diff --git a/docs/udelartex/anexo/anexoMigrateInstance.log b/docs/udelartex/anexo/anexoMigrateInstance.log new file mode 100644 index 0000000000000000000000000000000000000000..73e317a7efebc4d5c6bf3de1a23d4564ea3bd6b8 --- /dev/null +++ b/docs/udelartex/anexo/anexoMigrateInstance.log @@ -0,0 +1,60 @@ +This is pdfTeX, Version 3.14159265-2.6-1.40.20 (MiKTeX 2.9.7250) (preloaded format=pdflatex 2020.1.13) 21 JAN 2020 23:26 +entering extended mode +**./anexoMigrateInstance.tex +(anexoMigrateInstance.tex +LaTeX2e <2019-10-01> patch level 3 +! Undefined control sequence. +l.1 \chapter + {migrate\_instance.sh} +The control sequence at the end of the top line +of your error message was never \def'ed. If you have +misspelled it (e.g., `\hobx'), type `I' and the correct +spelling (e.g., `I\hbox'). Otherwise just continue, +and I'll forget about whatever was undefined. + + +! LaTeX Error: Missing \begin{document}. + +See the LaTeX manual or LaTeX Companion for explanation. +Type H <return> for immediate help. + ... + +l.1 \chapter{m + igrate\_instance.sh} +You're in trouble here. Try typing <return> to proceed. +If that doesn't work, type X <return> to quit. + +Missing character: There is no m in font nullfont! +Missing character: There is no i in font nullfont! +Missing character: There is no g in font nullfont! +Missing character: There is no r in font nullfont! +Missing character: There is no a in font nullfont! +Missing character: There is no t in font nullfont! +Missing character: There is no e in font nullfont! +Missing character: There is no i in font nullfont! +Missing character: There is no n in font nullfont! +Missing character: There is no s in font nullfont! +Missing character: There is no t in font nullfont! +Missing character: There is no a in font nullfont! +Missing character: There is no n in font nullfont! +Missing character: There is no c in font nullfont! +Missing character: There is no e in font nullfont! +Missing character: There is no . in font nullfont! +Missing character: There is no s in font nullfont! +Missing character: There is no h in font nullfont! +) +! Emergency stop. +<*> ./anexoMigrateInstance.tex + +*** (job aborted, no legal \end found) + + +Here is how much of TeX's memory you used: + 8 strings out of 494411 + 277 string characters out of 3174310 + 54396 words of memory out of 3000000 + 4213 multiletter control sequences out of 15000+200000 + 3640 words of font info for 14 fonts, out of 3000000 for 9000 + 0 hyphenation exceptions out of 8191 + 5i,1n,4p,76b,16s stack positions out of 5000i,500n,10000p,200000b,50000s +! ==> Fatal error occurred, no output PDF file produced! diff --git a/docs/udelartex/anexo/anexoMigrateInstance.tex b/docs/udelartex/anexo/anexoMigrateInstance.tex new file mode 100644 index 0000000000000000000000000000000000000000..b5e17fac83ea88953cdb249a746d1a2726d7120b --- /dev/null +++ b/docs/udelartex/anexo/anexoMigrateInstance.tex @@ -0,0 +1,33 @@ +\chapter{migrate\_instance.sh}\label{anexoMigrate} +\begin{lstlisting} +#!/bin/bash + +# Provide usage +usage() { +echo "Usage: $0 VM_ID" +exit 1 +} +[[ $# -eq 0 ]] && usage +# Migrate the VM to an alternate hypervisor +echo -n "Migrating instance to alternate host" +VM_ID=$1 +openstack server migrate $VM_ID +VM_OUTPUT=$(openstack server show $VM_ID) +VM_STATUS=$(echo "$VM_OUTPUT" | grep status | awk '{print $4}') +while [[ "$VM_STATUS" != "VERIFY_RESIZE" ]]; do +echo -n "." +sleep 2 +VM_OUTPUT=$(openstack server show $VM_ID) +VM_STATUS=$(echo "$VM_OUTPUT" | grep status | awk '{print $4}') +done +nova resize-confirm $VM_ID +echo " instance migrated and resized." +echo; + +# Show the details for the VM +echo "Updated instance details:" +openstack server show $VM_ID + +# Pause to allow users to examine VM details +read -p "Pausing, press <enter> to exit." +\end{lstlisting} diff --git a/docs/udelartex/capitulos/conclusiones.tex b/docs/udelartex/capitulos/conclusiones.tex index d92d6e9311c41c593006f326a732af1e3c685755..ba723fc33f316754b282e87218e79d9a5fe8d6b8 100644 --- a/docs/udelartex/capitulos/conclusiones.tex +++ b/docs/udelartex/capitulos/conclusiones.tex @@ -1,7 +1,7 @@ \chapter{Conclusiones} -Luego de haber realizado todo el proceso de despliegue de un Datacenter de pruebas mediante Openstack, se tomó conciencia de todos los aspectos y conceptos que involucra la instalación y mantenimiento de una operativa de esta magnitud. Es por esto que para llevar a cabo el trabajo fue necesario adquirir y aplicar conocimientos en diversas áreas computacionales tales como virtualización y contenerización, gestión de redes, almacenamiento de datos y administración de sistemas. +Luego de haber realizado todo el proceso de despliegue de un Datacenter de pruebas mediante OpenStack, se tomó conciencia de todos los aspectos y conceptos que involucra la instalación y mantenimiento de una