From patchwork Wed Sep 23 18:53:07 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sorin Vinturis X-Patchwork-Id: 521815 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from archives.nicira.com (unknown [IPv6:2600:3c00::f03c:91ff:fe6e:bdf7]) by ozlabs.org (Postfix) with ESMTP id C73AF1401AF for ; Thu, 24 Sep 2015 04:53:42 +1000 (AEST) Received: from archives.nicira.com (localhost [127.0.0.1]) by archives.nicira.com (Postfix) with ESMTP id E7867105E4; Wed, 23 Sep 2015 11:53:41 -0700 (PDT) X-Original-To: dev@openvswitch.org Delivered-To: dev@openvswitch.org Received: from mx3v1.cudamail.com (mx3.cudamail.com [64.34.241.5]) by archives.nicira.com (Postfix) with ESMTPS id 98EF6105E4 for ; Wed, 23 Sep 2015 11:53:40 -0700 (PDT) Received: from bar4.cudamail.com (bar2 [192.168.15.2]) by mx3v1.cudamail.com (Postfix) with ESMTP id 187E96187C6 for ; Wed, 23 Sep 2015 12:53:40 -0600 (MDT) X-ASG-Debug-ID: 1443034416-03dc216fbd2b630001-byXFYA Received: from mx3-pf2.cudamail.com ([192.168.14.1]) by bar4.cudamail.com with ESMTP id uNGqof6RsBIMsyEQ (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Wed, 23 Sep 2015 12:53:36 -0600 (MDT) X-Barracuda-Envelope-From: svinturis@cloudbasesolutions.com X-Barracuda-RBL-Trusted-Forwarder: 192.168.14.1 Received: from unknown (HELO cbssmtp1.cloudbase.local) (91.232.152.5) by mx3-pf2.cudamail.com with SMTP; 23 Sep 2015 18:53:28 -0000 Received-SPF: pass (mx3-pf2.cudamail.com: SPF record at cloudbasesolutions.com designates 91.232.152.5 as permitted sender) X-Barracuda-Apparent-Source-IP: 91.232.152.5 X-Barracuda-RBL-IP: 91.232.152.5 Received: from localhost (localhost [127.0.0.1]) by cbssmtp1.cloudbase.local (Postfix) with ESMTP id EDEC04028C for ; Wed, 23 Sep 2015 21:53:28 +0300 (EEST) X-Virus-Scanned: amavisd-new at cloudbasesolutions.com Received: from cbssmtp1.cloudbase.local ([127.0.0.1]) by localhost (cbssmtp1.cloudbase.local [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2ZxY9iEgPu6d for ; Wed, 23 Sep 2015 21:53:08 +0300 (EEST) Received: from CBSEX1.cloudbase.local (unknown [10.77.78.3]) by cbssmtp1.cloudbase.local (Postfix) with ESMTP id 86632420D6 for ; Wed, 23 Sep 2015 21:53:08 +0300 (EEST) Received: from CBSEX1.cloudbase.local ([10.77.78.3]) by CBSEX1.cloudbase.local ([10.77.78.3]) with mapi id 14.03.0224.002; Wed, 23 Sep 2015 20:53:08 +0200 X-CudaMail-Envelope-Sender: svinturis@cloudbasesolutions.com From: Sorin Vinturis To: Sorin Vinturis , "dev@openvswitch.org" X-CudaMail-MID: CM-V2-922046755 X-CudaMail-DTE: 092315 X-CudaMail-Originating-IP: 91.232.152.5 Thread-Topic: [PATCH] datapath-windows: Updated documentation related to int/ext port names X-ASG-Orig-Subj: [##CM-V2-922046755##]RE: [PATCH] datapath-windows: Updated documentation related to int/ext port names Thread-Index: AQHQ9hYu4Sul9c92gkerc0feSc7NKJ5KdcxQ Date: Wed, 23 Sep 2015 18:53:07 +0000 Message-ID: References: <1441170600-17773-1-git-send-email-svinturis@cloudbasesolutions.com> In-Reply-To: <1441170600-17773-1-git-send-email-svinturis@cloudbasesolutions.com> Accept-Language: en-US, it-IT Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.77.78.1] MIME-Version: 1.0 X-GBUdb-Analysis: 0, 91.232.152.5, Ugly c=0.369283 p=-0.444444 Source Normal X-MessageSniffer-Rules: 0-0-0-8080-c X-Barracuda-Connect: UNKNOWN[192.168.14.1] X-Barracuda-Start-Time: 1443034416 X-Barracuda-Encrypted: DHE-RSA-AES256-SHA X-Barracuda-URL: https://web.cudamail.com:443/cgi-mod/mark.cgi X-Virus-Scanned: by bsmtpd at cudamail.com X-Barracuda-BRTS-Status: 1 X-Barracuda-Spam-Score: 1.10 X-Barracuda-Spam-Status: No, SCORE=1.10 using per-user scores of TAG_LEVEL=3.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=3.0 tests=BSF_RULE7568M, BSF_SC0_SA_TO_FROM_ADDR_MATCH, RDNS_NONE X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.22831 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- 0.50 BSF_RULE7568M Custom Rule 7568M 0.10 RDNS_NONE Delivered to trusted network by a host with no rDNS 0.50 BSF_SC0_SA_TO_FROM_ADDR_MATCH Sender Address Matches Recipient Address Subject: Re: [ovs-dev] [PATCH] datapath-windows: Updated documentation related to int/ext port names X-BeenThere: dev@openvswitch.org X-Mailman-Version: 2.1.16 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@openvswitch.org Sender: "dev" I saw that there is already a patch for this, so this patch can be dropped. -----Original Message----- From: dev [mailto:dev-bounces@openvswitch.org] On Behalf Of Sorin Vinturis Sent: Wednesday, 23 September, 2015 18:41 To: dev@openvswitch.org Subject: [ovs-dev] [PATCH] datapath-windows: Updated documentation related to int/ext port names Signed-off-by: Sorin Vinturis --- This patch is for both master and 2.4 branch. --- INSTALL.Windows.md | 52 +++++++++++++++++++++++++++------------------------- 1 file changed, 27 insertions(+), 25 deletions(-) -In OVS for Hyper-V, we use 'external' as a special name to refer to the -physical NICs connected to the Hyper-V switch. An index is added to this -special name to refer to the particular physical NIC. Eg. 