diff --git a/docs/udelartex/capitulos/gestion.tex b/docs/udelartex/capitulos/gestion.tex index 521e8c18558f94f118ce87dbdce3fffe7e779822..374103d97524dc40abc04398e0bdb7a00e7bb27c 100644 --- a/docs/udelartex/capitulos/gestion.tex +++ b/docs/udelartex/capitulos/gestion.tex @@ -2,7 +2,7 @@ En este capÃtulo se detallan un conjunto de tareas de gestión del Datacenter implementado con OpenStack. Estas tareas deben ser realizadas por los usuarios con el rol de administrador del Datacenter. En las siguientes secciones se analiza cómo agregar o remover nodos fÃsicos al Datacenter, cómo recuperarse ante posibles fallas y cómo realizar una actualización de versión de OpenStack. \section{Recuperación ante fallas} -Ante la presencia de problemas como puede ser un corte de energÃa en un grupo de servidores o en la totalidad de los mismos, o bien alguna funcionalidad de Openstack no responde de forma correcta, será necesaria la participación del administrador del sistema para detectar y solucionar el problema. A continuación se presentan una serie de secciones a modo de guÃa para que el administrador lleve a cabo los objetivos mencionados. +Ante la presencia de problemas como puede ser un corte de energÃa en un grupo de servidores o en la totalidad de los mismos, o bien alguna funcionalidad de OpenStack no responde de forma correcta, será necesaria la participación del administrador del sistema para detectar y solucionar el problema. A continuación se presentan una serie de secciones a modo de guÃa para que el administrador lleve a cabo los objetivos mencionados. \subsection{Verificar el estado general de OpenStack} En la instalación de OSA se despliega el container utility en los nodos de infraestructura, el cual provee de una CLI para realizar cambios, instanciar recursos o simplemente verificar las funcionalidades. Para esto se accede a cualquier nodo del tipo mencionado y se siguen los pasos indicados en \cite{openstack-verify-cloud}. En resumen lo que intenta realizar la guÃa referenciada es ejecutar comandos que involucren a todos los servicios desplegados de OpenStack, haciendo especial hincapié en el estado de los endpoints de los distintos módulos. @@ -201,7 +201,118 @@ Retomando la acción principal, luego de migrar todas las instancias del nodo de \end{itemize} \subsection{Infraestructura} +Agregar nodos de infraestructura es una tarea compleja y sensible debido a todas las tareas que involucra y las estructuras que modifica como son los clusters, la creación de nuevos contenedores y la posterior sincronización con los existentes, la actualización de los balanceadores de carga, entre otros. A continuación se explica el proceso realizado para la versión Queens y luego para la Stein.\\ +\noindent\textbf{Versión Queens} + +Para agregar un nodo de infraestructura se utilizó la guÃa del documento [\path{https://docs.openstack.org/openstack-ansible/queens/admin/scale-environment.html#add-a-compute-host}]. +Pasos en el nuevo nodo: +\begin{itemize} + \item Crear un nodo análogo al nodo de infraestructura modificando las IPs de sus interfaces. + \item Modificar las reglas de firewall como se indica en los pasos a seguir en la preparación de nodos [\ref{anexoQueens}]. +\end{itemize} +Pasos en el nodo deploy: +\begin{itemize} +\item Verificar el acceso por SSH desde el nodo de deploy. +\item Se realiza el ssh-copy-id desde el nodo deploy +\begin{lstlisting} +[root@deploy ~]# ssh-copy-id 10.0.1.21 +\end{lstlisting} +\item Se respalda la instalación actual: +\begin{lstlisting} +$ source_series_backup_file="/openstack/backup-openstack-ansible-stein.tar.gz" +$ tar zcf ${source_series_backup_file} /etc/openstack_deploy /etc/ansible/ /usr/local/bin/openstack-ansible.rc +\end{lstlisting} +\item Se agrega el nuevo nodo a la playbook principal \path{/etc/openstack_deploy/openstack_user_config.yml}: +\begin{lstlisting} +### +### Infrastructure +### + +_infrastructure_hosts: &infrastructure_hosts + infra1: + ip: 10.0.1.11 + infra2: + ip: 10.0.1.21 +\end{lstlisting} +\item Posicionarse en el directorio de playbooks con '\$ cd /opt/openstack-ansible/playbooks' +\item Actualizar el inventario de nodos: +\begin{lstlisting} +$ /opt/openstack-ansible/inventory/dynamic_inventory.py > /dev/null +\end{lstlisting} + +\item Crear el archivo \path{/root/add_host.limit} con el siguiente contenido (localhost, el nuevo nodo y los containers):\\ +localhost\\ +infra2\\ +infra2-host\_containers + +\item Ejecutar la playbook guardando el log: +\begin{lstlisting} +$ openstack-ansible -vvv setup-everything.yml --limit @/root/add_host.limit 2>&1 | tee /var/log/openstack/new_infra.log +\end{lstlisting} +\end{itemize} + +En la ejecución de la playbooks surgieron múltiples problemas relacionados con los distintos clusters, con el servidor de repositorio, entre otros, imposibilitando culminar con el proceso correctamente y por lo tanto no se pudo lograr agregar un nodo de infraestructura al Datacenter.\\ + +\noindent\textbf{Versión Stein} + +Para esta versión se utilizó la siguiente guÃa de referencia [\path{https://docs.openstack.org/openstack-ansible/queens/admin/scale-environment.html#add-a-compute-host}]. +Pasos en el nuevo nodo: +\begin{itemize} +\item Crear un nodo análogo al nodo de infraestructura modificando las IPs de sus interfaces. +\item Modificar las reglas de firewall como se indica en los pasos a seguir en la preparación de nodos [\ref{anexoQueens}]. +\item Se agrega el veth pair: +\begin{lstlisting} +$ ip link add dev br-vlan-veth type veth peer name eth12 +$ ip link set eth12 up +$ ip link set br-vlan-veth up +$ brctl addif br-vlan br-vlan-veth +$ service network restart +\end{lstlisting} +\end{itemize} +Pasos en el nodo deploy: +\begin{itemize} +\item Verificar el acceso por SSH desde el nodo de deploy. +\item Se realiza el ssh-copy-id desde el nodo deploy +\begin{lstlisting} +[root@deploy ~]# ssh-copy-id 10.0.10.21 +\end{lstlisting} +\item Se respalda la instalación actual: +\begin{lstlisting} +$ source_series_backup_file="/openstack/backup-openstack-ansible-stein.tar.gz" +$ tar zcf ${source_series_backup_file} /etc/openstack_deploy /etc/ansible/ usr/local/bin/openstack-ansible.rc +\end{lstlisting} +\item Se agrega el nuevo nodo a la playbook principal \path{/etc/openstack_deploy/openstack_user_config.yml}: +\begin{lstlisting} +### +### Infrastructure +### +_infrastructure_hosts: &infrastructure_hosts +infra1: + ip: 10.0.10.11 +infra2: + ip: 10.0.10.21 +\end{lstlisting} +\item Posicionarse en el directorio de playbooks con '\$ cd opt/openstack-ansible/playbooks' +\item Actualizar el inventario de nodos: +\begin{lstlisting} +$ /opt/openstack-ansible/inventory/dynamic_inventory.py > /dev/null +\end{lstlisting} + +\item Crear el archivo \path{/root/add_host.limit} con el siguiente contenido (localhost, el nuevo nodo y los containers):\\ +localhost\\ +infra2\\ +infra2-host\_containers\\ +rabbit\_mq\_container\\ +ceph-mon\_container\\ +keystone\_container + +\item Ejecutar la playbook guardando el log: +\begin{lstlisting} +$ openstack-ansible -vvv setup-everything.yml --limit @/root/add_host.limit >&1 | tee /var/log/openstack/new_infra.log +\end{lstlisting} +\end{itemize} +En la ejecución de la playbooks surgieron múltiples problemas relacionados on los distintos clusters, con el servidor de repositorio, entre otros, imposibilitando culminar con el proceso correctamente y por lo tanto no se pudo lograr agregar un nodo de infraestructura al Datacenter. \section{Actualizar versión} diff --git a/docs/udelartex/tesis.lof b/docs/udelartex/tesis.lof index d07f5765d19bd775247662cc30a69e083fce90b4..147e31f773c3faa3a5c9e91c1e475678cca760b0 100644 --- a/docs/udelartex/tesis.lof +++ b/docs/udelartex/tesis.lof @@ -32,81 +32,81 @@ \contentsline {figure}{\numberline {6.5}{\ignorespaces Salida a Internet en los nodos de Openstack.\relax }}{61}{figure.caption.73}% \addvspace {10\p@ } \addvspace {10\p@ } -\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{75}{figure.caption.93}% -\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{80}{figure.caption.96}% -\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{80}{figure.caption.97}% -\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{82}{figure.caption.98}% -\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{83}{figure.caption.99}% -\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{83}{figure.caption.101}% -\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{84}{figure.caption.102}% -\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{85}{figure.caption.104}% -\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{92}{figure.caption.108}% -\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{93}{figure.caption.112}% -\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{93}{figure.caption.114}% -\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{98}{figure.caption.118}% -\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{99}{figure.caption.121}% -\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{100}{figure.caption.123}% -\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{101}{figure.caption.125}% -\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router fÃsico\relax }}{104}{figure.caption.129}% -\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{104}{figure.caption.130}% -\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{105}{figure.caption.133}% -\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{106}{figure.caption.135}% -\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{110}{figure.caption.136}% -\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{117}{figure.caption.139}% -\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{119}{figure.caption.140}% -\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{123}{figure.caption.141}% -\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{124}{figure.caption.142}% -\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{124}{figure.caption.144}% -\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{126}{figure.caption.145}% -\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{127}{figure.caption.147}% -\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{132}{figure.caption.151}% -\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{133}{figure.caption.155}% -\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{134}{figure.caption.157}% -\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{138}{figure.caption.161}% -\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{139}{figure.caption.164}% -\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{140}{figure.caption.166}% -\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{141}{figure.caption.168}% -\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router fÃsico\relax }}{144}{figure.caption.172}% -\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{144}{figure.caption.173}% -\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{145}{figure.caption.176}% -\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes fÃsicos funcionales\relax }}{146}{figure.caption.178}% -\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes fÃsicos luego de un fallo en uno de ellos\relax }}{146}{figure.caption.179}% -\addvspace {10\p@ } -\addvspace {10\p@ } -\addvspace {10\p@ } -\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{159}{figure.caption.185}% -\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{160}{figure.caption.186}% -\addvspace {10\p@ } -\addvspace {10\p@ } -\addvspace {10\p@ } -\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{202}{figure.caption.207}% -\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{203}{figure.caption.208}% -\addvspace {10\p@ } -\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{210}{figure.caption.222}% -\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{211}{figure.caption.224}% -\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{212}{figure.caption.225}% -\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{213}{figure.caption.227}% -\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{214}{figure.caption.229}% -\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{214}{figure.caption.230}% -\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{215}{figure.caption.232}% -\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{216}{figure.caption.233}% -\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{217}{figure.caption.235}% -\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{218}{figure.caption.236}% -\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{219}{figure.caption.238}% -\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{219}{figure.caption.239}% -\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{220}{figure.caption.240}% -\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{220}{figure.caption.242}% -\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{221}{figure.caption.244}% -\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{221}{figure.caption.246}% -\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{222}{figure.caption.248}% -\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{222}{figure.caption.249}% -\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{223}{figure.caption.250}% -\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{223}{figure.caption.251}% -\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{224}{figure.caption.252}% -\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{225}{figure.caption.253}% -\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{226}{figure.caption.254}% -\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{226}{figure.caption.255}% -\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{227}{figure.caption.256}% -\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{227}{figure.caption.257}% +\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{79}{figure.caption.93}% +\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{84}{figure.caption.96}% +\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{84}{figure.caption.97}% +\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{86}{figure.caption.98}% +\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{87}{figure.caption.99}% +\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{87}{figure.caption.101}% +\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{88}{figure.caption.102}% +\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{89}{figure.caption.104}% +\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{96}{figure.caption.108}% +\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{97}{figure.caption.112}% +\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{97}{figure.caption.114}% +\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{102}{figure.caption.118}% +\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{103}{figure.caption.121}% +\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{104}{figure.caption.123}% +\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{105}{figure.caption.125}% +\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router fÃsico\relax }}{108}{figure.caption.129}% +\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{108}{figure.caption.130}% +\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{109}{figure.caption.133}% +\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{110}{figure.caption.135}% +\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{114}{figure.caption.136}% +\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{121}{figure.caption.139}% +\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{123}{figure.caption.140}% +\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{127}{figure.caption.141}% +\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{128}{figure.caption.142}% +\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{128}{figure.caption.144}% +\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{130}{figure.caption.145}% +\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{131}{figure.caption.147}% +\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{136}{figure.caption.151}% +\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{137}{figure.caption.155}% +\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{138}{figure.caption.157}% +\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{142}{figure.caption.161}% +\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{143}{figure.caption.164}% +\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{144}{figure.caption.166}% +\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{145}{figure.caption.168}% +\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router fÃsico\relax }}{148}{figure.caption.172}% +\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{148}{figure.caption.173}% +\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{149}{figure.caption.176}% +\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes fÃsicos funcionales\relax }}{150}{figure.caption.178}% +\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes fÃsicos luego de un fallo en uno de ellos\relax }}{150}{figure.caption.179}% +\addvspace {10\p@ } +\addvspace {10\p@ } +\addvspace {10\p@ } +\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{163}{figure.caption.185}% +\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{164}{figure.caption.186}% +\addvspace {10\p@ } +\addvspace {10\p@ } +\addvspace {10\p@ } +\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{206}{figure.caption.207}% +\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{207}{figure.caption.208}% +\addvspace {10\p@ } +\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{214}{figure.caption.222}% +\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{215}{figure.caption.224}% +\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{216}{figure.caption.225}% +\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{217}{figure.caption.227}% +\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{218}{figure.caption.229}% +\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{218}{figure.caption.230}% +\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{219}{figure.caption.232}% +\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{220}{figure.caption.233}% +\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{221}{figure.caption.235}% +\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{222}{figure.caption.236}% +\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{223}{figure.caption.238}% +\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{223}{figure.caption.239}% +\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{224}{figure.caption.240}% +\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{224}{figure.caption.242}% +\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{225}{figure.caption.244}% +\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{225}{figure.caption.246}% +\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{226}{figure.caption.248}% +\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{226}{figure.caption.249}% +\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{227}{figure.caption.250}% +\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{227}{figure.caption.251}% +\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{228}{figure.caption.252}% +\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{229}{figure.caption.253}% +\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{230}{figure.caption.254}% +\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{230}{figure.caption.255}% +\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{231}{figure.caption.256}% +\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{231}{figure.caption.257}% \addvspace {10\p@ } \contentsfinish diff --git a/docs/udelartex/tesis.lot b/docs/udelartex/tesis.lot index 2f1cb9af0b8da8898c264c8be63bbe1a6eef89f9..fbc63fbdc19d6eda3cf17cc73762f996f5e93a3d 100644 --- a/docs/udelartex/tesis.lot +++ b/docs/udelartex/tesis.lot @@ -9,24 +9,24 @@ \addvspace {10\p@ } \addvspace {10\p@ } \addvspace {10\p@ } -\contentsline {table}{\numberline {8.1}{\ignorespaces Sabores creados para análisis de red\relax }}{69}{table.caption.75}% -\contentsline {table}{\numberline {8.2}{\ignorespaces Imágenes creadas para análisis de red\relax }}{69}{table.caption.76}% -\contentsline {table}{\numberline {8.3}{\ignorespaces Redes provider creadas para análisis de red\relax }}{70}{table.caption.77}% -\contentsline {table}{\numberline {8.4}{\ignorespaces Subredes provider creadas para análisis de red\relax }}{70}{table.caption.78}% -\contentsline {table}{\numberline {8.5}{\ignorespaces Escenario 1: detalles de la subred 1\relax }}{71}{table.caption.79}% -\contentsline {table}{\numberline {8.6}{\ignorespaces Escenario 1: detalles de las instancias\relax }}{71}{table.caption.80}% -\contentsline {table}{\numberline {8.7}{\ignorespaces Escenario 2: detalles de la subred 1\relax }}{72}{table.caption.81}% -\contentsline {table}{\numberline {8.8}{\ignorespaces Escenario 2: detalles de la subred 2\relax }}{72}{table.caption.82}% -\contentsline {table}{\numberline {8.9}{\ignorespaces Escenario 2: detalles de las instancias\relax }}{72}{table.caption.83}% -\contentsline {table}{\numberline {8.10}{\ignorespaces Escenario 2: detalles del router\relax }}{72}{table.caption.84}% -\contentsline {table}{\numberline {8.11}{\ignorespaces Escenario 3: detalles de la subred 1\relax }}{73}{table.caption.85}% -\contentsline {table}{\numberline {8.12}{\ignorespaces Escenario 3: detalles de la subred provider vlan\relax }}{73}{table.caption.86}% -\contentsline {table}{\numberline {8.13}{\ignorespaces Escenario 3: detalles de las instancias\relax }}{73}{table.caption.87}% -\contentsline {table}{\numberline {8.14}{\ignorespaces Escenario 3: detalles del router\relax }}{73}{table.caption.88}% -\contentsline {table}{\numberline {8.15}{\ignorespaces Escenario 4: detalles de la subred 1\relax }}{74}{table.caption.89}% -\contentsline {table}{\numberline {8.16}{\ignorespaces Escenario 4: detalles de la subred provider vlan\relax }}{75}{table.caption.90}% -\contentsline {table}{\numberline {8.17}{\ignorespaces Escenario 4: detalles de las instancias\relax }}{75}{table.caption.91}% -\contentsline {table}{\numberline {8.18}{\ignorespaces Escenario 4: detalles del router\relax }}{75}{table.caption.92}% +\contentsline {table}{\numberline {8.1}{\ignorespaces Sabores creados para análisis de red\relax }}{73}{table.caption.75}% +\contentsline {table}{\numberline {8.2}{\ignorespaces Imágenes creadas para análisis de red\relax }}{73}{table.caption.76}% +\contentsline {table}{\numberline {8.3}{\ignorespaces Redes provider creadas para análisis de red\relax }}{74}{table.caption.77}% +\contentsline {table}{\numberline {8.4}{\ignorespaces Subredes provider creadas para análisis de red\relax }}{74}{table.caption.78}% +\contentsline {table}{\numberline {8.5}{\ignorespaces Escenario 1: detalles de la subred 1\relax }}{75}{table.caption.79}% +\contentsline {table}{\numberline {8.6}{\ignorespaces Escenario 1: detalles de las instancias\relax }}{75}{table.caption.80}% +\contentsline {table}{\numberline {8.7}{\ignorespaces Escenario 2: detalles de la subred 1\relax }}{76}{table.caption.81}% +\contentsline {table}{\numberline {8.8}{\ignorespaces Escenario 2: detalles de la subred 2\relax }}{76}{table.caption.82}% +\contentsline {table}{\numberline {8.9}{\ignorespaces