diff --git a/docs/udelartex/capitulos/gestion.tex b/docs/udelartex/capitulos/gestion.tex index a8ac552635e6688d99217710edc8ef2b40b6a942..a18c119b92749b2b01376a2074f749545451681a 100644 --- a/docs/udelartex/capitulos/gestion.tex +++ b/docs/udelartex/capitulos/gestion.tex @@ -444,4 +444,15 @@ echo 'flush_all' | nc $(awk -F '-l' '/^OPTIONS/ {print $2}' {{ memcached_conf_de \end{itemize} +\section*{Conclusiones} +Recapitulando todas las operaciones descritas en este capitulo podemos sacar varias conclusiones: +\begin{itemize} +\item La presencia de fallas es algo que siempre hay que contemplar y en el caso de un Datacenter es primordial la celeridad y la conservación de los datos. Para lograr esto se deben tener políticas de respaldo tanto para el cluster de Galera y los almacenamientos de bloque. Por otro lado para restablecer el servicio como se describió en el capítulo puede requerir de una secuencia considerable de comandos o verificaciones, por lo tanto lo mejor es tener scripts para automatizar estas tareas ganando tiempo y consistencia. + +\item Por el lado de las modificaciones en el Datacenter tanto para escalarlo horizontalmente o actualizar la versión utilizada queda evidenciada a lo largo del capitulo la complejidad y los riesgos que conlleva realizar este tipo de tareas. Por esto siempre es recomendable realizar las tareas en un ambiente de desarrollo para evitar la mayor cantidad de problemas. + +\item Alejarse de lo estándar como se realizó en este trabajo al utilizar como backend de almacenamiento Ceph puede presentar algunas complicaciones particulares de la tecnología o algún requerimiento para la misma en el proyecto OSA, como por ejemplo ocurrió al intentar actualizar de versión en donde se requiere que existan al menos 3 monitors en el cluster de Ceph. + +\item Nuevamente se puede apreciar como junto a la evolución de OpenStack muchos de los problemas de las versiones anteriores son solucionados brindando mayor consistencia a los procesos. +\end{itemize} diff --git a/docs/udelartex/tesis.lof b/docs/udelartex/tesis.lof index fc1f56d7dde2bcd840d01938bb774b78a654de6a..8ae14c46a694b03de89dbd6192b590f50b8b1da5 100644 --- a/docs/udelartex/tesis.lof +++ b/docs/udelartex/tesis.lof @@ -32,81 +32,81 @@ \contentsline {figure}{\numberline {6.5}{\ignorespaces Salida a Internet en los nodos de Openstack.\relax }}{61}{figure.caption.70}% \addvspace {10\p@ } \addvspace {10\p@ } -\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{83}{figure.caption.91}% -\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{88}{figure.caption.94}% -\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{88}{figure.caption.95}% -\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{90}{figure.caption.96}% -\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.97}% -\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.99}% -\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{92}{figure.caption.100}% -\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{93}{figure.caption.102}% -\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{100}{figure.caption.106}% -\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{101}{figure.caption.110}% -\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{101}{figure.caption.112}% -\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{106}{figure.caption.116}% -\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{107}{figure.caption.119}% -\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{108}{figure.caption.121}% -\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{109}{figure.caption.123}% -\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{112}{figure.caption.127}% -\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{112}{figure.caption.128}% -\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{113}{figure.caption.131}% -\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{114}{figure.caption.133}% -\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{118}{figure.caption.134}% -\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{125}{figure.caption.137}% -\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{127}{figure.caption.138}% -\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{131}{figure.caption.139}% -\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{132}{figure.caption.140}% -\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{132}{figure.caption.142}% -\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{134}{figure.caption.143}% -\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{135}{figure.caption.145}% -\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{140}{figure.caption