Identifying and Troubleshooting Neutron Namespaces

recently gave you an intro to my talk at the Hong Kong OpenStack Summit about Neutron namespaces. One of the commenters had seen the video of my talk and requested that we post the slideshow. In this post, I will show you how to:

  1. Identify the correct namespace.

  2. Perform general troubleshooting around the identified namespace.

And, I will also share my presentation from that talk at the end of the post.

Let’s dive right in. If you run both L3 + DHCP services on the same node, you should enable namespaces to avoid conflicts with routes:

To disable namespaces, make sure the neutron.conf used by the neutron-server has the following setting:

And that the dhcp_agent.ini and l3_agent.ini have the following setting:

How are namespaces implemented in Neutron and how do we recognize them? Let us begin by stating the following 2 very important facts:

  1. Every l2-agent/private network has an associated dhcp namespace and

  2. Every l3-agent/router has an associated router namespace.

OK, but how are namespaces named? A network namespace starts with dhcp- followed by the ID of the network. Similarly, a router namespace starts with qrouter- followed by the ID of the router. For example:

The above namespace listing is for a simple network consisting of a single private network and a single router. To help our understanding of this simple network, let us use the following illustration in Figure 1.

Figure 1 Illustration of a simple network with router and DHCP namespaces

Figure 1 illustrates how a tenant network is constructed with router and dhcp namespaces. A single virtual machine (VM1) is attached for illustration purposes. For each tenant, as networks are created, similar network topologies will be created. In figure 1, we make the following observations:

  • Data center network is the external network by which packets exit to the internet.

  • The router with IP address 10.0.0.1 connects the tenant network with the data center network? It has an associated router namespace so that the tenant routing tables are isolated from every other tenant in the OpenStack deployment.

  • The bridge represents the tenant network of 10.0.0.0/24. The DHCP server (here a dnsmasq process) is attached the private network and has an associated IP address of 10.0.0.2  just as a physical server  attached to the network. Note that the router usually takes the first IP address while the DHCP server takes the next IP address and the VMs take addresses from the remaining pool of IP addresses. Similarly, the DHCP server has an associated DHCP namespace so that the IP address allocation and all broadcast traffic are kept within this tenant network.

Neutron namespace troubleshooting

As a fundamental concept in OpenStack Networking, without a proper understanding of network namespaces, network troubleshooting is like finding a needle in a haystack. Consider a small OpenStack deployment with about 1000 tenants and each tenant Neutron network consisting of a router and one private network at the minimum. This will make a total of at least 2000 namespaces because each tenant router is a namespace while each network will have an associated DHCP namespace (two namespaces per tenant, as illustrated in figure 1). In such a scenario, let’s say that a tenant is having issues with the DHCP allocation whereby the instance shows the assigned IP addresses when viewed through the OpenStack Dashboard, yet you cannot SSH into the instance and, looking through the VNC, the network interface appears not have an IP address.

Troubleshooting this problem will involve looking at various components of the tenant topology as shown in figure 1, primarily the DHCP agent. The first logical step is to identify the tenant namespaces. Now we can see how this is different from troubleshooting in a traditional physical network deployment. Here, without a proper understanding of how namespace work in Neutron, the administrator will be stuck and won’t be able to proceed with logical troubleshooting procedures.

Let us summarize the troubleshooting steps:

  1. Identify the correct namespace

  2. Perform general troubleshooting around the identified namespace

Let’s create two tenant networks and use them to illustrate troubleshooting namespaces.

Figure 2 Network for tenant A

Figure 3 Network for tenant B

Step 1: Identify the namespace

In the above diagrams, network for Tenant A has 2 private networks and one router while network for tenant B also has 2 networks and a router. Let us explore these networks.  Note that in a multimode deployment consisting of a controller node, a network node and compute nodes, we will be running the namespace commands from the network node.

We can six namespaces listed from the two tenant networks (three namespaces per tenant).

OK, but how do you know which namespaces belong to which tenant since the tenant names are not indicated in the namespaces? We can approach this in two different ways.

First, note that typically, only the cloud administrator will have access to the network node and therefore only the administrator can run the namespaces commands on the network node. One way the cloud administrator could identify the namespaces is to source the credential file of a user belonging to the tenant in question. Once that is done, the entire neutron commands will run as that user and only the tenant network components where the user belongs to will display. Let us illustrate this as follows.

  1. Source a credential file that belongs to a user in tenant A.

  2. Run the following commands:

    stack @ vmnet - mn : ~ $ neutron router - list
    + -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- + -- -- -- -- -- -- -- -- - + -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- +
    | id                                    | name              | external_gateway_info                                    |
    + -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- + -- -- -- -- -- -- -- -- - + -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- +
    | 4adef4a5 - 1122 - 49b8 - 9da2 - 3cbf803c44dd | router_proj_one | { "network_id" : "ea00b8c3-7063-4780-ad73-ef0b47518f10" } |
    + -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- + -- -- -- -- -- -- -- -- - + -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- +

    From the listing we can see that tenant A has one router listed with ID 4adef4a5-1122-49b8-9da2-3cbf803c44dd

    Looking for this ID in the ip netns command above, we can easily identify namespace qrouter-4adef4a5-1122-49b8-9da2-3cbf803c44dd as belonging to tenant A.