operativa de esta magnitud. Es por esto que para llevar a cabo el trabajo fue necesario adquirir y aplicar conocimientos en diversas áreas computacionales tales como virtualización y contenerización, gestión de redes, almacenamiento de datos y administración de sistemas. -Openstack como herramienta resulta ser muy valorada gracias a que posee una gran flexibilidad para adecuar el despliegue de un Datacenter a las necesidades de cada caso, permitiendo instalar módulos con funcionalidades especÃficas y prescindir de aquellos que no sean necesarios. +OpenStack como herramienta resulta ser muy valorada gracias a que posee una gran flexibilidad para adecuar el despliegue de un Datacenter a las necesidades de cada caso, permitiendo instalar módulos con funcionalidades especÃficas y prescindir de aquellos que no sean necesarios. El proceso de instalación resulta sumamente complejo debido a la cantidad de herramientas y configuraciones a tener en cuenta, es por eso que la utilización de una herramienta de automatización de tareas resulta inevitable. Como se menciona en el documento, se utilizó Ansible para facilitar el proceso ya que permite ejecutar instalaciones reiteradas veces de forma idéntica y sobre múltiples servidores sin una carga operativa adicional. Aún asÃ, la experiencia no fue sencilla debido a los diversos inconvenientes que se encontraron durante el camino. Esto condujo a que lograr todo el trabajo llevará un tiempo mayor al estimado. diff --git a/docs/udelartex/capitulos/gestion.tex b/docs/udelartex/capitulos/gestion.tex index a972b6f98f14126052862f1994fae4c0dbd9ecfc..46a7823d7c9964fca7bf13bcb9689fe12e78fce0 100644 --- a/docs/udelartex/capitulos/gestion.tex +++ b/docs/udelartex/capitulos/gestion.tex @@ -39,7 +39,7 @@ En este caso se hace referencia a la guÃa \cite{openstack-troubleshooting} orie \subsection{Problemas con Ceph} La ventaja de tener un backend como Ceph para cinder es que está diseñado para soportar la falla de alguno de sus nodos, dependiendo de cuantos OSDs se tengan configurados. Por lo tanto si algún nodo sufre una falla de hardware o tiene otro problema externo como un corte de energÃa, los usuarios del Datacenter no percibirán problema alguno. -Además de los problemas crÃticos mencionados, se pueden presentar inconvenientes en el funcionamiento del cluster realizado con Ceph. Para diagnosticar y solucionar estos problemas se toman los documentos oficiales de la herramienta que se pueden encontrar en \cite{ceph-cluster-operations} presentando guias para: realizar el monitoreo del cluster, OSDs y PGs, llevar a cabo operaciones sobre el cluster, realizar un troubleshooting sobre el monitor u OSDs, entre otras. +Además de los problemas crÃticos mencionados, se pueden presentar inconvenientes en el funcionamiento del cluster realizado con Ceph. Para diagnosticar y solucionar estos problemas se toman los documentos oficiales de la herramienta que se pueden encontrar en \cite{ceph-cluster-operations} presentando guiás para: realizar el monitoreo del cluster, OSDs y PGs, llevar a cabo operaciones sobre el cluster, realizar un troubleshooting sobre el monitor u OSDs, entre otras. \noindent Algunos de los comandos utilizados se muestran a continuación: \begin{itemize} @@ -54,8 +54,7 @@ $ ceph health o ceph health detail \begin{lstlisting} $ systemctl status ceph\*.service ceph\*.target \end{lstlisting} - - \item Parar todos los demonios: +\item Parar todos los demonios: \begin{lstlisting} $ systemctl stop ceph\*.service ceph\*.target \end{lstlisting} @@ -69,9 +68,9 @@ $ systemctl start ceph.target \end{itemize} -\section{Agregar y remover nodos} +\section{Escalamiento horizontal} \subsection{Agregar nodo de Cómputo} -Para agregar un nuevo nodo de cómputo en el Datacenter desplegado con OSA se deben seguir las siguientes instrucciones. +Para agregar un nuevo nodo de cómputo en el Datacenter desplegado con OSA se deben seguir las siguientes instrucciones tanto para la versión Queens como Stein. \begin{enumerate} \item Configurar el nuevo nodo de cómputo de forma análoga a como se detalla en \ref{chap5:preparacion:nodos}. @@ -120,23 +119,23 @@ $ openstack-ansible setup-openstack.yml --limit localhost,compute2 \item Listar las instancias virtualizadas por cada hipervisor \begin{lstlisting} [root@infra1-utility-container-161eebae ~]# nova hypervisor-servers compute1 -+--------------------------+-----------------------------------+ ++--------------------+-------------------------+ | Name | Hypervisor Hostname | -+--------------------------+-----------------------------------+ ++--------------------+-------------------------+ | instance-0000000b | compute1.openstack.local | | instance-00000010 | compute1.openstack.local | -+--------------------------+-----------------------------------+ ++--------------------+-------------------------+ \end{lstlisting} \begin{lstlisting} [root@infra1-utility-container-161eebae ~]# nova hypervisor-servers compute2 -+--------------------------+-----------------------------------+ ++--------------------+-------------------------+ | Name | Hypervisor Hostname | -+--------------------------+-----------------------------------+ ++--------------------+-------------------------+ | instance-0000000e | compute2.openstack.local | | instance-00000012 | compute2.openstack.local | | instance-00000013 | compute2.openstack.local | | instance-00000014 | compute2.openstack.local | -+--------------------------+-----------------------------------+ ++--------------------+-------------------------+ \end{lstlisting} \end{enumerate} @@ -144,6 +143,57 @@ $ openstack-ansible setup-openstack.yml --limit localhost,compute2 \end{enumerate} \subsection{Eliminar un nodo de cómputo} +Para eliminar un nodo de cómputo hay que asegurarse que no exista ninguna instancia corriendo en él, por lo tanto hay que migrar todas las instancias. + +\subsubsection*{Migrar instancias} +La guiá de referencia utilizada es [\path{https://docs.openstack.org/nova/stein/admin/migration.html}]. Previo a comenzar el proceso de migración es necesario asegurar el acceso SSH entre los nodos de cómputo para el usuario \path{nova}. Para esto se deben ejecutar los siguientes comandos: +\begin{lstlisting} +$ su - nova +$ ssh <IP_nodo_computo> +$ exit +\end{lstlisting} + +Ante la presencia de problemas con las conexiones SSH se puede utilizar el siguiente documento de como referencia[\path{https://docs.openstack.org/nova/stein/admin/ssh-configuration.html#cli-os-migrate-cfg-ssh}]. + +El host al que se migra la instancia es elegido por el componente nova scheduler en base a su configuración. Para saber qué instancias es necesario migrar se puede ejecutar el comando mencionado en la sección anterior '\$ nova hypervisor-servers $<$nombre\_nodo$>$'. Previo a realizar la migración es importante tener en cuenta que el resto de los nodos de cómputo soporten la carga de las instancias alojadas. Para esto se utiliza el comando '\$ openstack host show $<$nodo\_computo$>$' el cual muestra para los recursos CPU, RAM y disco la cantidad total, la utilizada actualmente, la utilizada por todos los proyectos y al final lo utilizado por cada proyecto. +Para realizar la migración se puede utilizar simplemente el comando: + +\begin{lstlisting} +# openstack server migrate VM_INSTANCE. +\end{lstlisting} + +Por otro lado para obtener el estado de la instancia en el proceso de migración se puede utilizar el script \path{migrate_instance.sh} ubicado en el anexo \ref{anexoMigrate} de la siguiente forma: + +\begin{lstlisting} +$ ./migrate_instance.sh <id_instancia> +\end{lstlisting} + +En ambos casos los comandos se deben a ejecutar desde el contenedor de utility.\\ + +Retomando la acción principal, luego de migrar todas las instancias del nodo de computo a remover, se deben ejecutar los siguientes comandos: +\begin{itemize} +\item Se deben detener todos los servicios de cómputo y red corriendo en el nodo: +\begin{lstlisting} +$ systemctl stop nova-compute +$ systemctl stop neutron-linuxbridge-agent +\end{lstlisting} + +\item Luego se debe clonar el repositorio de operaciones de OSA en el nodo deploy: +\begin{lstlisting} +$ git clone https://opendev.org/openstack/openstack-ansible-ops /opt/openstack-ansible-ops +\end{lstlisting} + +\item Ejecutar la playbook \path{remove_compute_node.yml} con el parámetro indicado: +\begin{lstlisting} +$ cd /opt/openstack-ansible-ops/ansible_tools/playbooks + +$ openstack-ansible remove_compute_node.yml -e host_to_be_removed="<name-of-compute-host>" 2>&1 | tee /var/log/openstack/remove-compute-node.log +\end{lstlisting} + +\item Finalmente actualizar el archivo \path{openstack_user_config.yml}, eliminando la entrada del nodo de cómputo removido. + + +\end{itemize} \subsection{Infraestructura} diff --git a/docs/udelartex/tesis.bbl b/docs/udelartex/tesis.bbl index 1e8152b0fbb1ebb9689526a53b637be0ee07b50f..d31e7a7b0c020a59efadd172c39b36e3297e8823 100644 --- a/docs/udelartex/tesis.bbl +++ b/docs/udelartex/tesis.bbl @@ -61,12 +61,6 @@ James Denton. Openstack Networking, pages 21--23. \newblock Packt Publishing, 3rd edition, 2018. -\bibitem{openstack-networking-book-4} -James Denton. -\newblock {\em Learning Openstack Networking}, chapter 1 Introduction to - Openstack Networking, page~31. -\newblock Packt Publishing, 3rd edition, 2018. - \bibitem{openstack-networking-book-3} James Denton. \newblock {\em Learning Openstack Networking}, chapter 1 Introduction to @@ -120,12 +114,6 @@ Red Hat. \url{https://www.redhat.com/en/topics/containers/whats-a-linux-container}. \newblock Accedido: 2019-06-20. -\bibitem{openstack-cookbook-book} -Kevin Jackson, Cody Bunch, Egle Sigler, and James Denton. -\newblock {\em Openstack Cloud Computing