'external.1' refers -to the first physical NIC on the Hyper-V switch. +In OVS for Hyper-V, we use the physical NIC alias name to refer to the +physical NICs connected to the Hyper-V switch, i.e. 'Ethernet0'. Note: Currently, we assume that the Hyper-V switch on which OVS extension is enabled has a single physical NIC connected to it. -Interal port is the virtual adapter created on the Hyper-V switch using the +Internal port is the virtual adapter created on the Hyper-V switch +using the 'AllowManagementOS' setting. This has already been setup while creating the -switch using the instructions above. In OVS for Hyper-V, we use a 'internal' -as a special name to refer to that adapter. +switch using the instructions above. In OVS for Hyper-V, we use the +alias name of the virtual NIC to refer to this adapter. The virtual NIC +alias name for a switch named 'OVS-Extended-Switch' is 'vEthernet (OVS-Extended-Switch)'. - % ovs-vsctl add-port br-pif external.1 - % ovs-vsctl add-port br-pif internal +Note: The alias name of all physical and virtual NICs on the host is +displayed using the 'Get-NetAdapter' command. + + % ovs-vsctl add-port br-pif "Ethernet0" + % ovs-vsctl add-port br-pif "vEthernet (OVS-Extended-Switch)" * Dumping the ports should show the additional ports that were just added. Sample output shows up as follows: @@ -286,22 +288,22 @@ as a special name to refer to that adapter. system@ovs-system: lookups: hit:0 missed:0 lost:0 flows: 0 - port 4: internal (internal) <<< 'AllowManagementOS' adapter on - Hyper-V switch + port 4: vEthernet (OVS-Extended-Switch) (internal) <<< 'AllowManagementOS' + adapter on Hyper-V + switch port 2: br-pif (internal) port 1: br-int (internal - port 3: external.1 <<< Physical NIC + port 3: Ethernet0 <<< Physical NIC % ovs-vsctl show a56ec7b5-5b1f-49ec-a795-79f6eb63228b Bridge br-pif - Port internal - Interface internal Port br-pif Interface br-pif type: internal - Port "external.1" - Interface "external.1" + Port "Ethernet0" + Interface "Ethernet0" + Port "vEthernet (OVS-Extended-Switch)" + Interface "vEthernet (OVS-Extended-Switch)" Bridge br-int Port br-int Interface br-int @@ -342,19 +344,19 @@ with OVS extension enabled. system@ovs-system: lookups: hit:0 missed:0 lost:0 flows: 0 - port 4: internal (internal) + port 4: vEthernet (OVS-Extended-Switch) (internal) port 5: ovs-port-a port 2: br-pif (internal) port 1: br-int (internal - port 3: external.1 + port 3: Ethernet0 % ovs-vsctl show 4cd86499-74df-48bd-a64d-8d115b12a9f2 Bridge br-pif - Port internal - Interface internal - Port "external.1" - Interface "external.1" + Port "vEthernet (OVS-Extended-Switch)" + Interface "vEthernet (OVS-Extended-Switch)" + Port "Ethernet0" + Interface "Ethernet0" Port br-pif Interface br-pif type: internal @@ -391,7 +393,7 @@ Steps to add tunnels The Windows Open vSwitch implementation support VXLAN and STT tunnels. To add tunnels, the following steps serve as examples. -Note that, any patch ports created between br-int and br-pif MUST be beleted +Note that, any patch ports created between br-int and br-pif MUST be +deleted prior to adding tunnels. 01> Add the tunnel port between 172.168.201.101 <-> 172.168.201.102 -- 1.9.0.msysgit.0 _______________________________________________ dev mailing list dev@openvswitch.org http://openvswitch.org/mailman/listinfo/dev diff --git a/INSTALL.Windows.md b/INSTALL.Windows.md index 889bb0b..132f76f 100644 --- a/INSTALL.Windows.md +++ b/INSTALL.Windows.md @@ -176,9 +176,9 @@ existing switch, make sure to enable the "Allow Management OS" option for VXLAN to work (covered later). The command to create a new switch named 'OVS-Extended-Switch' using a physical -NIC named 'Ethernet 1' is: +NIC named 'Ethernet0' is: % New-VMSwitch "OVS-Extended-Switch" -AllowManagementOS $true \ - -NetAdapterName "Ethernet 1" + -NetAdapterName "Ethernet0" Note: you can obtain the list of physical NICs on the host using 'Get-NetAdapter' command. @@ -263,21 +263,23 @@ ovs-vswitchd by running 'ovs-appctl exit'.) 07> Add the physical NIC and the internal port to br-pif.