.149}% -\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{141}{figure.caption.153}% -\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{142}{figure.caption.155}% -\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{146}{figure.caption.159}% -\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{147}{figure.caption.162}% -\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{148}{figure.caption.164}% -\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{149}{figure.caption.166}% -\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{152}{figure.caption.170}% -\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{152}{figure.caption.171}% -\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{153}{figure.caption.174}% -\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos funcionales\relax }}{154}{figure.caption.176}% -\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos luego de un fallo en uno de ellos\relax }}{154}{figure.caption.177}% -\addvspace {10\p@ } -\addvspace {10\p@ } -\addvspace {10\p@ } -\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{167}{figure.caption.183}% -\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{168}{figure.caption.184}% -\addvspace {10\p@ } -\addvspace {10\p@ } -\addvspace {10\p@ } -\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{210}{figure.caption.205}% -\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{211}{figure.caption.206}% -\addvspace {10\p@ } -\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{218}{figure.caption.220}% -\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{219}{figure.caption.222}% -\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{220}{figure.caption.223}% -\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{221}{figure.caption.225}% -\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{222}{figure.caption.227}% -\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{222}{figure.caption.228}% -\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{223}{figure.caption.230}% -\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{224}{figure.caption.231}% -\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{225}{figure.caption.233}% -\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{226}{figure.caption.234}% -\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{227}{figure.caption.236}% -\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{227}{figure.caption.237}% -\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{228}{figure.caption.238}% -\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{228}{figure.caption.240}% -\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{229}{figure.caption.242}% -\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{229}{figure.caption.244}% -\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{230}{figure.caption.246}% -\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{230}{figure.caption.247}% -\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{231}{figure.caption.248}% -\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{231}{figure.caption.249}% -\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{232}{figure.caption.250}% -\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{233}{figure.caption.251}% -\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{234}{figure.caption.252}% -\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{234}{figure.caption.253}% -\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{235}{figure.caption.254}% -\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{235}{figure.caption.255}% +\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{84}{figure.caption.92}% +\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{89}{figure.caption.95}% +\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{89}{figure.caption.96}% +\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{91}{figure.caption.97}% +\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{92}{figure.caption.98}% +\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{92}{figure.caption.100}% +\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{93}{figure.caption.101}% +\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{94}{figure.caption.103}% +\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{101}{figure.caption.107}% +\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{102}{figure.caption.111}% +\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{102}{figure.caption.113}% +\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{107}{figure.caption.117}% +\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{108}{figure.caption.120}% +\