Cookbook}, chapter 1 Installing - Openstack with Ansible, page~16. -\newblock Packt Publishing, 4th edition, 2018. - \bibitem{libvirt-virsh} libvirt. \newblock virsh. diff --git a/docs/udelartex/tesis.blg b/docs/udelartex/tesis.blg index e66908e9aca6819b2e7e61140ed0280deff58b4d..82d492a1e1d85b76a84c08fc262b40f1dce3d5a2 100644 --- a/docs/udelartex/tesis.blg +++ b/docs/udelartex/tesis.blg @@ -2,16 +2,16 @@ This is BibTeX, Version 0.99dThe top-level auxiliary file: tesis.aux The style file: plain.bst A level-1 auxiliary file: resumen/resumen.aux A level-1 auxiliary file: resumen/abstract.aux -A level-1 auxiliary file: capitulos/chap01.aux -A level-1 auxiliary file: capitulos/chap02.aux -A level-1 auxiliary file: capitulos/chap03.aux -A level-1 auxiliary file: capitulos/chap04.aux -A level-1 auxiliary file: capitulos/chap05.aux -A level-1 auxiliary file: capitulos/chap06.aux -A level-1 auxiliary file: capitulos/chap07.aux -A level-1 auxiliary file: capitulos/chap08.aux -A level-1 auxiliary file: capitulos/chap09.aux -A level-1 auxiliary file: capitulos/chap10.aux +A level-1 auxiliary file: capitulos/introduccion.aux +A level-1 auxiliary file: capitulos/planproyecto.aux +A level-1 auxiliary file: capitulos/fundamentos.aux +A level-1 auxiliary file: capitulos/openstack.aux +A level-1 auxiliary file: capitulos/openstack-ansible.aux +A level-1 auxiliary file: capitulos/diseño.aux +A level-1 auxiliary file: capitulos/gestion.aux +A level-1 auxiliary file: capitulos/red.aux +A level-1 auxiliary file: capitulos/futuro.aux +A level-1 auxiliary file: capitulos/conclusiones.aux Database file #1: bibliografia/biblio.bib Warning--to sort, need author or key in 802.1Q Warning--empty title in sp800-190 diff --git a/docs/udelartex/tesis.lof b/docs/udelartex/tesis.lof index 57b9dae86e11ba7969ebe7a3327eb075367d0ba6..8ebfa06d543b7cddbc89635a6057a2653a6eafd4 100644 --- a/docs/udelartex/tesis.lof +++ b/docs/udelartex/tesis.lof @@ -32,78 +32,79 @@ \contentsline {figure}{\numberline {6.5}{\ignorespaces Salida a Internet en los nodos de Openstack.\relax }}{61}{figure.caption.73}% \addvspace {10\p@ } \addvspace {10\p@ } -\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{74}{figure.caption.92}% -\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{79}{figure.caption.95}% -\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{79}{figure.caption.96}% -\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{81}{figure.caption.97}% -\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{82}{figure.caption.98}% -\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{82}{figure.caption.100}% -\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{83}{figure.caption.101}% -\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{84}{figure.caption.103}% -\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{91}{figure.caption.107}% -\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{92}{figure.caption.111}% -\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{92}{figure.caption.113}% -\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{97}{figure.caption.117}% -\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{98}{figure.caption.120}% -\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{99}{figure.caption.122}% -\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{100}{figure.caption.124}% -\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router fÃsico\relax }}{103}{figure.caption.128}% -\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{103}{figure.caption.129}% -\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{104}{figure.caption.132}% -\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{105}{figure.caption.134}% -\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{109}{figure.caption.135}% -\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{116}{figure.caption.138}% -\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{118}{figure.caption.139}% -\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{122}{figure.caption.140}% -\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{123}{figure.caption.141}% -\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{123}{figure.caption.143}% -\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{125}{figure.caption.144}% -\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{126}{figure.caption.146}% -\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{131}{figure.caption.150}% -\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{132}{figure.caption.154}% -\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{133}{figure.caption.156}% -\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{137}{figure.caption.160}% -\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{138}{figure.caption.163}% -\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{139}{figure.caption.165}% -\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{140}{figure.caption.167}% -\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router