Skip to content

Latest commit

 

History

History
301 lines (184 loc) · 14.4 KB

09.md

File metadata and controls

301 lines (184 loc) · 14.4 KB

+++ date = "2015-09-30" draft = false weight = 09 title = "Lab 09 - Neutron Networks" +++

Lab Duration: 60 minutes

Lab Objective

The Neutron service can not be well controlled from the OpenStack Horizon dashboard. However, visually minded individuals may find it helpful to use the Horizon dashboard to to examine current network configuration as it does produce very clear illustrations of current network configuration. At the conclusion of this lab, students should feel comfortable creating and modifying network settings with Neutron at the CLI.

1. Creating a virtual network and a router with OpenStack Horizon dashboard

In this section, we'll create a network for a tenant (acme_inc), so that you can compare and contrast the differences between working with the OpenStack Horizion dashboard, and the CLI commands.

  1. Log into the OpenStack Horizon dashboard on the controller as aliceanderson // fa5tpa55w0rd

  2. Navigate to Project > Network > Network Topology and click "+ create network"

    create network

  3. Fill out the pop up box with the following information:

    NetworkName: acme-inc-network
    AdminState: UP
    

  4. Fill out the next screen with the following information:

    CreateSubnet: (checked)
    SubnetName: acme-inc-network-subnet-10
    NetworkAddress: 10.10.0.0/24
    IPVersion: IPv4
    GatewayIP: 10.10.0.1
    

  • Hit ENTER or click NEXT.

  • The last screen is "Subnet Details". All the defaults here are fine (Enable DHCP should be checked, Allocation Pools should be empty, DNS Name server should be empty, and Host Routes should be empty). Just press the "Create" button to create your new network!

  1. Now click the "Create Router" button

    The Network Topology screen you are on should change to reflect the creation of this new network.

    Create Router Button

  2. Let's create a router to connect our new network acme-inc-network to the network public. Click on the "+Create Router" button in the upper right corner.

  3. Fill out pop up box with the following information:

    RouterName: acme-inc-router
    AdminState: UP
    ExternalNetwork: public
    

    The Network Topology page should now display the new router connected to the network public.

  4. All that is left is to connect this router to the acme-inc-network. Start by navigating to Project > Network > Routers

  5. Click on the router named acme-inc-router

  6. Now click on the tab labeled "Interfaces"

  7. Finally click on the button "+ Add Interface" in the upper right corner.

  8. Fill out the pop up box with the following information:

    Subnet: acme-inc-network: 10.10.0.0/24
    IPAddress: 10.10.0.1
    RouterName: acme-inc-router 
    RouterID: 
    

  9. Finally, navigate back to Project > Network > Network Topology

  10. The Network Topology screen should appear like the following screenshot:

    Because the user chestercopperpot is part of a different project (vault_tek), he should not be able to see the newly created network (acme_inc_network). Let's confirm this...

  11. Log out of the OpenStack Horizon dashboard, and log back in as chestercopperpot // fa5tpa55w0rd

  12. Navigate to Project > Network > Network Topology

    The user chestercopperpot should only see the public and private networks.

2. Creating a virtual network and a router at the CLI

In this section, we'll create almost the same network for a different tenant (vault_tek), so that you can compare and contrast the differences between working with the OpenStack Horizion dashboard and the CLI commands. SSH to your controller and log in as root (you might use PuTTy for this). Once logged into the controller, issue the following commands:

  1. Create a network called vault-tek-network

    [root@controller]# source keystonerc_chestercopperpot

    [root@controller] ~(keystone_chestercopperpot)# neutron net-create vault-tek-network

  2. Create a vault-tek-network subnet

    [root@controller] ~(keystone_chestercopperpot)# neutron subnet-create --name vault-tek-network-subnet-10 --gateway 10.10.0.1 vault-tek-network 10.10.0.0/24

    NOTE: The command listed above line wraps, so be sure to include the second line as well, or an error stating "too few arguments" will occur.

