File: usage.rst

package info (click to toggle)
neutron-taas 16.0.0-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 1,016 kB
  • sloc: python: 6,813; sh: 83; makefile: 35
file content (108 lines) | stat: -rw-r--r-- 4,207 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
..
      Licensed under the Apache License, Version 2.0 (the "License"); you may
      not use this file except in compliance with the License. You may obtain
      a copy of the License at

          http://www.apache.org/licenses/LICENSE-2.0

      Unless required by applicable law or agreed to in writing, software
      distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
      WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
      License for the specific language governing permissions and limitations
      under the License.


      Convention for heading levels in Neutron devref:
      =======  Heading 0 (reserved for the title in a document)
      -------  Heading 1
      ~~~~~~~  Heading 2
      +++++++  Heading 3
      '''''''  Heading 4
      (Avoid deeper levels because they do not render well.)

Usage Workflow
==============

1. Create a Neutron port with 'port_security_enabled' set to 'false'.

.. note::

   If you already have a port attached to a virtual machine you can
   disable port-security on that port and use that for mirroring also.

.. code-block:: console

 $ openstack port create port_tap_service --disable-port-security

2. Launch a VM (VM on which you want to monitor/receive the mirrored data).
   Associate the Neutron port created in step 1 while creating the VM.

.. note::

   To capture and analize traffic it is suggested to use VM image that has
   advanced tools like tcpdump.

.. code-block:: console

  $ openstack server create --nic port-id=port_tap_service monitor_vm

3. Using Openstack Client command for TaaS **openstack tap service create** or
   via REST APIs create a Tap Service instance by associating the port
   created in step 1.

.. code-block:: console

  $ openstack tap service create --name ts_0 --port port_tap_service

4. Using Openstack Client command for TaaS **openstack tap flow create** or
   via REST APIs create a Tap Flow instance by associating the Tap Service
   instance created in step 3 and the target Neutron port from which you want
   to mirror traffic (assuming the Neutron port from which the traffic
   needs to be monitored already exists.)
   Mirroring can be done for both incoming and/or outgoing traffic from the
   target Neutron port.

.. code-block:: console

  $ openstack tap flow create --name tf_0 --port source_port --tap-service ts_0 --direction BOTH

5. Observe the mirrored traffic on the monitoring VM by running tools such as
   tcpdump.

Worklow for tap mirrors
--------------------------------

1. Make sure that the destination of your mirroring is ready.
   This can be a Host outside of your cloud, or a virtual machine
   with port_security_enabled=False and with a Floating IP.

.. code-block:: console

 $ openstack network create monitor_net
 $ openstack subnet create monitor_subnet --subnet-range 192.171.0.0/27 --network monitor_net
 $ openstack port create vxlan_monitor_port --network monitor_net --disable-port-security --no-security-group
 $ openstack server create --flavor d1 --image <ubuntu or similar OS to check the mirroring with tcpdump for example> --nic port-id=monitor_port monitor_vm --key-name mykey
 $ openstack server add floating ip monitor_vm 100.109.0.221

2. Create another Neutron port (the source of the mirroring).

.. code-block:: console

 $ openstack network create mirror_net
 $ openstack subnet create mirror_subnet --subnet-range 192.170.0.0/27 --network mirror_net
 $ openstack port create mirror_port --network mirror_net --security-group <pingable and loginable security-group>

3. Boot a VM on the previous port.

.. code-block:: console

 $ openstack server create --security-group <pingable and loginable security-group> --flavor c1 --image cirros-0.6.2-x86_64-disk --nic port-id=mirror_port mirror_vm

4. Create a tap mirror with the source port Id as the port field and
   the FIP or the IP of the remote host as the remote_ip field of the
   tap mirror. Make sure that the remote end can be the endpoint of the
   GRE or ERSPANv1 tunnel.

.. code-block:: console

 $ openstack tap mirror create --port mirror_port --name mirror1 --directions IN=102 --remte-ip 100.109.0.221 --mirror-type erspanv1