Cloudstack creates VLAN sub-interface on wrong interface on KVM #11940
-
problemI have a fresh cloudstack setup using advanced networking (without security groups) in a zone, where the VLAN sub-interface is being created on the wrong interface on the KVM hosts. On the KVM host, I have a single physical interface attached to a bridge, cloudbr0. I then have a VLAN sub-interface for management configured on the bridge, as the port is a trunk and all VLANs we want to be tagged. This works fine, cloudstack can add the host, communication works as expected. The problem is when I go and create either a guest network, or assign public IPs with a VLAN tag, the VLAN sub-interface along with a new bridge is getting created on ens33 instead of cloudbr0. I can't figure out why this is happening. The labels seem to be configured properly in the agent: To describe a bit more about our use case, we're primarily looking to leverage L2 networks in cloudstack. Each host will have a single interface that is trunked, and we will be dividing traffic based on VLANs. I would have expected that cloudstack creates the VLAN sub-interfaces on the cloudbr0 bridge, and not the parent of this bridge. versionsCloudstack version: 4.20.2.0 The steps to reproduce the bug
What to do about it?Cloudstack should use the right bridge |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 3 replies
-
|
Thanks for opening your first issue here! Be sure to follow the issue template! |
Beta Was this translation helpful? Give feedback.
-
|
@cisco-abrandel could you try this bridge configuration on the KVM: cloudbr0 -> ens33.3 |
Beta Was this translation helpful? Give feedback.
-
|
this is intended I think. have you encountered any problem caused by it ? @cisco-abrandel |
Beta Was this translation helpful? Give feedback.
I was seeing what I thought were issues related to this, but it turns out the issues were elsewhere. For full disclosure, we're running some small KVM test hosts on VMware, and has promiscuous enabled for the port group. This caused some minor looping of packets, one side effect of which was the linux bridge learned the KVM guests MAC on the wrong port occasionally, causing traffic blackholing. The solution for our specific topology was to disable promiscuous on the VMware port group the KVM host are in, and instead use MAC learning on the DVS.