fÃsico\relax }}{143}{figure.caption.171}% -\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{143}{figure.caption.172}% -\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{144}{figure.caption.175}% -\addvspace {10\p@ } -\addvspace {10\p@ } -\addvspace {10\p@ } -\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{157}{figure.caption.179}% -\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{158}{figure.caption.180}% -\addvspace {10\p@ } -\addvspace {10\p@ } -\addvspace {10\p@ } -\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{200}{figure.caption.183}% -\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{201}{figure.caption.184}% -\addvspace {10\p@ } -\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{208}{figure.caption.198}% -\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{209}{figure.caption.200}% -\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{210}{figure.caption.201}% -\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{211}{figure.caption.203}% -\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{212}{figure.caption.205}% -\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{212}{figure.caption.206}% -\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{213}{figure.caption.208}% -\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{214}{figure.caption.209}% -\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{215}{figure.caption.211}% -\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{216}{figure.caption.212}% -\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{217}{figure.caption.214}% -\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{217}{figure.caption.215}% -\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{218}{figure.caption.216}% -\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{218}{figure.caption.218}% -\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{219}{figure.caption.220}% -\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{219}{figure.caption.222}% -\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{220}{figure.caption.224}% -\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{220}{figure.caption.225}% -\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{221}{figure.caption.226}% -\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{221}{figure.caption.227}% -\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{222}{figure.caption.228}% -\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{223}{figure.caption.229}% -\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{224}{figure.caption.230}% -\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{224}{figure.caption.231}% -\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{225}{figure.caption.232}% -\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{225}{figure.caption.233}% +\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{75}{figure.caption.93}% +\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{80}{figure.caption.96}% +\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{80}{figure.caption.97}% +\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{82}{figure.caption.98}% +\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{83}{figure.caption.99}% +\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{83}{figure.caption.101}% +\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{84}{figure.caption.102}% +\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{85}{figure.caption.104}% +\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{92}{figure.caption.108}% +\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{93}{figure.caption.112}% +\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{93}{figure.caption.114}% +\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{98}{figure.caption.118}% +\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{99}{figure.caption.121}% +\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{100}{figure.caption.123}% +\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{101}{figure.caption.125}% +\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router fÃsico\relax }}{104}{figure.caption.129}% +\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{104}{figure.caption.130}% +\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{105}{figure.caption.133}% +\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{106}{figure.caption.135}% +\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{110}{figure.caption.136}% +\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{117}{figure.caption.139}% +\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{119}{figure.caption.140}% +\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{123}{figure.caption.141}% +\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{124}{figure.caption.142}% +\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{124}{figure.caption.144}% +\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{126}{figure.caption.145}% +\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{127}{figure.caption.147}% +\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{132}{figure.caption.151}% +\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{133}{figure.caption.155}% +\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{134}{figure.caption.157}% +\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{138}{figure.caption.161}% +\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{139}{figure.caption.164}% +\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{140}{figure.caption.166}% +\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{141}{figure.caption.168}% +\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router fÃsico\relax }}{144}{figure.caption.172}% +\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{144}{figure.caption.173}% +\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{145}{figure.caption.176}% +\addvspace {10\p@ } +\addvspace {10\p@ } +\addvspace {10\p@ } +\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{158}{figure.caption.180}% +\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{159}{figure.caption.181}% +\addvspace {10\p@ } +\addvspace {10\p@ } +\addvspace {10\p@ } +\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{201}{figure.caption.184}% +\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{202}{figure.caption.185}% +\addvspace {10\p@ } +\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{209}{figure.caption.199}% +\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{210}{figure.caption.201}% +\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{211}{figure.caption.202}% +\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{212}{figure.caption.204}% +\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{213}{figure.caption.206}% +\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{213}{figure.caption.207}% +\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{214}{figure.caption.209}% +\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{215}{figure.caption.210}% +\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{216}{figure.caption.212}% +\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{217}{figure.caption.213}% +\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{218}{figure.caption.215}% +\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{218}{figure.caption.216}% +\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{219}{figure.caption.217}% +\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{219}{figure.caption.219}% +\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{220}{figure.caption.221}% +\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{220}{figure.caption.223}% +\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{221}{figure.caption.225}% +\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{221}{figure.caption.226}% +\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{222}{figure.caption.227}% +\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{222}{figure.caption.228}% +\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{223}{figure.caption.229}% +\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{224}{figure.caption.230}% +\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{225}{figure.caption.231}% +\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{225}{figure.caption.232}% +\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{226}{figure.caption.233}% +\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{226}{figure.caption.234}% +\addvspace {10\p@ } \contentsfinish diff --git a/docs/udelartex/tesis.lot b/docs/udelartex/tesis.lot index 2fe9099c4d404d6b76893a45c8eaf78f11b810a6..2f1cb9af0b8da8898c264c8be63bbe1a6eef89f9 100644 --- a/docs/udelartex/tesis.lot +++ b/docs/udelartex/tesis.lot @@ -9,24 +9,25 @@ \addvspace {10\p@ } \addvspace {10\p@ } \addvspace {10\p@ } -\contentsline {table}{\numberline {8.1}{\ignorespaces Sabores creados para análisis de red\relax }}{68}{table.caption.74}% -\contentsline {table}{\numberline {8.2}{\ignorespaces Imágenes creadas para análisis de red\relax }}{68}{table.caption.75}% -\contentsline {table}{\numberline {8.3}{\ignorespaces Redes provider creadas para análisis de red\relax }}{69}{table.caption.76}% -\contentsline {table}{\numberline {8.4}{\ignorespaces Subredes provider creadas para análisis de red\relax }}{69}{table.caption.77}% -\contentsline {table}{\numberline {8.5}{\ignorespaces Escenario 1: detalles de la subred 1\relax }}{70}{table.caption.78}% -\contentsline {table}{\numberline {8.6}{\ignorespaces Escenario 1: detalles de las instancias\relax }}{70}{table.caption.79}% -\contentsline {table}{\numberline {8.7}{\ignorespaces Escenario 2: detalles de la subred 1\relax }}{71}{table.caption.80}% -\contentsline {table}{\numberline {8.8}{\ignorespaces Escenario 2: detalles de la subred 2\relax }}{71}{table.caption.81}% -\contentsline {table}{\numberline {8.9}{\ignorespaces Escenario 2: detalles de las instancias\relax }}{71}{table.caption.82}% -\contentsline {table}{\numberline {8.10}{\ignorespaces Escenario 2: detalles del router\relax }}{71}{table.caption.83}% -\contentsline {table}{\numberline {8.11}{\ignorespaces Escenario 3: detalles de la subred 1\relax }}{72}{table.caption.84}% -\contentsline {table}{\numberline {8.12}{\ignorespaces Escenario 3: detalles de la subred provider vlan\relax }}{72}{table.caption.85}% -\contentsline {table}{\numberline {8.13}{\ignorespaces Escenario 3: detalles de las instancias\relax }}{72}{table.caption.86}% -\contentsline {table}{\numberline {8.14}{\ignorespaces Escenario 3: detalles del router\relax }}{72}{table.caption.87}% -\contentsline {table}{\numberline {8.15}{\ignorespaces Escenario 4: detalles de la subred 1\relax }}{73}{table.caption.88}% -\contentsline {table}{\numberline {8.16}{\ignorespaces Escenario 4: detalles de la subred provider vlan\relax }}{74}{table.caption.89}% -\contentsline {table}{\numberline {8.17}{\ignorespaces Escenario 4: detalles de las instancias\relax }}{74}{table.caption.90}% -\contentsline {table}{\numberline {8.18}{\ignorespaces Escenario 4: detalles del router\relax }}{74}{table.caption.91}% +\contentsline {table}{\numberline {8.1}{\ignorespaces Sabores creados para análisis de red\relax }}{69}{table.caption.75}% +\contentsline {table}{\numberline {8.2}{\ignorespaces Imágenes creadas para análisis de red\relax }}{69}{table.caption.76}% +\contentsline {table}{\numberline {8.3}{\ignorespaces Redes provider creadas para análisis de red\relax }}{70}{table.caption.77}% +\contentsline {table}{\numberline {8.4}{\ignorespaces Subredes provider creadas para análisis de red\relax }}{70}{table.caption.78}% +\contentsline {table}{\numberline {8.5}{\ignorespaces Escenario 1: detalles de la subred 1\relax }}{71}{table.caption.79}% +\contentsline {table}{\numberline {8.6}{\ignorespaces Escenario 1: detalles de las instancias\relax }}{71}{table.caption.80}% +\contentsline {table}{\numberline {8.7}{\ignorespaces Escenario 2: detalles de la subred 1\relax }}{72}{table.caption.81}% +\contentsline {table}{\numberline {8.8}{\ignorespaces Escenario 2: detalles de la subred 2\relax }}{72}{table.caption.82}% +\contentsline {table}{\numberline {8.9}{\ignorespaces Escenario 2: detalles de las instancias\relax }}{72}{table.caption.83}% +\contentsline {table}{\numberline {8.10}{\ignorespaces Escenario 2: detalles del router\relax }}{72}{table.caption.84}% +\contentsline {table}{\numberline {8.11}{\ignorespaces Escenario 3: detalles de la subred 1\relax }}{73}{table.caption.85}% +\contentsline {table}{\numberline {8.12}{\ignorespaces Escenario 3: detalles de la subred provider vlan\relax }}{73}{table.caption.86}% +\contentsline {table}{\numberline {8.13}{\ignorespaces Escenario 3: detalles de las instancias\relax }}{73}{table.caption.87}% +\contentsline {table}{\numberline {8.14}{\ignorespaces Escenario 3: detalles del router\relax }}{73}{table.caption.88}% +\contentsline {table}{\numberline {8.15}{\ignorespaces Escenario 4: detalles de la subred 1\relax }}{74}{table.caption.89}% +\contentsline {table}{\numberline {8.16}{\ignorespaces Escenario 4: detalles de la subred provider vlan\relax }}{75}{table.caption.90}% +\contentsline {table}{\numberline {8.17}{\ignorespaces Escenario 4: detalles de las instancias\relax }}{75}{table.caption.91}% +\contentsline {table}{\numberline {8.18}{\ignorespaces Escenario 4: detalles del router\relax }}{75}{table.caption.92}% +\addvspace {10\p@ } \addvspace {10\p@ } \addvspace {10\p@ } \addvspace {10\p@ } diff --git a/docs/udelartex/tesis.out b/docs/udelartex/tesis.out index 92bce6ee6377da173cd726e3e00fdaedaeaa51cf..718bf09201e03f26877fb442968406c03e1f2175 100644 --- a/docs/udelartex/tesis.out +++ b/docs/udelartex/tesis.out @@ -56,7 +56,7 @@ \BOOKMARK [2][-]{subsection.7.1.2}{Verificar estado de los componentes de la infraestructura}{section.7.1}% 56 \BOOKMARK [2][-]{subsection.7.1.3}{Solucionar problemas}{section.7.1}% 57 \BOOKMARK [2][-]{subsection.7.1.4}{Problemas con Ceph}{section.7.1}% 58 -\BOOKMARK [1][-]{section.7.2}{Agregar y remover nodos}{chapter.7}% 59 +\BOOKMARK [1][-]{section.7.2}{Escalamiento horizontal}{chapter.7}% 59 \BOOKMARK [2][-]{subsection.7.2.1}{Agregar nodo de C\363mputo}{section.7.2}% 60 \BOOKMARK [2][-]{subsection.7.2.2}{Eliminar un nodo de c\363mputo}{section.7.2}% 61 \BOOKMARK [2][-]{subsection.7.2.3}{Infraestructura}{section.7.2}% 62 @@ -83,11 +83,11 @@ \BOOKMARK [2][-]{subsection.8.5.1}{Layer 3 High