Configure compute node
+ Configure compute node with neutron servicesThis section details set up for any node that runs the
nova-compute component but does not run
the full network stack.
- By default, the system-config-firewall
- automated firewall configuration tool is in place on RHEL.
- This graphical interface (and a curses-style interface with
- -tui on the end of the name) enables you
- to configure IP tables as a basic firewall. You should disable
- it when you work with Neutron unless you are familiar with the
- underlying network technologies, as, by default, it blocks
- various types of network traffic that are important to
- Neutron. To disable it, simple launch the program and clear
- the Enabled check box.
- After you successfully set up OpenStack with Neutron, you
- can re-enable and configure the tool. However, during Neutron
- set up, disable the tool to make it easier to debug network
+ By default, the system-config-firewall automated
+ firewall configuration tool is in place on RHEL. This graphical interface
+ (and a curses-style interface with -tui on the end of
+ the name) enables you to configure IP tables as a basic firewall. You
+ should disable it when you work with OpenStack Networking unless you are
+ familiar with the underlying network technologies, as, by default, it
+ blocks various types of network traffic that are important to neutron
+ services. To disable it, launch the program and clear the
+ Enabled check box.
+ After you successfully set up OpenStack Networking with Neutron, you
+ can re-enable and configure the tool. However, during OpenStack
+ Networking setup, disable the tool to make it easier to debug network
issues.
@@ -246,7 +245,7 @@ firewall_driver=neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallD
- Install and configure Neutron plug-ins on a dedicated
+ Install and configure OpenStack Networking plug-ins on a dedicated
compute nodeInstall the Open vSwitch (OVS) plug-in on a dedicated
diff --git a/doc/install-guide/section_neutron-initial-networks.xml b/doc/install-guide/section_neutron-initial-networks.xml
index f34c009ebf..69bf9f0d9f 100644
--- a/doc/install-guide/section_neutron-initial-networks.xml
+++ b/doc/install-guide/section_neutron-initial-networks.xml
@@ -7,24 +7,20 @@
xmlns:html="http://www.w3.org/1999/xhtml" version="5.0">
Create initial networks
- In these sections, replace
- SPECIAL_OPTIONS with any options
- specific to your Networking plug-in choices. See here to check if your plug-in requires any special
- options.
+ In these sections, replace SPECIAL_OPTIONS with any options specific to your OpenStack Networking plug-in choices. See here to check if your plug-in requires any special options.
- Create the ext-net external network.
- This network represents a slice of the outside world. VMs
- are not directly linked to this network; instead, they
- connect to internal networks. Outgoing traffic is routed by
- Neutron to the external network. Additionally, floating IP
- addresses from the subnet for ext-net
- might be assigned to VMs so that the external network can
- contact them. Neutron routes the traffic
- appropriately.
+ Create the ext-net external network. This
+ network represents a slice of the outside world. VMs are not directly
+ linked to this network; instead, they connect to internal networks.
+ Outgoing traffic is routed by OpenStack Networking to the external
+ network. Additionally, floating IP addresses from the subnet for
+ ext-net might be assigned to VMs so that the
+ external network can contact them. Neutron-based services route the
+ traffic appropriately.#neutron net-create ext-net --router:external=True SPECIAL_OPTIONS
@@ -116,16 +112,38 @@ router_id = EXT_TO_INT_ID
for any other network.
These options are not needed beyond the first
- network, as Neutron automatically increments the
- segmentation id and copy the network type option for any
- additional networks.
+ network, as OpenStack Networking services automatically
+ increment the segmentation ID and copy the network type
+ option for any additional networks.
- Now, return to the general OVS
+ Now, return to the general OVS
instructions.VLAN network options
+
+ Some NICs have Linux drivers that do not handle
+ VLANs properly. See the
+ ovs-vlan-bug-workaround and
+ ovs-vlan-test man pages for more
+ information. Additionally, you might try turning off
+ rx-vlan-offload and
+ tx-vlan-offload by using
+ ethtool on the
+ DATA_INTERFACE. Another
+ potential caveat to VLAN functionality is that VLAN tags
+ add an additional 4 bytes to the packet size. If your
+ NICs cannot handle large packets, make sure to set the
+ MTU to a value that is 4 bytes less than the normal
+ value on the
+ DATA_INTERFACE.
+ If you run OpenStack inside a virtualized
+ environment (for testing purposes), switching to the
+ virtio NIC type (or a similar
+ technology if you are not using KVM/QEMU to run your
+ host VMs) might solve the issue.
+ When creating networks, use these options:--provider:network_type vlan --provider:physical_network physnet1 --provider:segmentation_id SEG_IDSEG_ID should be
@@ -140,28 +158,6 @@ router_id = EXT_TO_INT_ID
only needed if you wish to modify those values in any
way.
-
- Some NICs have Linux drivers that do not handle
- VLANs properly. See the
- ovs-vlan-bug-workaround and
- ovs-vlan-test man pages for more
- information. Additionally, you might try turning off
- rx-vlan-offload and
- tx-vlan-offload by using
- ethtool on the
- DATA_INTERFACE. Another
- potential caveat to VLAN functionality is that VLAN tags
- add an additional 4 bytes to the packet size. If your
- NICs cannot handle large packets, make sure to set the
- MTU to a value that is 4 bytes less than the normal
- value on the
- DATA_INTERFACE.
- If you run OpenStack inside a virtualized
- environment (for testing purposes), switching to the
- virtio NIC type (or a similar
- technology if you are not using KVM/QEMU to run your
- host VMs) might solve the issue.
-