  3. Create a vault-tek-network router

    [root@controller] ~(keystone_chestercopperpot)# neutron router-create vault-tek-router

  4. Connect vault-tek-router to the public network

    [root@controller] ~(keystone_chestercopperpot)# neutron router-gateway-set vault-tek-router public

  5. Connect the vault-tek-router to vault-tek-network-subnet-10

    [root@controller] ~(keystone_chestercopperpot)# neutron router-interface-add vault-tek-router vault-tek-network-subnet-10

  6. Log into the OpenStack Horizon dashboard as chestercopperpot // fa5tpa55w0rd

  7. Navigate to Project > Network > Network Topology

  8. Navigate to Project > Network > Networks

    Note that this network is not a shared network (see the big red arrow on the above screenshot), therefore it cannot be seen by other projects (tenants). Let's confirm this.

  9. Log out of the OpenStack Horizon dashboard, log back in as a different user (admin, aliceanderson, or bobbarker) and navigate back to ( Project > Network > Networks ). You should no longer see vault-tek-network. After you've confirmed that the network is indeed private, log back into the OpenStack Horizon dashboard as chestercopperpot // fa5tpa55w0rd.

  10. Navigate to Project > Network > Routers

  11. Click on the router instance vault-tek-router (the bright red arrow is pointing to it in the above screenshot).

  12. IMPORTANT: On the screen you are currently on, look for a value called "ID" which is highlighted yellow in the figure above. It is second down on the overview tab. Write down the first 6 or so characters. These will be helpful later.

  13. Spend some time checking out the information being presented here. Click: Network > Routers , then click on the blue vault-tek-router, then you can click on the Overview and Interfaces tabs. The example below is clicked on the Interfaces tab. Note that the router is connected to a Gateway (public). Finally, click on the interfaces tab (the bright red arrow is pointing to it in the above screenshot). This page displays a list of associated interfaces connected to the router. Note that this router has a fixed IP address (10.10.0.1), which connects it to the 10.10.0.0/24 network we just created.

    • You are looking at the interface on the vault-tek-router

3. Launch an instance, and SSH into it (this is WAY COOL!)

Now that we know a bit about security groups and networks, let's launch a new instance, and see if we can SSH into it!

  1. Navigate to Project > Compute > Instances

  2. Click on the "Launch Instance" button

  3. Fill out the Details tab as follows:

  4. Now click on the Access & Security tab so we can add our security group

    • Check the box http-ssh
    • Uncheck the box default

  5. Now click on the Networking tab and click the + sign beside the vault-tek-network. Shown below are the before and after screen shots.

    BEFORE

    Install only the vault-tek-networking

  6. Great! Now click the "Launch" button and you will notice the instance "Spawning", then "Running". See the screen shots below

    vt2 is Spawning

    vt2 is Running

  • Wait until the machine spawns and comes up as ACTIVE and Running before going to the next step
  1. Before we SSH to the Neutron server, type the following command to check out your new instance:

    [root@controller] ~(keystone_chestercopperpot)# nova show vt2

    +--------------------------------------+----------------------------------------------------------+ 
    | Property                             | Value                                                    |  
    +--------------------------------------+----------------------------------------------------------+   
    | OS-DCF:diskConfig                    | AUTO                                                     | 
    | OS-EXT-AZ:availability_zone          | nova                                                     |   
    | OS-EXT-STS:power_state               | 1                                                        |
    | OS-EXT-STS:task_state                | -                                                        |
    | OS-EXT-STS:vm_state                  | active                                                   |
    | OS-SRV-USG:launched_at               | 2015-10-28T20:43:59.000000                               |
    | OS-SRV-USG:terminated_at             | -                                                        | 
    | accessIPv4                           |                                                          |
    | accessIPv6                           |                                                          |
    | config_drive                         |                                                          |
    | created                              | 2015-10-28T20:42:53Z                                     |
    | flavor                               | m1.tiny (1)                                              |
    | hostId                               | 1f9d27fe57644512f82655d7339f19ae4c86a026c80f4db3a786ed39 |
    | id                                   | 53ad58a5-4fae-45f7-a03b-d82a64e3452f                     |
    | image                                | cirros (8a724f78-2673-4ea1-b607-373626a15afb)            |
    | key_name                             | -                                                        |
    | metadata                             | {}                                                       |
    | name                                 | vt2                                                      |
    | os-extended-volumes:volumes_attached | []                                                       |
    | progress                             | 0                                                        |
    | security_groups                      | http-ssh                                                 |
    | status                               | ACTIVE                                                   |
    | tenant_id                            | 41773a923b924ef7934e8aea532c0680                         |
    | updated                              | 2015-10-28T20:43:59Z                                     |
    | user_id                              | 7198d60229d14888914d6e1ef5d0ef2b                         |
    | vault-tek-network network            | 10.10.0.3                                                |
    +--------------------------------------+----------------------------------------------------------+  
    