Escenario 2: detalles de las instancias\relax }}{76}{table.caption.83}% +\contentsline {table}{\numberline {8.10}{\ignorespaces Escenario 2: detalles del router\relax }}{76}{table.caption.84}% +\contentsline {table}{\numberline {8.11}{\ignorespaces Escenario 3: detalles de la subred 1\relax }}{77}{table.caption.85}% +\contentsline {table}{\numberline {8.12}{\ignorespaces Escenario 3: detalles de la subred provider vlan\relax }}{77}{table.caption.86}% +\contentsline {table}{\numberline {8.13}{\ignorespaces Escenario 3: detalles de las instancias\relax }}{77}{table.caption.87}% +\contentsline {table}{\numberline {8.14}{\ignorespaces Escenario 3: detalles del router\relax }}{77}{table.caption.88}% +\contentsline {table}{\numberline {8.15}{\ignorespaces Escenario 4: detalles de la subred 1\relax }}{78}{table.caption.89}% +\contentsline {table}{\numberline {8.16}{\ignorespaces Escenario 4: detalles de la subred provider vlan\relax }}{79}{table.caption.90}% +\contentsline {table}{\numberline {8.17}{\ignorespaces Escenario 4: detalles de las instancias\relax }}{79}{table.caption.91}% +\contentsline {table}{\numberline {8.18}{\ignorespaces Escenario 4: detalles del router\relax }}{79}{table.caption.92}% \addvspace {10\p@ } \addvspace {10\p@ } \addvspace {10\p@ } diff --git a/docs/udelartex/tesis.pdf b/docs/udelartex/tesis.pdf index 3532f498b026af5449244853c055f5972975898d..979c78773923b4567443ca6c9798f912c7ad26d0 100644 Binary files a/docs/udelartex/tesis.pdf and b/docs/udelartex/tesis.pdf differ diff --git a/docs/udelartex/tesis.synctex.gz b/docs/udelartex/tesis.synctex.gz index 5692f2e74a619dfd6d474cc46887f5fbbccb970e..ca7df2b81814a0b1fb3f9d84a75f753e752816c8 100644 Binary files a/docs/udelartex/tesis.synctex.gz and b/docs/udelartex/tesis.synctex.gz differ diff --git a/docs/udelartex/tesis.toc b/docs/udelartex/tesis.toc index 6830c670a7f2592a8721e69aaae01870a5a3f453..d65c6ead51876f6884c6100303e830f1865c3ec1 100644 --- a/docs/udelartex/tesis.toc +++ b/docs/udelartex/tesis.toc @@ -101,136 +101,136 @@ \contentsline {subsection}{\numberline {7.2.1}Agregar nodo de Cómputo}{65}{subsection.7.2.1}% \contentsline {subsection}{\numberline {7.2.2}Eliminar un nodo de cómputo}{66}{subsection.7.2.2}% \contentsline {subsection}{\numberline {7.2.3}Infraestructura}{68}{subsection.7.2.3}% -\contentsline {section}{\numberline {7.3}Actualizar versión}{68}{section.7.3}% -\contentsline {chapter}{\numberline {8}Análisis del módulo de red}{69}{chapter.8}% -\contentsline {section}{\numberline {8.1}Escenarios de prueba}{69}{section.8.1}% -\contentsline {subsection}{\numberline {8.1.1}Escenario 1: tráfico este-oeste (misma red tenant)}{70}{subsection.8.1.1}% -\contentsline {subsubsection}{\numberline {8.1.1.1}Composición del escenario}{70}{subsubsection.8.1.1.1}% -\contentsline {subsection}{\numberline {8.1.2}Escenario 2: tráfico este-oeste (distintas redes tenant)}{71}{subsection.8.1.2}% -\contentsline {subsubsection}{\numberline {8.1.2.1}Composición del escenario}{71}{subsubsection.8.1.2.1}% -\contentsline {subsection}{\numberline {8.1.3}Escenario 3: tráfico norte-sur (acceso hacia el exterior)}{72}{subsection.8.1.3}% -\contentsline {subsubsection}{\numberline {8.1.3.1}Composición del escenario}{73}{subsubsection.8.1.3.1}% -\contentsline {subsection}{\numberline {8.1.4}Escenario 4: tráfico norte-sur (acceso desde el exterior)}{74}{subsection.8.1.4}% -\contentsline {subsubsection}{\numberline {8.1.4.1}Composición del escenario}{74}{subsubsection.8.1.4.1}% -\contentsline {section}{\numberline {8.2}Linux bridge}{74}{section.8.2}% -\contentsline {subsection}{\numberline {8.2.1}Escenario 1}{75}{subsection.8.2.1}% -\contentsline {subsubsection}{\numberline {8.2.1.1}Análisis de componentes}{76}{subsubsection.8.2.1.1}% -\contentsline {subsubsection}{\numberline {8.2.1.2}Análisis de tráfico}{79}{subsubsection.8.2.1.2}% -\contentsline {subparagraph}{Paso 1}{79}{section*.94}% -\contentsline {subparagraph}{Paso 2}{79}{section*.95}% -\contentsline {subparagraph}{Paso 3}{83}{section*.100}% -\contentsline {subparagraph}{Paso 4}{84}{section*.103}% -\contentsline {subsection}{\numberline {8.2.2}Escenario 2}{85}{subsection.8.2.2}% -\contentsline {subsubsection}{\numberline {8.2.2.1}Análisis de componentes}{85}{subsubsection.8.2.2.1}% -\contentsline {subsubsection}{\numberline {8.2.2.2}Análisis de tráfico}{91}{subsubsection.8.2.2.2}% -\contentsline {subparagraph}{Paso 1}{91}{section*.105}% -\contentsline {subparagraph}{Paso 2}{91}{section*.106}% -\contentsline {subparagraph}{Paso 3}{91}{section*.107}% -\contentsline {subparagraph}{Paso 4}{92}{section*.109}% -\contentsline {subparagraph}{Paso 5}{92}{section*.110}% -\contentsline {subparagraph}{Paso 6}{92}{section*.111}% -\contentsline {subparagraph}{Paso 7}{92}{section*.113}% -\contentsline {subsection}{\numberline {8.2.3}Escenario 3}{93}{subsection.8.2.3}% -\contentsline {subsubsection}{\numberline {8.2.3.1}Análisis de componentes}{94}{subsubsection.8.2.3.1}% -\contentsline {subsubsection}{\numberline {8.2.3.2}Análisis de tráfico}{97}{subsubsection.8.2.3.2}% -\contentsline {subparagraph}{Paso 1}{97}{section*.115}% -\contentsline {subparagraph}{Paso 2}{97}{section*.116}% -\contentsline {subparagraph}{Paso 3}{97}{section*.117}% -\contentsline {subparagraph}{Paso 4}{98}{section*.119}% -\contentsline {subparagraph}{Paso 5}{98}{section*.120}% -\contentsline {subparagraph}{Paso 6}{99}{section*.122}% -\contentsline {subparagraph}{Paso 7}{100}{section*.124}% -\contentsline {subsection}{\numberline {8.2.4}Escenario 4}{101}{subsection.8.2.4}% -\contentsline {subsubsection}{\numberline {8.2.4.1}Análisis de componentes}{101}{subsubsection.8.2.4.1}% -\contentsline {subsubsection}{\numberline {8.2.4.2}Análisis de tráfico}{103}{subsubsection.8.2.4.2}% -\contentsline {subparagraph}{Paso 1}{103}{section*.126}% -\contentsline {subparagraph}{Paso 