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{109}{figure.caption.122}% +\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{110}{figure.caption.124}% +\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{113}{figure.caption.128}% +\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{113}{figure.caption.129}% +\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{114}{figure.caption.132}% +\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{115}{figure.caption.134}% +\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{119}{figure.caption.135}% +\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{126}{figure.caption.138}% +\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{128}{figure.caption.139}% +\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{132}{figure.caption.140}% +\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{133}{figure.caption.141}% +\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{133}{figure.caption.143}% +\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{135}{figure.caption.144}% +\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{136}{figure.caption.146}% +\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{141}{figure.caption.150}% +\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{142}{figure.caption.154}% +\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{143}{figure.caption.156}% +\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{147}{figure.caption.160}% +\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{148}{figure.caption.163}% +\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{149}{figure.caption.165}% +\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{150}{figure.caption.167}% +\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{153}{figure.caption.171}% +\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{153}{figure.caption.172}% +\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{154}{figure.caption.175}% +\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos funcionales\relax }}{155}{figure.caption.177}% +\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos luego de un fallo en uno de ellos\relax }}{155}{figure.caption.178}% +\addvspace {10\p@ } +\addvspace {10\p@ } +\addvspace {10\p@ } +\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{168}{figure.caption.184}% +\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{169}{figure.caption.185}% +\addvspace {10\p@ } +\addvspace {10\p@ } +\addvspace {10\p@ } +\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{211}{figure.caption.206}% +\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{212}{figure.caption.207}% +\addvspace {10\p@ } +\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{219}{figure.caption.221}% +\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{220}{figure.caption.223}% +\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{221}{figure.caption.224}% +\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{222}{figure.caption.226}% +\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{223}{figure.caption.228}% +\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{223}{figure.caption.229}% +\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{224}{figure.caption.231}% +\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{225}{figure.caption.232}% +\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{226}{figure.caption.234}% +\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{227}{figure.caption.235}% +\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{228}{figure.caption.237}% +\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{228}{figure.caption.238}% +\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{229}{figure.caption.239}% +\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{229}{figure.caption.241}% +\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{230}{figure.caption.243}% +\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{230}{figure.caption.245}% +\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{231}{figure.caption.247}% +\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{231}{figure.caption.248}% +\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{232}{figure.caption.249}% +\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{232}{figure.caption.250}% +\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{233}{figure.caption.251}% +\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{234}{figure.caption.252}% +\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{235}{figure.caption.253}% +\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{235}{figure.caption.254}% +\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{236}{figure.caption.255}% +\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{236}{figure.caption.256}% \addvspace {10\p@ } \contentsfinish diff --git a/docs/udelartex/tesis.out b/docs/udelartex/tesis.out index 0fa031d602e2bb69ba758408907d0ca06b6b9ae2..692c78a217f0783ce785361dc47123c684f44ca8 100644 --- a/docs/udelartex/tesis.out +++ b/docs/udelartex/tesis.out @@ -80,11 +80,11 @@ \BOOKMARK [2][-]{subsection.8.5.1}{Layer 3 High Availability}{section.8.5}% 80 \BOOKMARK [0][-]{chapter.9}{Trabajo a futuro}{}% 81 \BOOKMARK [0][-]{chapter.10}{Conclusiones}{}% 82 -\BOOKMARK [0][-]{chapter*.181}{Referencias bibliogr\341ficas}{}% 83 -\BOOKMARK [0][-]{chapter*.181}{Glosario}{}% 84 -\BOOKMARK [0][-]{section*.182}{Ap\351ndices}{}% 85 +\BOOKMARK [0][-]{chapter*.182}{Referencias bibliogr\341ficas}{}% 83 +\BOOKMARK [0][-]{chapter*.182}{Glosario}{}% 84 +\BOOKMARK [0][-]{section*.183}{Ap\351ndices}{}% 85 \BOOKMARK [0][-]{appendix.Alph1}{Im\341genes}{}% 86 -\BOOKMARK [0][-]{section*.185}{Anexos}{}% 87 +\BOOKMARK [0][-]{section*.186}{Anexos}{}% 87 \BOOKMARK [0][-]{appendix.Anexo.1}{Instalaci\363n versi\363n Queens}{}% 88 \BOOKMARK [1][-]{section.Anexo.1.1}{Preparaci\363n de nodos}{appendix.Anexo.1}% 89 \BOOKMARK [1][-]{section.Anexo.1.2}{Configuraci\363n}{appendix.Anexo.1}% 90 diff --git a/docs/udelartex/tesis.pdf b/docs/udelartex/tesis.pdf index a5267e67a7c490c029cf9d77020d8adecce51658..9e82457f93ee17b5c399db5ba28476ee9c4a297b 100644 Binary files a/docs/udelartex/tesis.pdf and b/docs/udelartex/tesis.pdf differ diff --git a/docs/udelartex/tesis.synctex.gz b/docs/udelartex/tesis.synctex.gz index 08a343c6e535c3ea8c1cc67c1f74c276426ed9df..e69617c0f7377e55e5016f7c06c5fd8dfdbb64a3 100644 Binary files a/docs/udelartex/tesis.synctex.gz and b/docs/udelartex/tesis.synctex.gz differ diff --git a/docs/udelartex/tesis.toc b/docs/udelartex/tesis.toc index aaf19a6f9aaa07ec8301007ffde7b9260daf0967..e7c91bf380c5e32d66fef9ace4416c5ab3d59aea 100644 --- a/docs/udelartex/tesis.toc +++ b/docs/udelartex/tesis.toc @@ -100,135 +100,135 @@ \contentsline {subsection}{\numberline {7.2.2}Eliminar un nodo de cómputo}{66}{subsection.7.2.2}% \contentsline {subsection}{\numberline {7.2.3}Infraestructura}{68}{subsection.7.2.3}% \contentsline {section}{\numberline {7.3}Actualizar versión}{72}{section.7.3}% -\contentsline {chapter}{\numberline {8}Análisis del módulo de red}{77}{chapter.8}% -\contentsline {section}{\numberline {8.1}Escenarios de prueba}{77}{section.8.1}% -\contentsline {subsection}{\numberline {8.1.1}Escenario 1: tráfico este-oeste (misma red tenant)}{78}{subsection.8.1.1}% -\contentsline {subsubsection}{\numberline {8.1.1.1}Composición del escenario}{78}{subsubsection.8.1.1.1}% -\contentsline {subsection}{\numberline {8.1.2}Escenario 2: tráfico este-oeste (distintas redes tenant)}{79}{subsection.8.1.2}% -\contentsline {subsubsection}{\numberline {8.1.2.1}Composición del escenario}{79}{subsubsection.8.1.2.1}% -\contentsline {subsection}{\numberline {8.1.3}Escenario 3: tráfico norte-sur (acceso hacia el exterior)}{80}{subsection.8.1.3}% -\contentsline {subsubsection}{\numberline {8.1.3.1}Composición del escenario}{81}{subsubsection.8.1.3.1}% -\contentsline {subsection}{\numberline {8.1.4}Escenario 4: tráfico norte-sur (acceso desde el exterior)}{82}{subsection.8.1.4}% -\contentsline {subsubsection}{\numberline {8.1.4.1}Composición del escenario}{82}{subsubsection.8.1.4.1}% -\contentsline {section}{\numberline {8.2}Linux bridge}{82}{section.8.2}% -\contentsline {subsection}{\numberline {8.2.1}Escenario 1}{83}{subsection.8.2.1}% -\contentsline {subsubsection}{\numberline {8.2.1.1}Análisis de componentes}{84}{subsubsection.8.2.1.1}% -\contentsline {subsubsection}{\numberline {8.2.1.2}Análisis de tráfico}{87}{subsubsection.8.2.1.2}% -\contentsline {subparagraph}{Paso 1}{87}{section*.92}% -\contentsline {subparagraph}{Paso 2}{87}{section*.93}% -\contentsline {subparagraph}{Paso 3}{91}{section*.98}% -\contentsline {subparagraph}{Paso 4}{92}{section*.101}% -\contentsline {subsection}{\numberline {8.2.2}Escenario 2}{93}{subsection.8.2.2}% -\contentsline {subsubsection}{\numberline {8.2.2.1}Análisis de componentes}{93}{subsubsection.8.2.2.1}% -\contentsline {subsubsection}{\numberline {8.2.2.2}Análisis de tráfico}{99}{subsubsection.8.2.2.2}% -\contentsline {subparagraph}{Paso 1}{99}{section*.103}% -\contentsline {subparagraph}{Paso 2}{99}{section*.104}% -\contentsline {subparagraph}{Paso 3}{99}{section*.105}% -\contentsline {subparagraph}{Paso 4}{100}{section*.107}% -\contentsline {subparagraph}{Paso 5}{100}{section*.108}% -\contentsline {subparagraph}{Paso 6}{100}{section*.109}% -\contentsline {subparagraph}{Paso 7}{100}{section*.111}% -\contentsline {subsection}{\numberline {8.2.3}Escenario 3}{101}{subsection.8.2.3}% -\contentsline {subsubsection}{\numberline {8.2.3.1}Análisis de componentes}{102}{subsubsection.8.2.3.1}% -\contentsline {subsubsection}{\numberline {8.2.3.2}Análisis de tráfico}{105}{subsubsection.8.2.3.2}% -\contentsline {subparagraph}{Paso 1}{105}{section*.113}% -\contentsline {subparagraph}{Paso 2}{105}{section*.114}% -\contentsline {subparagraph}{Paso 3}{105}{section*.115}% -\contentsline {subparagraph}{Paso 4}{106}{section*.117}% -\contentsline {subparagraph}{Paso 5}{106}{section*.118}% -\contentsline {subparagraph}{Paso 6}{107}{section*.120}% -\contentsline {subparagraph}{Paso 7}{108}{section*.122}% -\contentsline {subsection}{\numberline {8.2.4}Escenario 4}{109}{subsection.8.2.4}% -\contentsline {subsubsection}{\numberline {8.2.4.1}Análisis de componentes}{109}{subsubsection.8.2.4.1}% -\contentsline {subsubsection}{\numberline {8.2.4.2}Análisis de tráfico}{111}{subsubsection.8.2.4.2}% -\contentsline {subparagraph}{Paso 1}{111}{section*.124}% -\contentsline {subparagraph}{Paso 2}{111}{section*.125}% -\contentsline {subparagraph}{Paso 3}{111}{section*.126}% -\contentsline {subparagraph}{Paso 4}{112}{section*.129}% -\contentsline {subparagraph}{Paso 5}{112}{section*.130}% -\contentsline {subparagraph}{Paso 6}{113}{section*.132}% -\contentsline {section}{\numberline {8.3}Open vSwitch}{113}{section.8.3}% -\contentsline {subsubsection}{\numberline {8.3.0.1}Archivos de configuración}{115}{subsubsection.8.3.0.1}% -\contentsline {subsection}{\numberline {8.3.1}Escenario 1}{118}{subsection.8.3.1}% -\contentsline {subsubsection}{\numberline {8.3.1.1}Análisis de componentes}{118}{subsubsection.8.3.1.1}% -\contentsline {subsubsection}{\numberline {8.3.1.2}Análisis de tráfico}{124}{subsubsection.8.3.1.2}% -\contentsline {subparagraph}{Paso 1}{124}{section*.135}% -\contentsline {subparagraph}{Paso 2}{125}{section*.136}% -\contentsline {subparagraph}{Paso 3}{132}{section*.141}% -\contentsline {subparagraph}{Paso 4}{134}{section*.144}% -\contentsline {subsection}{\numberline {8.3.2}Escenario 2}{135}{subsection.8.3.2}% -\contentsline {subsubsection}{\numberline {8.3.2.1}Análisis de componentes}{135}{subsubsection.8.3.2.1}% -\contentsline {subsubsection}{\numberline {8.3.2.2}Análisis de tráfico}{139}{subsubsection.8.3.2.2}% -\contentsline {subparagraph}{Paso 1}{140}{section*.146}% -\contentsline {subparagraph}{Paso 2}{140}{section*.147}% -\contentsline {subparagraph}{Paso 3}{140}{section*.148}% -\contentsline {subparagraph}{Paso 4}{140}{section*.150}% -\contentsline {subparagraph}{Paso 5}{141}{section*.151}% -\contentsline {subparagraph}{Paso 6}{141}{section*.152}% -\contentsline {subparagraph}{Paso 7}{141}{section*.154}% -\contentsline {subsection}{\numberline {8.3.3}Escenario 3}{142}{subsection.8.3.3}% -\contentsline {subsubsection}{\numberline {8.3.3.1}Análisis de componentes}{142}{subsubsection.8.3.3.1}% -\contentsline {subsubsection}{\numberline {8.3.3.2}Análisis de tráfico}{145}{subsubsection.8.3.3.2}% -\contentsline {subparagraph}{Paso 1}{145}{section*.156}% -\contentsline {subparagraph}{Paso 2}{145}{section*.157}% -\contentsline {subparagraph}{Paso 3}{146}{section*.158}% -\contentsline {subparagraph}{Paso 4}{146}{section*.160}% -\contentsline {subparagraph}{Paso 5}{146}{section*.161}% -\contentsline {subparagraph}{Paso 6}{148}{section*.163}% -\contentsline {subparagraph}{Paso 7}{148}{section*.165}% -\contentsline {subsection}{\numberline {8.3.4}Escenario 4}{149}{subsection.8.3.4}% -\contentsline {subsubsection}{\numberline {8.3.4.1}Análisis de componentes}{149}{subsubsection.8.3.4.1}% -\contentsline {subsubsection}{\numberline {8.3.4.2}Análisis de tráfico}{150}{subsubsection.8.3.4.2}% -\contentsline {subparagraph}{Paso 1}{151}{section*.167}% -\contentsline {subparagraph}{Paso 2}{151}{section*.168}% -\contentsline {subparagraph}{Paso 3}{151}{section*.169}% -\contentsline {subparagraph}{Paso 4}{153}{section*.172}% -\contentsline {subparagraph}{Paso 5}{153}{section*.173}% -\contentsline {subparagraph}{Paso 6}{153}{section*.175}% -\contentsline {section}{\numberline {8.4}Comparativa de drivers}{153}{section.8.4}% -\contentsline {section}{\numberline {8.5}Funcionalidades avanzadas}{153}{section.8.5}% -\contentsline {subsection}{\numberline {8.5.1}Layer 3 High Availability}{153}{subsection.8.5.1}% -\contentsline {chapter}{\numberline {9}Trabajo a futuro}{155}{chapter.9}% -\contentsline {chapter}{\numberline {10}Conclusiones}{157}{chapter.10}% -\contentsline {chapter}{Referencias bibliográficas}{158}{chapter*.181}% -\contentsline {chapter}{Glosario}{164}{chapter*.181}% -\contentsline {chapter}{\textbf {Apéndices}}{165}{section*.182}% +\contentsline {chapter}{\numberline {8}Análisis del módulo de red}{78}{chapter.8}% +\contentsline {section}{\numberline {8.1}Escenarios de prueba}{78}{section.8.1}% +\contentsline {subsection}{\numberline {8.1.1}Escenario 1: tráfico este-oeste (misma red tenant)}{79}{subsection.8.1.1}% +\contentsline {subsubsection}{\numberline {8.1.1.1}Composición del escenario}{79}{subsubsection.8.1.1.1}% +\contentsline {subsection}{\numberline {8.1.2}Escenario 2: tráfico este-oeste (distintas redes tenant)}{80}{subsection.8.1.2}% +\contentsline {subsubsection}{\numberline {8.1.2.1}Composición del escenario}{80}{subsubsection.8.1.2.1}% +\contentsline {subsection}{\numberline {8.1.3}Escenario 3: tráfico norte-sur (acceso hacia el exterior)}{81}{subsection.8.1.3}% +\contentsline {subsubsection}{\numberline {8.1.3.1}Composición del escenario}{82}{subsubsection.8.1.3.1}% +\contentsline {subsection}{\numberline {8.1.4}Escenario 4: tráfico norte-sur (acceso desde el exterior)}{83}{subsection.8.1.4}% +\contentsline {subsubsection}{\numberline {8.1.4.1}Composición del escenario}{83}{subsubsection.8.1.4.1}% +\contentsline {section}{\numberline {8.2}Linux bridge}{83}{section.8.2}% +\contentsline {subsection}{\numberline {8.2.1}Escenario 1}{84}{subsection.8.2.1}% +\contentsline {subsubsection}{\numberline {8.2.1.1}Análisis de componentes}{85}{subsubsection.8.2.1.1}% +\contentsline {subsubsection}{\numberline {8.2.1.2}Análisis de tráfico}{88}{subsubsection.8.2.1.2}% +\contentsline {subparagraph}{Paso 1}{88}{section*.93}% +\contentsline {subparagraph}{Paso 2}{88}{section*.94}% +\contentsline {subparagraph}{Paso 3}{92}{section*.99}% +\contentsline {subparagraph}{Paso 4}{93}{section*.102}% +\contentsline {subsection}{\numberline {8.2.2}Escenario 2}{94}{subsection.8.2.2}% +\contentsline {subsubsection}{\numberline {8.2.2.1}Análisis de componentes}{94}{subsubsection.8.2.2.1}% +\contentsline {subsubsection}{\numberline {8.2.2.2}Análisis de tráfico}{100}{subsubsection.8.2.2.2}% +\contentsline {subparagraph}{Paso 1}{100}{section*.104}% +\contentsline {subparagraph}{Paso 2}{100}{section*.105}% +\contentsline {subparagraph}{Paso 3}{100}{section*.106}% +\contentsline {subparagraph}{Paso 4}{101}{section*.108}% +\contentsline {subparagraph}{Paso 5}{101}{section*.109}% +\contentsline {subparagraph}{Paso 6}{101}{section*.110}% +\contentsline {subparagraph}{Paso 7}{101}{section*.112}% +\contentsline {subsection}{\numberline {8.2.3}Escenario 3}{102}{subsection.8.2.3}% +\contentsline {subsubsection}{\numberline {8.2.3.1}Análisis de componentes}{103}{subsubsection.8.2.3.1}% +\contentsline {subsubsection}{\numberline {8.2.3.2}Análisis de tráfico}{106}{subsubsection.8.2.3.2}% +\contentsline {subparagraph}{Paso 1}{106}{section*.114}% +\contentsline {subparagraph}{Paso 2}{106}{section*.115}% +\contentsline {subparagraph}{Paso 3}{106}{section*.116}% +\contentsline {subparagraph}{Paso 4}{107}{section*.118}% +\contentsline {subparagraph}{Paso 5}{107}{section*.119}% +\contentsline {subparagraph}{Paso 6}{108}{section*.121}% +\contentsline {subparagraph}{Paso 7}{109}{section*.123}% +\contentsline {subsection}{\numberline {8.2.4}Escenario 4}{110}{subsection.8.2.4}% +\contentsline {subsubsection}{\numberline {8.2.4.1}Análisis de componentes}{110}{subsubsection.8.2.4.1}% +\contentsline {subsubsection}{\numberline {8.2.4.2}Análisis de tráfico}{112}{subsubsection.8.2.4.2}% +\contentsline {subparagraph}{Paso 1}{112}{section*.125}% +\contentsline {subparagraph}{Paso 2}{112}{section*.126}% +\contentsline {subparagraph}{Paso 3}{112}{section*.127}% +\contentsline {subparagraph}{Paso 4}{113}{section*.130}% +\contentsline {subparagraph}{Paso 5}{113}{section*.131}% +\contentsline {subparagraph}{Paso 6}{114}{section*.133}% +\contentsline {section}{\numberline {8.3}Open vSwitch}{114}{section.8.3}% +\contentsline {subsubsection}{\numberline {8.3.0.1}Archivos de configuración}{116}{subsubsection.8.3.0.1}% +\contentsline {subsection}{\numberline {8.3.1}Escenario 1}{119}{subsection.8.3.1}% +\contentsline {subsubsection}{\numberline {8.3.1.1}Análisis de componentes}{119}{subsubsection.8.3.1.1}% +\contentsline {subsubsection}{\numberline {8.3.1.2}Análisis de tráfico}{125}{subsubsection.8.3.1.2}% +\contentsline {subparagraph}{Paso 1}{125}{section*.136}% +\contentsline {subparagraph}{Paso 2}{126}{section*.137}% +\contentsline {subparagraph}{Paso 3}{133}{section*.142}% +\contentsline {subparagraph}{Paso 4}{135}{section*.145}% +\contentsline {subsection}{\numberline {8.3.2}Escenario 2}{136}{subsection.8.3.2}% +\contentsline {subsubsection}{\numberline {8.3.2.1}Análisis