday, November 13, 2018 4:40 AM To: dev@cloudstack.apache.org; Simon Weller Subject: Re: VXLAN and KVm experiences On 10/23/18 2:34 PM, Simon Weller wrote: > Linux native VXLAN uses multicast and each host has to participate in mul= ticast in order to see the VXLAN networks. We haven't tried using PIM acros= s a L3 boundary with ACS, although it will probably work fine. > > Another option is to use a L3 VTEP, but right now there is no native supp= ort for that in CloudStack's VXLAN implementation, although we've thought a= bout proposing it as feature. > Getting back to this I see CloudStack does this: local mcastGrp=3D"239.$(( ($vxlanId >> 16) % 256 )).$(( ($vxlanId >> 8) % 256 )).$(( $vxlanId % 256 ))" VNI 1000 would use group 239.0.3.232 and VNI 1001 uses 239.0.3.233 1000. Why are we using a different mcast group for every VNI? As the VNI is encoded in the packet this should just work in one group, right? Because this way you need to configure all those groups on your Router(s) as each VNI will use a different Multicast Group. I'm just looking for the reason why we have this different multicast groups= . I was thinking that we might want to add a option to agent.properties where we allow users to set a fixed Multicast group for all traffic. Wido [0]: https://github.com/apache/cloudstack/blob/master/scripts/vm/network/vnet/mo= difyvxlan.sh#L33 > > ________________________________ > From: Wido den Hollander > Sent: Tuesday, October 23, 2018 7:17 AM > To: dev@cloudstack.apache.org; Simon Weller > Subject: Re: VXLAN and KVm experiences > > > > On 10/23/18 1:51 PM, Simon Weller wrote: >> We've also been using VXLAN on KVM for all of our isolated VPC guest net= works for quite a long time now. As Andrija pointed out, make sure you incr= ease the max_igmp_memberships param and also put an ip address on each inte= rface host VXLAN interface in the same subnet for all hosts that will share= networking, or multicast won't work. >> > > Thanks! So you are saying that all hypervisors need to be in the same L2 > network or are you routing the multicast? > > My idea was that each POD would be an isolated Layer 3 domain and that a > VNI would span over the different Layer 3 networks. > > I don't like STP and other Layer 2 loop-prevention systems. > > Wido > >> >> - Si >> >> >> ________________________________ >> From: Wido den Hollander >> Sent: Tuesday, October 23, 2018 5:21 AM >> To: dev@cloudstack.apache.org >> Subject: Re: VXLAN and KVm experiences >> >> >> >> On 10/23/18 11:21 AM, Andrija Panic wrote: >>> Hi Wido, >>> >>> I have "pioneered" this one in production for last 3 years (and suffere= d a >>> nasty pain of silent drop of packages on kernel 3.X back in the days >>> because of being unaware of max_igmp_memberships kernel parameters, so = I >>> have updated the manual long time ago). >>> >>> I never had any issues (beside above nasty one...) and it works very we= ll. >> >> That's what I want to hear! >> >>> To avoid above issue that I described - you should increase >>> max_igmp_memberships (/proc/sys/net/ipv4/igmp_max_memberships) - other= wise >>> with more than 20 vxlan interfaces, some of them will stay in down stat= e >>> and have a hard traffic drop (with proper message in agent.log) with ke= rnel >>>> 4.0 (or I silent, bitchy random packet drop on kernel 3.X...) - and al= so >>> pay attention to MTU size as well - anyway everything is in the manual = (I >>> updated everything I though was missing) - so please check it. >>> >> >> Yes, the underlying network will all be 9000 bytes MTU. >> >>> Our example setup: >>> >>> We have i.e. bond.950 as the main VLAN which will carry all vxlan "tunn= els" >>> - so this is defined as KVM traffic label. In our case it didn't make s= ense >>> to use bridge on top of this bond0.950 (as the traffic label) - you can >>> test it on your own - since this bridge is used only to extract child >>> bond0.950 interface name, then based on vxlan ID, ACS will provision >>> vxlanYYY@bond0.xxx and join this new vxlan interface to NEW bridge crea= ted >>> (and then of course vNIC goes to this new bridge), so original bridge (= to >>> which bond0.xxx belonged) is not used for anything. >>> >> >> Clear, I indeed thought something like that would happen. >> >>> Here is sample from above for vxlan 867 used for tenant isolation: >>> >>> root@hostname:~# brctl show brvx-867 >>> >>> bridge name bridge id STP enabled interfaces >>> brvx-867 8000.2215cfce99ce no vnet6 >>> >>> vxlan867 >>> >>> root@hostname:~# ip -d link show vxlan867 >>> >>> 297: vxlan867: mtu 8142 qdisc noqueue >>> master brvx-867 state UNKNOWN mode DEFAULT group default qlen 1000 >>> link/ether 22:15:cf:ce:99:ce brd ff:ff:ff:ff:ff:ff promiscuity 1 >>> vxlan id 867 group 239.0.3.99 dev bond0.950 port 0 0 ttl 10 ageing = 300 >>> >>> root@ix1-c7-2:~# ifconfig bond0.950 | grep MTU >>> UP BROADCAST RUNNING MULTICAST MTU:8192 Metric:1 >>> >>> So note how the vxlan interface has by 50 bytes smaller MTU than the >>> bond0.950 parent interface (which could affects traffic inside VM) - so >>> jumbo frames are needed anyway on the parent interface (bond.950 in exa= mple >>> above with minimum of 1550 MTU) >>> >> >> Yes, thanks! We will be using 1500 MTU inside the VMs, so all the >> networks underneath will be ~9k. >> >>> Ping me if more details needed, happy to help. >>> >> >> Awesome! We'll be doing a PoC rather soon. I'll come back with our >> experiences later. >> >> Wido >> >>> Cheers >>> Andrija >>> >> rohit.yadav@shapeblue.com=A0 www.shapeblue.com Amadeus House, Floral Street, London WC2E 9DPUK @shapeblue =20 =20 > On Tue, 23 Oct 2018 at 08:23, Wido den Hollander wrote: >>> >>>> Hi, >>>> >>>> I just wanted to know if there are people out there using KVM with >>>> Advanced Networking and using VXLAN for different networks. >>>> >>>> Our main goal would be to spawn a VM and based on the network the NIC = is >>>> in attach it to a different VXLAN bridge on the KVM host. >>>> >>>> It seems to me that this should work, but I just wanted to check and s= ee >>>> if people have experience with it. >>>> >>>> Wido >>>> >>> >>> >> > --_000_AM4PR07MB3490543719BC2E67CBDF3AB9E9D80AM4PR07MB3490eurp_--