Return-Path: X-Original-To: apmail-incubator-cloudstack-users-archive@minotaur.apache.org Delivered-To: apmail-incubator-cloudstack-users-archive@minotaur.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 7D2009285 for ; Sat, 2 Mar 2013 08:11:13 +0000 (UTC) Received: (qmail 4252 invoked by uid 500); 2 Mar 2013 08:11:13 -0000 Delivered-To: apmail-incubator-cloudstack-users-archive@incubator.apache.org Received: (qmail 3979 invoked by uid 500); 2 Mar 2013 08:11:11 -0000 Mailing-List: contact cloudstack-users-help@incubator.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: cloudstack-users@incubator.apache.org Delivered-To: mailing list cloudstack-users@incubator.apache.org Received: (qmail 3946 invoked by uid 99); 2 Mar 2013 08:11:10 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Sat, 02 Mar 2013 08:11:10 +0000 X-ASF-Spam-Status: No, hits=1.5 required=5.0 tests=HTML_MESSAGE,RCVD_IN_DNSWL_LOW,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of aottonello@gmail.com designates 209.85.216.44 as permitted sender) Received: from [209.85.216.44] (HELO mail-qa0-f44.google.com) (209.85.216.44) by apache.org (qpsmtpd/0.29) with ESMTP; Sat, 02 Mar 2013 08:11:03 +0000 Received: by mail-qa0-f44.google.com with SMTP id bv4so220027qab.3 for ; Sat, 02 Mar 2013 00:10:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:content-type; bh=EEvIuOrnCAlFo9xcoAS8PsZ/240rAydkPLBwQmrQ3DA=; b=IHVyOclRdydlOo19/mSayOGe9wp8lKmYgAmwvj54SyTgcBV4Rm2XY2v3exfNAIRnvK nlMQQ/9ycm7pKhpdcV9a8OWr79Lhz+HcCl1KJXF9bpt/dPQHu0iQxpvfac3f094n1V9F TOm5RJWUDgr/P6SlcyXMVLKDOX/dlHTnllOW2awR7q3HF8WESu/EOveeJT1NeVIVvL+A fS8nDtXhqbbJbuzNQAhTY1XhDCRsPZLULg9aJsSwLMuLf7eGSTRFTzu4aQsBXWwz+iUn MkcvVbK+q9QWC43NdwwYck0pXF1X3bnaY1UTsl0XrFhCLATzogN/gn07nZe6A9P69lFb YEaQ== MIME-Version: 1.0 X-Received: by 10.49.128.37 with SMTP id nl5mr23178689qeb.59.1362211842955; Sat, 02 Mar 2013 00:10:42 -0800 (PST) Received: by 10.49.83.166 with HTTP; Sat, 2 Mar 2013 00:10:42 -0800 (PST) In-Reply-To: References: Date: Sat, 2 Mar 2013 09:10:42 +0100 Message-ID: Subject: Re: How the vm<->vm communicate each other? From: Andrea Ottonello To: cloudstack-users@incubator.apache.org Content-Type: multipart/alternative; boundary=047d7b676e6e022c4404d6eca9e3 X-Virus-Checked: Checked by ClamAV on apache.org --047d7b676e6e022c4404d6eca9e3 Content-Type: text/plain; charset=ISO-8859-1 Thank you! I first created a zone without sec groups and noticed that there was no way. I recreated with SG enabled and tried but maybe I missed something, I will try again now that I'm sure it should work and that I read the article. 2013/3/1 Clayton Weise > With security groups enabled, you should be able to go into the network > and make the changes required. You can find instructions here: > > > http://incubator.apache.org/cloudstack/docs/en-US/Apache_CloudStack/4.0.0-incubating/html/Installation_Guide/security-groups.html > > If that's not available then your network isn't using security groups. > I've seen this happen before where security groups _should_ be disabled > but aren't because of a global setting called > "network.securitygroups.defaultadding" which is true by default. That > throws all instances into the default security group, which (by default) > blocks all traffic except for established traffic. The problem though is > if the network offering chosen doesn't support security groups, it still > seems to throw them in there anyway which means all traffic to an instance > is blocked with no way to actually _change_ that since security groups > aren't enabled. It's one of the weird ways that CloudStack will screw > itself into the ground without knowing that little piece of knowledge... > > -----Original Message----- > From: Andrea Ottonello [mailto:aottonello@gmail.com] > Sent: Friday, March 1, 2013 9:16 AM > To: cloudstack-users@incubator.apache.org > Subject: Re: How the vm<->vm communicate each other? > > Hallo Clayton a little question on scenario I Basic: could you please tell > me how can I permit traffic between VMs? I would like to permit VMs to > "talk" with each other. From what you say, default for Basic is that every > machine only allows outgoing traffic and answers to its requests. And > actually I tried unsuccessfully to ping from a VM to another... > Thank you. > > > 2013/3/1 Clayton Weise > > > Wang, I replied to your question on LinkedIn as well. I'll respond to > > each of your questions as they relate to both basic AND advanced > networks: > > > > > Scenario I : > > > All VMs belong to one account