2}{103}{section*.127}% -\contentsline {subparagraph}{Paso 3}{103}{section*.128}% -\contentsline {subparagraph}{Paso 4}{104}{section*.131}% -\contentsline {subparagraph}{Paso 5}{104}{section*.132}% -\contentsline {subparagraph}{Paso 6}{105}{section*.134}% -\contentsline {section}{\numberline {8.3}Open vSwitch}{105}{section.8.3}% -\contentsline {subsubsection}{\numberline {8.3.0.1}Archivos de configuración}{107}{subsubsection.8.3.0.1}% -\contentsline {subsection}{\numberline {8.3.1}Escenario 1}{110}{subsection.8.3.1}% -\contentsline {subsubsection}{\numberline {8.3.1.1}Análisis de componentes}{110}{subsubsection.8.3.1.1}% -\contentsline {subsubsection}{\numberline {8.3.1.2}Análisis de tráfico}{116}{subsubsection.8.3.1.2}% -\contentsline {subparagraph}{Paso 1}{116}{section*.137}% -\contentsline {subparagraph}{Paso 2}{117}{section*.138}% -\contentsline {subparagraph}{Paso 3}{124}{section*.143}% -\contentsline {subparagraph}{Paso 4}{126}{section*.146}% -\contentsline {subsection}{\numberline {8.3.2}Escenario 2}{127}{subsection.8.3.2}% -\contentsline {subsubsection}{\numberline {8.3.2.1}Análisis de componentes}{127}{subsubsection.8.3.2.1}% -\contentsline {subsubsection}{\numberline {8.3.2.2}Análisis de tráfico}{131}{subsubsection.8.3.2.2}% -\contentsline {subparagraph}{Paso 1}{132}{section*.148}% -\contentsline {subparagraph}{Paso 2}{132}{section*.149}% -\contentsline {subparagraph}{Paso 3}{132}{section*.150}% -\contentsline {subparagraph}{Paso 4}{132}{section*.152}% -\contentsline {subparagraph}{Paso 5}{133}{section*.153}% -\contentsline {subparagraph}{Paso 6}{133}{section*.154}% -\contentsline {subparagraph}{Paso 7}{133}{section*.156}% -\contentsline {subsection}{\numberline {8.3.3}Escenario 3}{134}{subsection.8.3.3}% -\contentsline {subsubsection}{\numberline {8.3.3.1}Análisis de componentes}{134}{subsubsection.8.3.3.1}% -\contentsline {subsubsection}{\numberline {8.3.3.2}Análisis de tráfico}{137}{subsubsection.8.3.3.2}% -\contentsline {subparagraph}{Paso 1}{137}{section*.158}% -\contentsline {subparagraph}{Paso 2}{137}{section*.159}% -\contentsline {subparagraph}{Paso 3}{138}{section*.160}% -\contentsline {subparagraph}{Paso 4}{138}{section*.162}% -\contentsline {subparagraph}{Paso 5}{138}{section*.163}% -\contentsline {subparagraph}{Paso 6}{140}{section*.165}% -\contentsline {subparagraph}{Paso 7}{140}{section*.167}% -\contentsline {subsection}{\numberline {8.3.4}Escenario 4}{141}{subsection.8.3.4}% -\contentsline {subsubsection}{\numberline {8.3.4.1}Análisis de componentes}{141}{subsubsection.8.3.4.1}% -\contentsline {subsubsection}{\numberline {8.3.4.2}Análisis de tráfico}{142}{subsubsection.8.3.4.2}% -\contentsline {subparagraph}{Paso 1}{143}{section*.169}% -\contentsline {subparagraph}{Paso 2}{143}{section*.170}% -\contentsline {subparagraph}{Paso 3}{143}{section*.171}% -\contentsline {subparagraph}{Paso 4}{145}{section*.174}% -\contentsline {subparagraph}{Paso 5}{145}{section*.175}% -\contentsline {subparagraph}{Paso 6}{145}{section*.177}% -\contentsline {section}{\numberline {8.4}Comparativa de drivers}{145}{section.8.4}% -\contentsline {section}{\numberline {8.5}Funcionalidades avanzadas}{145}{section.8.5}% -\contentsline {subsection}{\numberline {8.5.1}Layer 3 High Availability}{145}{subsection.8.5.1}% -\contentsline {chapter}{\numberline {9}Trabajo a futuro}{147}{chapter.9}% -\contentsline {chapter}{\numberline {10}Conclusiones}{149}{chapter.10}% -\contentsline {chapter}{Referencias bibliográficas}{150}{chapter*.183}% -\contentsline {chapter}{Glosario}{156}{chapter*.183}% -\contentsline {chapter}{\textbf {Apéndices}}{157}{section*.184}% +\contentsline {section}{\numberline {7.3}Actualizar versión}{72}{section.7.3}% +\contentsline {chapter}{\numberline {8}Análisis del módulo de red}{73}{chapter.8}% +\contentsline {section}{\numberline {8.1}Escenarios de prueba}{73}{section.8.1}% +\contentsline {subsection}{\numberline {8.1.1}Escenario 1: tráfico este-oeste (misma red tenant)}{74}{subsection.8.1.1}% +\contentsline {subsubsection}{\numberline {8.1.1.1}Composición del escenario}{74}{subsubsection.8.1.1.1}% +\contentsline {subsection}{\numberline {8.1.2}Escenario 2: tráfico este-oeste (distintas redes tenant)}{75}{subsection.8.1.2}% +\contentsline {subsubsection}{\numberline {8.1.2.1}Composición del escenario}{75}{subsubsection.8.1.2.1}% +\contentsline {subsection}{\numberline {8.1.3}Escenario 3: tráfico norte-sur (acceso hacia el exterior)}{76}{subsection.8.1.3}% +\contentsline {subsubsection}{\numberline {8.1.3.1}Composición del escenario}{77}{subsubsection.8.1.3.1}% +\contentsline {subsection}{\numberline {8.1.4}Escenario 4: tráfico norte-sur (acceso desde el exterior)}{78}{subsection.8.1.4}% +\contentsline {subsubsection}{\numberline {8.1.4.1}Composición del escenario}{78}{subsubsection.8.1.4.1}% +\contentsline {section}{\numberline {8.2}Linux bridge}{78}{section.8.2}% +\contentsline {subsection}{\numberline {8.2.1}Escenario 1}{79}{subsection.8.2.1}% +\contentsline {subsubsection}{\numberline {8.2.1.1}Análisis de componentes}{80}{subsubsection.8.2.1.1}% +\contentsline {subsubsection}{\numberline {8.2.1.2}Análisis de tráfico}{83}{subsubsection.8.2.1.2}% +\contentsline {subparagraph}{Paso 1}{83}{section*.94}% +\contentsline {subparagraph}{Paso 2}{83}{section*.95}% +\contentsline {subparagraph}{Paso 3}{87}{section*.100}% +\contentsline {subparagraph}{Paso 4}{88}{section*.103}% +\contentsline {subsection}{\numberline {8.2.2}Escenario 2}{89}{subsection.8.2.2}% +\contentsline {subsubsection}{\numberline {8.2.2.1}Análisis de componentes}{89}{subsubsection.8.2.2.1}% +\contentsline {subsubsection}{\numberline {8.2.2.2}Análisis de tráfico}{95}{subsubsection.8.2.2.2}% +\contentsline {subparagraph}{Paso 1}{95}{section*.105}% +\contentsline {subparagraph}{Paso 2}{95}{section*.106}% +\contentsline {subparagraph}{Paso 3}{95}{section*.107}% +\contentsline {subparagraph}{Paso 4}{96}{section*.109}% +\contentsline {subparagraph}{Paso 5}{96}{section*.110}% +\contentsline {subparagraph}{Paso 6}{96}{section*.111}% +\contentsline {subparagraph}{Paso 7}{96}{section*.113}% +\contentsline {subsection}{\numberline {8.2.3}Escenario 3}{97}{subsection.8.2.3}% +\contentsline {subsubsection}{\numberline {8.2.3.1}Análisis de componentes}{98}{subsubsection.8.2.3.1}% +\contentsline {subsubsection}{\numberline {8.2.3.2}Análisis de tráfico}{101}{subsubsection.8.2.3.2}% +\contentsline {subparagraph}{Paso 1}{101}{section*.115}% +\contentsline {subparagraph}{Paso 2}{101}{section*.116}% +\contentsline {subparagraph}{Paso 3}{101}{section*.117}% +\contentsline {subparagraph}{Paso 4}{102}{section*.119}% +\contentsline {subparagraph}{Paso 5}{102}{section*.120}% +\contentsline {subparagraph}{Paso 6}{103}{section*.122}% +\contentsline {subparagraph}{Paso 7}{104}{section*.124}% +\contentsline {subsection}{\numberline {8.2.4}Escenario 4}{105}{subsection.8.2.4}% +\contentsline {subsubsection}{\numberline {8.2.4.1}Análisis de componentes}{105}{subsubsection.8.2.4.1}% +\contentsline {subsubsection}{\numberline {8.2.4.2}Análisis de tráfico}{107}{subsubsection.8.2.4.2}% +\contentsline {subparagraph}{Paso 1}{107}{section*.126}% +\contentsline {subparagraph}{Paso 2}{107}{section*.127}% +\contentsline {subparagraph}{Paso 3}{107}{section*.128}% +\contentsline {subparagraph}{Paso 4}{108}{section*.131}% +\contentsline {subparagraph}{Paso 5}{108}{section*.132}% +\contentsline {subparagraph}{Paso 6}{109}{section*.134}% +\contentsline {section}{\numberline {8.3}Open vSwitch}{109}{section.8.3}% +\contentsline {subsubsection}{\numberline {8.3.0.1}Archivos de configuración}{111}{subsubsection.8.3.0.1}% +\contentsline {subsection}{\numberline {8.3.1}Escenario 1}{114}{subsection.8.3.1}% +\contentsline {subsubsection}{\numberline {8.3.1.1}Análisis de componentes}{114}{subsubsection.8.3.1.1}% +\contentsline {subsubsection}{\numberline {8.3.1.2}Análisis de tráfico}{120}{subsubsection.8.3.1.2}% +\contentsline {subparagraph}{Paso 1}{120}{section*.137}% +\contentsline {subparagraph}{Paso 2}{121}{section*.138}% +\contentsline {subparagraph}{Paso 3}{128}{section*.143}% +\contentsline {subparagraph}{Paso 4}{130}{section*.146}% +\contentsline {subsection}{\numberline {8.3.2}Escenario 2}{131}{subsection.8.3.2}% +\contentsline {subsubsection}{\numberline {8.3.2.1}Análisis de componentes}{131}{subsubsection.8.3.2.1}% +\contentsline {subsubsection}{\numberline {8.3.2.2}Análisis de tráfico}{135}{subsubsection.8.3.2.2}% +\contentsline {subparagraph}{Paso 1}{136}{section*.148}% +\contentsline {subparagraph}{Paso 2}{136}{section*.149}% +\contentsline {subparagraph}{Paso 3}{136}{section*.150}% +\contentsline {subparagraph}{Paso 4}{136}{section*.152}% +\contentsline {subparagraph}{Paso 5}{137}{section*.153}% +\contentsline {subparagraph}{Paso 6}{137}{section*.154}% +\contentsline {subparagraph}{Paso 7}{137}{section*.156}% +\contentsline {subsection}{\numberline {8.3.3}Escenario 3}{138}{subsection.8.3.3}% +\contentsline {subsubsection}{\numberline {8.3.3.1}Análisis de componentes}{138}{subsubsection.8.3.3.1}% +\contentsline {subsubsection}{\numberline {8.3.3.2}Análisis de tráfico}{141}{subsubsection.8.3.3.2}% +\contentsline {subparagraph}{Paso 1}{141}{section*.158}% +\contentsline {subparagraph}{Paso 2}{141}{section*.159}% +\contentsline {subparagraph}{Paso 3}{142}{section*.160}% +\contentsline {subparagraph}{Paso 4}{142}{section*.162}% +\contentsline {subparagraph}{Paso 5}{142}{section*.163}% +\contentsline {subparagraph}{Paso 6}{144}{section*.165}% +\contentsline {subparagraph}{Paso 7}{144}{section*.167}% +\contentsline {subsection}{\numberline {8.3.4}Escenario 4}{145}{subsection.8.3.4}% +\contentsline {subsubsection}{\numberline {8.3.4.1}Análisis de componentes}{145}{subsubsection.8.3.4.1}% +\contentsline {subsubsection}{\numberline {8.3.4.2}Análisis de tráfico}{146}{subsubsection.8.3.4.2}% +\contentsline {subparagraph}{Paso 1}{147}{section*.169}% +\contentsline {subparagraph}{Paso 2}{147}{section*.170}% +\contentsline {subparagraph}{Paso 3}{147}{section*.171}% +\contentsline {subparagraph}{Paso 4}{149}{section*.174}% +\contentsline {subparagraph}{Paso 5}{149}{section*.175}% +\contentsline {subparagraph}{Paso 6}{149}{section*.177}% +\contentsline {section}{\numberline {8.4}Comparativa de drivers}{149}{section.8.4}% +\contentsline {section}{\numberline {8.5}Funcionalidades avanzadas}{149}{section.8.5}% +\contentsline {subsection}{\numberline {8.5.1}Layer 3 High Availability}{149}{subsection.8.5.1}% +\contentsline {chapter}{\numberline {9}Trabajo a futuro}{151}{chapter.9}% +\contentsline {chapter}{\numberline {10}Conclusiones}{153}{chapter.10}% +\contentsline {chapter}{Referencias bibliográficas}{154}{chapter*.183}% +\contentsline {chapter}{Glosario}{160}{chapter*.183}% +\contentsline {chapter}{\textbf {Apéndices}}{161}{section*.184}% \ttl@change@i {\@ne }{chapter}{13pt}{}{ Apéndice\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax \ttl@change@v {chapter}{}{}{}\relax -\contentsline {chapter}{\numberline {1}Imágenes}{158}{appendix.Alph1}% +\contentsline {chapter}{\numberline {1}Imágenes}{162}{appendix.Alph1}% \ttl@change@i {\@ne }{chapter}{0pt}{\vspace *{0.45cm}}{\thecontentslabel \quad }{}{\bfseries \hfill \contentspage }\relax \ttl@change@v {chapter}{}{}{}\relax -\contentsline {chapter}{\textbf {Anexos}}{161}{section*.187}% +\contentsline {chapter}{\textbf {Anexos}}{165}{section*.187}% \ttl@change@i {\@ne }{chapter}{13pt}{}{ Anexo\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax \ttl@change@v {chapter}{}{}{}\relax -\contentsline {chapter}{\numberline {1}Instalación versión Queens}{162}{appendix.Anexo.1}% -\contentsline {section}{\numberline {1.1}Preparación de nodos}{162}{section.Anexo.1.1}% -\contentsline {section}{\numberline {1.2}Configuración}{171}{section.Anexo.1.2}% -\contentsline {subsection}{\numberline {1.2.1}Configuración claves SSH}{171}{subsection.Anexo.1.2.1}% -\contentsline {subsection}{\numberline {1.2.2}Archivos de configuración OSA}{172}{subsection.Anexo.1.2.2}% -\contentsline {subsection}{\numberline {1.2.3}Generación de claves}{177}{subsection.Anexo.1.2.3}% -\contentsline {subsection}{\numberline {1.2.4}Correcciones}{177}{subsection.Anexo.1.2.4}% -\contentsline {subsubsection}{\numberline {1.2.4.1}SELinux}{177}{subsubsection.Anexo.1.2.4.1}% -\contentsline {chapter}{\numberline {2}Instalación versión Stein}{178}{appendix.Anexo.2}% -\contentsline {section}{\numberline {2.1}Preparación de nodos}{178}{section.Anexo.2.1}% -\contentsline {section}{\numberline {2.2}Configuración archivos OSA}{191}{section.Anexo.2.2}% -\contentsline {subsubsection}{\numberline {2.2.0.1}user\_variables.yml}{196}{subsubsection.Anexo.2.2.0.1}% -\contentsline {section}{\numberline {2.3}Ejecución de playbooks}{198}{section.Anexo.2.3}% -\contentsline {section}{\numberline {2.4}Cambios para driver OVS}{199}{section.Anexo.2.4}% -\contentsline {chapter}{\numberline {3}Virtualización con KVM}{202}{appendix.Anexo.3}% -\contentsline {section}{\numberline {3.1}Utilización virt-manager}{202}{section.Anexo.3.1}% -\contentsline {subsection}{\numberline {3.1.1}Conexión remota}{202}{subsection.Anexo.3.1.1}% -\contentsline {subsection}{\numberline {3.1.2}Creación de una red}{203}{subsection.Anexo.3.1.2}% -\contentsline {subsection}{\numberline {3.1.3}Crear nodo}{205}{subsection.Anexo.3.1.3}% -\contentsline {chapter}{\numberline {4}Interacción}{209}{appendix.Anexo.4}% -\contentsline {section}{\numberline {4.1}Configuraciones de administrador}{210}{section.Anexo.4.1}% -\contentsline {section}{\numberline {4.2}Interacción de un usuario}{216}{section.Anexo.4.2}% -\contentsline {section}{\numberline {4.3}Acceso a una instancia}{224}{section.Anexo.4.3}% -\contentsline {subsection}{\numberline {4.3.1}Por SPICE}{224}{subsection.Anexo.4.3.1}% -\contentsline {subsection}{\numberline {4.3.2}Por SSH}{225}{subsection.Anexo.4.3.2}% -\contentsline {subsubsection}{\numberline {4.3.2.1}Asociar una Floating IP a la instancia}{225}{subsubsection.Anexo.4.3.2.1}% -\contentsline {subsubsection}{\numberline {4.3.2.2}Modificar security group}{226}{subsubsection.Anexo.4.3.2.2}% -\contentsline {subsubsection}{\numberline {4.3.2.3}SSH}{227}{subsubsection.Anexo.4.3.2.3}% -\contentsline {subsection}{\numberline {4.3.3}Por virsh}{228}{subsection.Anexo.4.3.3}% -\contentsline {chapter}{\numberline {5}migrate\_instance.sh}{229}{appendix.Anexo.5}% +\contentsline {chapter}{\numberline {1}Instalación versión Queens}{166}{appendix.Anexo.1}% +\contentsline {section}{\numberline {1.1}Preparación de nodos}{166}{section.Anexo.1.1}% +\contentsline {section}{\numberline {1.2}Configuración}{175}{section.Anexo.1.2}% +\contentsline {subsection}{\numberline {1.2.1}Configuración claves SSH}{175}{subsection.Anexo.1.2.1}% +\contentsline {subsection}{\numberline {1.2.2}Archivos de configuración OSA}{176}{subsection.Anexo.1.2.2}% +\contentsline {subsection}{\numberline {1.2.3}Generación de claves}{181}{subsection.Anexo.1.2.3}% +\contentsline {subsection}{\numberline {1.2.4}Correcciones}{181}{subsection.Anexo.1.2.4}% +\contentsline {subsubsection}{\numberline {1.2.4.1}SELinux}{181}{subsubsection.Anexo.1.2.4.1}% +\contentsline {chapter}{\numberline {2}Instalación versión Stein}{182}{appendix.Anexo.2}% +\contentsline {section}{\numberline {2.1}Preparación de nodos}{182}{section.Anexo.2.1}% +\contentsline {section}{\numberline {2.2}Configuración archivos OSA}{195}{section.Anexo.2.2}% +\contentsline {subsubsection}{\numberline {2.2.0.1}user\_variables.yml}{200}{subsubsection.Anexo.2.2.0.1}% +\contentsline {section}{\numberline {2.3}Ejecución de playbooks}{202}{section.Anexo.2.3}% +\contentsline {section}{\numberline {2.4}Cambios para driver OVS}{203}{section.Anexo.2.4}% +\contentsline {chapter}{\numberline {3}Virtualización con KVM}{206}{appendix.Anexo.3}% +\contentsline {section}{\numberline {3.1}Utilización virt-manager}{206}{section.Anexo.3.1}% +\contentsline {subsection}{\numberline {3.1.1}Conexión remota}{206}{subsection.Anexo.3.1.1}% +\contentsline {subsection}{\numberline {3.1.2}Creación de una red}{207}{subsection.Anexo.3.1.2}% +\contentsline {subsection}{\numberline {3.1.3}Crear nodo}{209}{subsection.Anexo.3.1.3}% +\contentsline {chapter}{\numberline {4}Interacción}{213}{appendix.Anexo.4}% +\contentsline {section}{\numberline {4.1}Configuraciones de administrador}{214}{section.Anexo.4.1}% +\contentsline {section}{\numberline {4.2}Interacción de un usuario}{220}{section.Anexo.4.2}% +\contentsline {section}{\numberline {4.3}Acceso a una instancia}{228}{section.Anexo.4.3}% +\contentsline {subsection}{\numberline {4.3.1}Por SPICE}{228}{subsection.Anexo.4.3.1}% +\contentsline {subsection}{\numberline {4.3.2}Por SSH}{229}{subsection.Anexo.4.3.2}% +\contentsline {subsubsection}{\numberline {4.3.2.1}Asociar una Floating IP a la instancia}{229}{subsubsection.Anexo.4.3.2.1}% +\contentsline {subsubsection}{\numberline {4.3.2.2}Modificar security group}{230}{subsubsection.Anexo.4.3.2.2}% +\contentsline {subsubsection}{\numberline {4.3.2.3}SSH}{231}{subsubsection.Anexo.4.3.2.3}% +\contentsline {subsection}{\numberline {4.3.3}Por virsh}{232}{subsection.Anexo.4.3.3}% +\contentsline {chapter}{\numberline {5}migrate\_instance.sh}{233}{appendix.Anexo.5}% \contentsfinish diff --git a/docs/udelartex/tesis.xwm b/docs/udelartex/tesis.xwm index 690cf9c5c0aee3eead38ebf796bdc544084b1f7b..b3685d3ce432bdc5863208000e91ea6e7a34b4fd 100644 --- a/docs/udelartex/tesis.xwm +++ b/docs/udelartex/tesis.xwm @@ -1,2 +1,2 @@ \relax -\xwmnewlabel{xwmlastpage}{{5}{230}{migrate\_instance.sh\relax }{lstnumber.-285.31}{}} +\xwmnewlabel{xwmlastpage}{{5}{234}{migrate\_instance.sh\relax }{lstnumber.-296.31}{}}