    For the dhcp namespaces:

    + -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- + -- -- -- -- -- -- -- + -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - +
    | id                                    | name          | subnets                                              |
    + -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- + -- -- -- -- -- -- -- + -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - +
    | e0fe9037 - 790a - 4c6b - 9bf4 - 4b06f0cfcf5c | net_proj_one | f02b6df4 - 11af - 411d - b41e - e4ce66d5510d 10.10.1.0 / 24    |
    | ea00b8c3 - 7063 - 4780 - ad73 - ef0b47518f10 | ext_net        | 4f7c6c9e - 28d8 - 43b3 - b7d4 - 276920216b31                  |
    | f5a69443 - bf3f - 4f9a - b3e2 - 5625e70514b4 | net2          | f6cd4df6 - b37f - 4615 - 94f6 - 8abcab38ef99 192.168.0.0 / 24 |
    + -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- + -- -- -- -- -- -- -- + -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - +

    Also in this listing we can identify two private networks with IDs e0fe9037-790a-4c6b-9bf4-4b06f0cfcf5c and f5a69443-bf3f-4f9a-b3e2-5625e70514b4.

    Checking the ip netns list command above, we can also identify the corresponding dhcp namespaces as: qdhcp-e0fe9037-790a-4c6b-9bf4-4b06f0cfcf5c and qdhcp-f5a69443-bf3f-4f9a-b3e2-5625e70514b4

The above procedures are good and easiest if the cloud administrator knows the username/password of the tenant but this will not always be the case. So another way the cloud administrator could identify the tenant namespaces is to ask the user for the ID of the network or the name of the network. The tenant user can easily find out this information from Horizon, the OpenStack dashboard. With either the name or the ID, the cloud administrator can troubleshoot as follows:

  1. Source admin credentials. With the admin credential, the cloud administrator will have access to every tenant network namespaces

  2. List the namespaces and select the tenant namespace

      stack @ vmnet - mn : ~ $ ip netns list | grep 9f7ec6fd - ec9a - 4b1b - b854 - a9832f190922
      qdhcp - 9f7ec6fd - ec9a - 4b1b - b854 - a9832f190922

      Step 2: Troubleshooting around the namespace

      Now that we know the namespace of the tenant we can troubleshoot around the namespace.

      First, let us check the IP address.

      stack @ vmnet - mn : ~ $ sudo ip netns exec qdhcp - 9f7ec6fd - ec9a - 4b1b - b854 - a9832f190922 ifconfig
      [ sudo ] password for stack :
      lo         Link encap : Local Loopback
                 inet addr : 127.0.0.1    Mask : 255.0.0.0
                 inet6 addr : :: 1 / 128 Scope : Host
                 UP LOOPBACK RUNNING   MTU : 16436    Metric : 1
                 RX packets : 16 errors : 0 dropped : 0 overruns : 0 frame : 0
                 TX packets : 16 errors : 0 dropped : 0 overruns : 0 carrier : 0
                 collisions : 0 txqueuelen : 0
                 RX bytes : 1344 ( 1.3 KB )    TX bytes : 1344 ( 1.3 KB )
      tap43cb2c73 - 40 Link encap : Ethernet   HWaddr fa : 16 : 3e : e6 : 1b : 24
                 inet addr : 10.1.0.3    Bcast : 10.1.0.255    Mask : 255.255.255.0
                 inet6 addr : fe80 :: f816 : 3eff : fee6 : 1b24 / 64 Scope : Link
                 UP BROADCAST RUNNING MULTICAST   MTU : 1500    Metric : 1
                 RX packets : 965 errors : 0 dropped : 0 overruns : 0 frame : 0
                 TX packets : 561 errors : 0 dropped : 0 overruns : 0 carrier : 0
                 collisions : 0 txqueuelen : 0
                 RX bytes : 178396 ( 178.3 KB )    TX bytes : 93900 ( 93.9 KB )


      Let’s then ping the interface:
      stack @ vmnet - mn : ~ $ sudo ip netns exec qdhcp - 9f7ec6fd - ec9a - 4b1b - b854 - a9832f190922 ping c 3 10.1.0.3
      PING 10.1.0.3 ( 10.1.0.3 ) 56 ( 84 ) bytes of data .
      64 bytes from 10.1.0.3 : icmp_req = 1 ttl = 64 time = 0.081 ms
      64 bytes from 10.1.0.3 : icmp_req = 2 ttl = 64 time = 0.035 ms
      64 bytes from 10.1.0.3 : icmp_req = 3 ttl = 64 time = 0.055 ms


      With the above steps we have identified the correct namespace and verify that it has the correct IP address that is pingable, and hence up and running. Further troubleshooting steps could involve the following:

      • Check that the dnsmasq process attached to the subnet is upFor the DHCP, you can check the process

      • stack@vmnet-mn:~$psaux|grepdhcp

        From the output of the above command, identify that there is a process with the network of choice (for example, 10.0.0.0) else the dnsmasq process attached to that network may not be running.
    1. Check that there is no firewall blocking communication to/from the subnet.

      Summary

      Before we conclude, take note of the following:

      • When a router or network is created, the namespaces don’t get created immediately. For network, the DHCP namespaces get created only when a vm is attached and for router the namespace is created when a gateway is set. It means that an activity must take place before the namespaces get created.
      • When a router or network is deleted, the associated namespaces are not deleted.  They need to be manually deleted.

      As Network namespaces are very important to OpenStack networking so is the understanding of network namespaces important to the OpenStack cloud administrator. Here, network namespaces as implemented in OpenStack have been explored along with the mindset that the OpenStack cloud administrator need to have when troubleshooting issues with OpenStack tenant networks.

        • 0
          点赞
        • 0
          收藏
          觉得还不错? 一键收藏
        • 0
          评论
        评论
        添加红包

        请填写红包祝福语或标题

        红包个数最小为10个

        红包金额最低5元

        当前余额3.43前往充值 >
        需支付:10.00
        成就一亿技术人!
        领取后你会自动成为博主和红包主的粉丝 规则
        hope_wisdom
        发出的红包
        实付
        使用余额支付
        点击重新获取
        扫码支付
        钱包余额 0

        抵扣说明:

        1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
        2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

        余额充值