in the same vlan deploy to the same host. > > > > Basic network: All VMs belong to one account but they each have separate > > security group rules (a set of rules for each instance). Unlike > > Amazon/Eucalyptus there is no private network with NAT going on in a > basic > > network. In a basic network public ip addresses are assigned _directly_ > to > > the VM. Each VM has its own security group rules, which by default, only > > allow established traffic. The virtual router does not route, it only > > provides DHCP and DNS services. > > > > Advanced network: VMs belonging to one account and one network (accounts > > can have more than one network) are all on the same VLAN or SDN group and > > no filtering is done between them (all traffic between VMs in the same > > network is permitted). Only established traffic is permitted and > anything > > else must be mapped through via NAT. In advanced networks, all traffic > > routes through the virtual router (NAT). > > > > Scenario II: > > > VMs in the same vlan deploy to the same host but belong to different > > > accouts. > > > > Basic network: Same as above -- _Every_ VM has its own security rules. > It > > does not matter which account owns them, by default all traffic that is > not > > established from the instance is blocked. > > > > Advanced network: This scenario is impossible in advanced networks. Two > > accounts cannot have VMs on the same VLAN. In advanced networking each > > account would have separate networks and separate VLANs. > > > > > Scenario III: > > > VMs in different vlan deploy to the same host and belong to same > account. > > > > Basic network: I believe this is possible in basic networking if two > > different public subnets had different VLAN tags. The same security > group > > rules would apply as previously stated. Only established traffic would > be > > permitted unless a security group rule permitted otherwise. No inherent > > trust exists just because they belong to the same account. > > > > Advanced network: With a VPC enabled, inter-vlan routing can be > permitted. > > By default only established traffic is permitted and the two VLANs > cannot > > communicate to each other. But rules can be enabled which will allow the > > different VLANs to communicate with one-another on specific ports and > > protocols. Without VPCs, traffic from one VLAN would NAT out through a > > public IP address to talk to the public IP address of another VLAN and > > through that other virtual router. If you're familiar with Amazon EC2 > and > > Eucalyptus, this is exactly the same way that they operate. > > > > > Scenario IV: > > > All VMs belong to one account in the same vlan deploy to the different > > > hosts. > > > > Basic network: Same as Scenario I, assuming your switch supports VLAN > > tagging and allows the traffic across. > > > > Advanced networking: Same as Scenario I, assuming your switch supports > > VLAN tagging and allows the traffic across. > > > > -----Original Message----- > > From: Wang Fei [mailto:pythonee@gmail.com] > > Sent: Thursday, February 28, 2013 6:31 PM > > To: Bryan Whitehead > > Cc: cloudstack-users@incubator.apache.org > > Subject: Re: How the vm<->vm communicate each other? > > > > What if scenario 1 in basic network? > > > > It have to support security group to isolate resource belong to different > > accounts. > > > > in that way VMs have to communicate with VR! > > > > is that correct? > > > > > > > > > > ---- > > best regards > > > > > > On Fri, Mar 1, 2013 at 9:09 AM, Bryan Whitehead > >wrote: > > > > > As long as VM's are in the same vlan all VM's can communicate. Account > > > settings or where the VM's are running should be irrelevant Your > > switches > > > should support tagging and should be setup in trunk mode or some other > > vlan > > > access mode. > > > > > > > > > > > > On Thu, Feb 28, 2013 at 4:35 AM, Wang Fei wrote: > > > > > >> Scenario I : > > >> All VMs belong to one account in the same vlan deploy to the same > host. > > >> > > >> Scenario II: > > >> VMs in the same vlan deploy to the same host but belong to different > > >> accouts. > > >> > > >> > > >> Scenario III: > > >> VMs in different vlan deploy to the same host and belong to same > > account. > > >> > > >> Scenario IV: > > >> All VMs belong to one account in the same vlan deploy to the different > > >> hosts. > > >> > > >> > > >> > > >> ---- > > >> best regards > > >> > > > > > > > > > > > > -- > Andrea Ottonello > -- Andrea Ottonello --047d7b676e6e022c4404d6eca9e3--