    • Look at the VERY bottom of the output. It should say, "vault-tek-network network" followed by an IP address. It is likely something like 10.0.0.2, 10.0.0.3, 10.10.0.2, or 10.10.0.3. It doesn't matter what it is, just record it. We'll need it to SSH to this VM instance (vt2)
  2. Navigate back to the CLI, time to SSH into the machine. In order to do this, we'll need to access that machine's namespace. In order to do this, we'll SSH to the neutron server. Type the following:

    [root@controller] ~(keystone_chestercopperpot)# ssh root@neutron

    [root@neutron ~]#

  3. Fantastic. We are now in a Neutron node. If you're confused, click back to Lab 00, and check out the picture of the network. Remember that this is a dedicated node just for Neutron. Networking takes resources! Let's take a look at the namespaces the neutron node knows about. Type the following command:

    [root@neutron ~]# ip netns list

    qrouter-b1579da2-d5a4-40ec-b6a5-606413f1738e
    qdhcp-cfe3722a-f584-4150-a6ae-1a178677ac78
    qrouter-c9a2b225-bab6-4965-9c98-417d9a53ba3c
    qdhcp-3288dfae-a262-42c2-92b2-1b6ae652fa5b
    qdhcp-20ca30a2-e3fb-4e62-bd78-08dc471e93ed
    
  • The above command is going to create some output. Look near the top of the output. We're looking for a match that begins qrouter-, but notice that there are many qrouter- entries. We want the one that is followed by the same characters you recorded back in step "2.12"

  • Once you've found this value, highlight it with your mouse

  1. Now we're going to tell neutron to access that router's namespace, and then SSH to the VM we just created. If it works, you'll be prompted to log into the VM instance you just created (vt2)

    [root@neutron ~]# ip netns exec <right_click_to_paste_the_highlighted_namspace> ssh cirros@<IP_address_of_vt2>

    NOTE 1: The name space should include qrouter- portion in front of the ID NOTE 2: The IP_address_of_vt2 was obtained in step 7 when you issued the command "nova show vt2" on the controller.

    The authenticity of host '10.10.0.3 (10.10.0.3)' can't be established.
    RSA key fingerprint is 26:6b:23:9c:ab:bb:eb:b5:3a:18:b5:8e:72:ba:b4:4f.
    Are you sure you want to continue connecting (yes/no)? yes					<- Type YES then enter
    Warning: Permanently added '10.10.0.3' (RSA) to the list of known hosts.
    [email protected]'s password: cubswin:)										<- The password to all cirros images is cubswin:)
    
  2. There you go! If it worked, you'll be inside of the little VM you just started! This lab was heavy lifting, so if you don't understand something, ask the instructor.

  3. There isn't much to see inside of a CirrOS VM, so once your curiosity is satisfied, type the following to return to root@controller

    $ exit

    [root@neutron ~]# exit

    [root@controller ~(keystone_chestercopperpot)]#

    [root@controller ~(keystone_chestercopperpot)]# source .bashrc

    [root@controller ~]#

    This will put you back to root. Done!