de componentes}{136}{subsubsection.8.3.2.1}% +\contentsline {subsubsection}{\numberline {8.3.2.2}Análisis de tráfico}{140}{subsubsection.8.3.2.2}% +\contentsline {subparagraph}{Paso 1}{141}{section*.147}% +\contentsline {subparagraph}{Paso 2}{141}{section*.148}% +\contentsline {subparagraph}{Paso 3}{141}{section*.149}% +\contentsline {subparagraph}{Paso 4}{141}{section*.151}% +\contentsline {subparagraph}{Paso 5}{142}{section*.152}% +\contentsline {subparagraph}{Paso 6}{142}{section*.153}% +\contentsline {subparagraph}{Paso 7}{142}{section*.155}% +\contentsline {subsection}{\numberline {8.3.3}Escenario 3}{143}{subsection.8.3.3}% +\contentsline {subsubsection}{\numberline {8.3.3.1}Análisis de componentes}{143}{subsubsection.8.3.3.1}% +\contentsline {subsubsection}{\numberline {8.3.3.2}Análisis de tráfico}{146}{subsubsection.8.3.3.2}% +\contentsline {subparagraph}{Paso 1}{146}{section*.157}% +\contentsline {subparagraph}{Paso 2}{146}{section*.158}% +\contentsline {subparagraph}{Paso 3}{147}{section*.159}% +\contentsline {subparagraph}{Paso 4}{147}{section*.161}% +\contentsline {subparagraph}{Paso 5}{147}{section*.162}% +\contentsline {subparagraph}{Paso 6}{149}{section*.164}% +\contentsline {subparagraph}{Paso 7}{149}{section*.166}% +\contentsline {subsection}{\numberline {8.3.4}Escenario 4}{150}{subsection.8.3.4}% +\contentsline {subsubsection}{\numberline {8.3.4.1}Análisis de componentes}{150}{subsubsection.8.3.4.1}% +\contentsline {subsubsection}{\numberline {8.3.4.2}Análisis de tráfico}{151}{subsubsection.8.3.4.2}% +\contentsline {subparagraph}{Paso 1}{152}{section*.168}% +\contentsline {subparagraph}{Paso 2}{152}{section*.169}% +\contentsline {subparagraph}{Paso 3}{152}{section*.170}% +\contentsline {subparagraph}{Paso 4}{154}{section*.173}% +\contentsline {subparagraph}{Paso 5}{154}{section*.174}% +\contentsline {subparagraph}{Paso 6}{154}{section*.176}% +\contentsline {section}{\numberline {8.4}Comparativa de drivers}{154}{section.8.4}% +\contentsline {section}{\numberline {8.5}Funcionalidades avanzadas}{154}{section.8.5}% +\contentsline {subsection}{\numberline {8.5.1}Layer 3 High Availability}{154}{subsection.8.5.1}% +\contentsline {chapter}{\numberline {9}Trabajo a futuro}{156}{chapter.9}% +\contentsline {chapter}{\numberline {10}Conclusiones}{158}{chapter.10}% +\contentsline {chapter}{Referencias bibliográficas}{159}{chapter*.182}% +\contentsline {chapter}{Glosario}{165}{chapter*.182}% +\contentsline {chapter}{\textbf {Apéndices}}{166}{section*.183}% \ttl@change@i {\@ne }{chapter}{13pt}{}{ Apéndice\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax \ttl@change@v {chapter}{}{}{}\relax -\contentsline {chapter}{\numberline {1}Imágenes}{166}{appendix.Alph1}% +\contentsline {chapter}{\numberline {1}Imágenes}{167}{appendix.Alph1}% \ttl@change@i {\@ne }{chapter}{0pt}{\vspace *{0.45cm}}{\thecontentslabel \quad }{}{\bfseries \hfill \contentspage }\relax \ttl@change@v {chapter}{}{}{}\relax -\contentsline {chapter}{\textbf {Anexos}}{169}{section*.185}% +\contentsline {chapter}{\textbf {Anexos}}{170}{section*.186}% \ttl@change@i {\@ne }{chapter}{13pt}{}{ Anexo\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax \ttl@change@v {chapter}{}{}{}\relax -\contentsline {chapter}{\numberline {1}Instalación versión Queens}{170}{appendix.Anexo.1}% -\contentsline {section}{\numberline {1.1}Preparación de nodos}{170}{section.Anexo.1.1}% -\contentsline {section}{\numberline {1.2}Configuración}{179}{section.Anexo.1.2}% -\contentsline {subsection}{\numberline {1.2.1}Configuración claves SSH}{179}{subsection.Anexo.1.2.1}% -\contentsline {subsection}{\numberline {1.2.2}Archivos de configuración OSA}{180}{subsection.Anexo.1.2.2}% -\contentsline {subsection}{\numberline {1.2.3}Generación de claves}{185}{subsection.Anexo.1.2.3}% -\contentsline {subsection}{\numberline {1.2.4}Correcciones}{185}{subsection.Anexo.1.2.4}% -\contentsline {subsubsection}{\numberline {1.2.4.1}SELinux}{185}{subsubsection.Anexo.1.2.4.1}% -\contentsline {chapter}{\numberline {2}Instalación versión Stein}{186}{appendix.Anexo.2}% -\contentsline {section}{\numberline {2.1}Preparación de nodos}{186}{section.Anexo.2.1}% -\contentsline {section}{\numberline {2.2}Configuración archivos OSA}{199}{section.Anexo.2.2}% -\contentsline {subsubsection}{\numberline {2.2.0.1}user\_variables.yml}{204}{subsubsection.Anexo.2.2.0.1}% -\contentsline {section}{\numberline {2.3}Ejecución de playbooks}{206}{section.Anexo.2.3}% -\contentsline {section}{\numberline {2.4}Cambios para driver OVS}{207}{section.Anexo.2.4}% -\contentsline {chapter}{\numberline {3}Virtualización con KVM}{210}{appendix.Anexo.3}% -\contentsline {section}{\numberline {3.1}Utilización virt-manager}{210}{section.Anexo.3.1}% -\contentsline {subsection}{\numberline {3.1.1}Conexión remota}{210}{subsection.Anexo.3.1.1}% -\contentsline {subsection}{\numberline {3.1.2}Creación de una red}{211}{subsection.Anexo.3.1.2}% -\contentsline {subsection}{\numberline {3.1.3}Crear nodo}{213}{subsection.Anexo.3.1.3}% -\contentsline {chapter}{\numberline {4}Interacción}{217}{appendix.Anexo.4}% -\contentsline {section}{\numberline {4.1}Configuraciones de administrador}{218}{section.Anexo.4.1}% -\contentsline {section}{\numberline {4.2}Interacción de un usuario}{224}{section.Anexo.4.2}% -\contentsline {section}{\numberline {4.3}Acceso a una instancia}{232}{section.Anexo.4.3}% -\contentsline {subsection}{\numberline {4.3.1}Por SPICE}{232}{subsection.Anexo.4.3.1}% -\contentsline {subsection}{\numberline {4.3.2}Por SSH}{233}{subsection.Anexo.4.3.2}% -\contentsline {subsubsection}{\numberline {4.3.2.1}Asociar una Floating IP a la instancia}{233}{subsubsection.Anexo.4.3.2.1}% -\contentsline {subsubsection}{\numberline {4.3.2.2}Modificar security group}{234}{subsubsection.Anexo.4.3.2.2}% -\contentsline {subsubsection}{\numberline {4.3.2.3}SSH}{235}{subsubsection.Anexo.4.3.2.3}% -\contentsline {subsection}{\numberline {4.3.3}Por virsh}{236}{subsection.Anexo.4.3.3}% -\contentsline {chapter}{\numberline {5}migrate\_instance.sh}{237}{appendix.Anexo.5}% +\contentsline {chapter}{\numberline {1}Instalación versión Queens}{171}{appendix.Anexo.1}% +\contentsline {section}{\numberline {1.1}Preparación de nodos}{171}{section.Anexo.1.1}% +\contentsline {section}{\numberline {1.2}Configuración}{180}{section.Anexo.1.2}% +\contentsline {subsection}{\numberline {1.2.1}Configuración claves SSH}{180}{subsection.Anexo.1.2.1}% +\contentsline {subsection}{\numberline {1.2.2}Archivos de configuración OSA}{181}{subsection.Anexo.1.2.2}% +\contentsline {subsection}{\numberline {1.2.3}Generación de claves}{186}{subsection.Anexo.1.2.3}% +\contentsline {subsection}{\numberline {1.2.4}Correcciones}{186}{subsection.Anexo.1.2.4}% +\contentsline {subsubsection}{\numberline {1.2.4.1}SELinux}{186}{subsubsection.Anexo.1.2.4.1}% +\contentsline {chapter}{\numberline {2}Instalación versión Stein}{187}{appendix.Anexo.2}% +\contentsline {section}{\numberline {2.1}Preparación de nodos}{187}{section.Anexo.2.1}% +\contentsline {section}{\numberline {2.2}Configuración archivos OSA}{200}{section.Anexo.2.2}% +\contentsline {subsubsection}{\numberline {2.2.0.1}user\_variables.yml}{205}{subsubsection.Anexo.2.2.0.1}% +\contentsline {section}{\numberline {2.3}Ejecución de playbooks}{207}{section.Anexo.2.3}% +\contentsline {section}{\numberline {2.4}Cambios para driver OVS}{208}{section.Anexo.2.4}% +\contentsline {chapter}{\numberline {3}Virtualización con KVM}{211}{appendix.Anexo.3}% +\contentsline {section}{\numberline {3.1}Utilización virt-manager}{211}{section.Anexo.3.1}% +\contentsline {subsection}{\numberline {3.1.1}Conexión remota}{211}{subsection.Anexo.3.1.1}% +\contentsline {subsection}{\numberline {3.1.2}Creación de una red}{212}{subsection.Anexo.3.1.2}% +\contentsline {subsection}{\numberline {3.1.3}Crear nodo}{214}{subsection.Anexo.3.1.3}% +\contentsline {chapter}{\numberline {4}Interacción}{218}{appendix.Anexo.4}% +\contentsline {section}{\numberline {4.1}Configuraciones de administrador}{219}{section.Anexo.4.1}% +\contentsline {section}{\numberline {4.2}Interacción de un usuario}{225}{section.Anexo.4.2}% +\contentsline {section}{\numberline {4.3}Acceso a una instancia}{233}{section.Anexo.4.3}% +\contentsline {subsection}{\numberline {4.3.1}Por SPICE}{233}{subsection.Anexo.4.3.1}% +\contentsline {subsection}{\numberline {4.3.2}Por SSH}{234}{subsection.Anexo.4.3.2}% +\contentsline {subsubsection}{\numberline {4.3.2.1}Asociar una Floating IP a la instancia}{234}{subsubsection.Anexo.4.3.2.1}% +\contentsline {subsubsection}{\numberline {4.3.2.2}Modificar security group}{235}{subsubsection.Anexo.4.3.2.2}% +\contentsline {subsubsection}{\numberline {4.3.2.3}SSH}{236}{subsubsection.Anexo.4.3.2.3}% +\contentsline {subsection}{\numberline {4.3.3}Por virsh}{237}{subsection.Anexo.4.3.3}% +\contentsline {chapter}{\numberline {5}migrate\_instance.sh}{238}{appendix.Anexo.5}% \contentsfinish diff --git a/docs/udelartex/tesis.xwm b/docs/udelartex/tesis.xwm index a817c744382c5f7100cc8388460aded3198f966b..6d630b90abdec2753c891f54995ffd7d7e4af09e 100644 --- a/docs/udelartex/tesis.xwm +++ b/docs/udelartex/tesis.xwm @@ -1,2 +1,2 @@ \relax -\xwmnewlabel{xwmlastpage}{{5}{238}{migrate\_instance.sh\relax }{lstnumber.-312.31}{}} +\xwmnewlabel{xwmlastpage}{{5}{239}{migrate\_instance.sh\relax }{lstnumber.-312.31}{}}