Availability}{section.8.5}% 83 \BOOKMARK [0][-]{chapter.9}{Trabajo a futuro}{}% 84 \BOOKMARK [0][-]{chapter.10}{Conclusiones}{}% 85 -\BOOKMARK [0][-]{chapter*.177}{Referencias bibliogr\341ficas}{}% 86 -\BOOKMARK [0][-]{chapter*.177}{Glosario}{}% 87 -\BOOKMARK [0][-]{section*.178}{Ap\351ndices}{}% 88 +\BOOKMARK [0][-]{chapter*.178}{Referencias bibliogr\341ficas}{}% 86 +\BOOKMARK [0][-]{chapter*.178}{Glosario}{}% 87 +\BOOKMARK [0][-]{section*.179}{Ap\351ndices}{}% 88 \BOOKMARK [0][-]{appendix.Alph1}{Im\341genes}{}% 89 -\BOOKMARK [0][-]{section*.181}{Anexos}{}% 90 +\BOOKMARK [0][-]{section*.182}{Anexos}{}% 90 \BOOKMARK [0][-]{appendix.Anexo.1}{Instalaci\363n versi\363n Queens}{}% 91 \BOOKMARK [1][-]{section.Anexo.1.1}{Preparaci\363n de nodos}{appendix.Anexo.1}% 92 \BOOKMARK [1][-]{section.Anexo.1.2}{Configuraci\363n}{appendix.Anexo.1}% 93 @@ -112,3 +112,4 @@ \BOOKMARK [2][-]{subsection.Anexo.4.3.1}{Por SPICE}{section.Anexo.4.3}% 112 \BOOKMARK [2][-]{subsection.Anexo.4.3.2}{Por SSH}{section.Anexo.4.3}% 113 \BOOKMARK [2][-]{subsection.Anexo.4.3.3}{Por virsh}{section.Anexo.4.3}% 114 +\BOOKMARK [0][-]{appendix.Anexo.5}{migrate\137instance.sh}{}% 115 diff --git a/docs/udelartex/tesis.pdf b/docs/udelartex/tesis.pdf index 34d8c0d1f81961ed4c4ec0ce1cd5da3167497c58..0b7cc09bc3e3483f4aaa2df81d905edf028a1929 100644 Binary files a/docs/udelartex/tesis.pdf and b/docs/udelartex/tesis.pdf differ diff --git a/docs/udelartex/tesis.synctex.gz b/docs/udelartex/tesis.synctex.gz index 78e9e5a6e97cba638af01d048c3753df13eb43ee..2bd6797b4590609f099413634e22ffa34e5d3c3c 100644 Binary files a/docs/udelartex/tesis.synctex.gz and b/docs/udelartex/tesis.synctex.gz differ diff --git a/docs/udelartex/tesis.tex b/docs/udelartex/tesis.tex index dc54975caa8a999c35e2c3203acc07311ab8f947..295131763deb1acfb2dbdc6abe4877ca5ab3676e 100644 --- a/docs/udelartex/tesis.tex +++ b/docs/udelartex/tesis.tex @@ -142,6 +142,7 @@ nopostdot, %quita el punto final en los acrónimos . \input{anexo/anexoStein} \input{anexo/anexoVirtualizacionKVM} \input{anexo/anexoInteraccion} + \input{anexo/anexoMigrateInstance} % \input{anexo/anexo_B} % Seguir copiando la linea de arriba para agregar más anexos. % diff --git a/docs/udelartex/tesis.toc b/docs/udelartex/tesis.toc index b0d701cb00d3da1cce7b7c4debc3420a7504e5aa..333451dfea4570110f2976c6de90d3406b48fe1b 100644 --- a/docs/udelartex/tesis.toc +++ b/docs/udelartex/tesis.toc @@ -97,162 +97,163 @@ \contentsline {subsection}{\numberline {7.1.2}Verificar estado de los componentes de la infraestructura}{63}{subsection.7.1.2}% \contentsline {subsection}{\numberline {7.1.3}Solucionar problemas}{63}{subsection.7.1.3}% \contentsline {subsection}{\numberline {7.1.4}Problemas con Ceph}{64}{subsection.7.1.4}% -\contentsline {section}{\numberline {7.2}Agregar y remover nodos}{65}{section.7.2}% +\contentsline {section}{\numberline {7.2}Escalamiento horizontal}{65}{section.7.2}% \contentsline {subsection}{\numberline {7.2.1}Agregar nodo de Cómputo}{65}{subsection.7.2.1}% -\contentsline {subsection}{\numberline {7.2.2}Eliminar un nodo de cómputo}{67}{subsection.7.2.2}% -\contentsline {subsection}{\numberline {7.2.3}Infraestructura}{67}{subsection.7.2.3}% -\contentsline {subsection}{\numberline {7.2.4}Storage}{67}{subsection.7.2.4}% -\contentsline {section}{\numberline {7.3}Actualizar versión}{67}{section.7.3}% -\contentsline {chapter}{\numberline {8}Análisis del módulo de red}{68}{chapter.8}% -\contentsline {section}{\numberline {8.1}Escenarios de prueba}{68}{section.8.1}% -\contentsline {subsection}{\numberline {8.1.1}Escenario 1: tráfico este-oeste (misma red tenant)}{69}{subsection.8.1.1}% -\contentsline {subsubsection}{\numberline {8.1.1.1}Composición del escenario}{69}{subsubsection.8.1.1.1}% -\contentsline {subsection}{\numberline {8.1.2}Escenario 2: tráfico este-oeste (distintas redes tenant)}{70}{subsection.8.1.2}% -\contentsline {subsubsection}{\numberline {8.1.2.1}Composición del escenario}{70}{subsubsection.8.1.2.1}% -\contentsline {subsection}{\numberline {8.1.3}Escenario 3: tráfico norte-sur (acceso hacia el exterior)}{71}{subsection.8.1.3}% -\contentsline {subsubsection}{\numberline {8.1.3.1}Composición del escenario}{72}{subsubsection.8.1.3.1}% -\contentsline {subsection}{\numberline {8.1.4}Escenario 4: tráfico norte-sur (acceso desde el exterior)}{73}{subsection.8.1.4}% -\contentsline {subsubsection}{\numberline {8.1.4.1}Composición del escenario}{73}{subsubsection.8.1.4.1}% -\contentsline {section}{\numberline {8.2}Linux bridge}{73}{section.8.2}% -\contentsline {subsection}{\numberline {8.2.1}Escenario 1}{74}{subsection.8.2.1}% -\contentsline {subsubsection}{\numberline {8.2.1.1}Análisis de componentes}{75}{subsubsection.8.2.1.1}% -\contentsline {subsubsection}{\numberline {8.2.1.2}Análisis de tráfico}{78}{subsubsection.8.2.1.2}% -\contentsline {subparagraph}{Paso 1}{78}{section*.93}% -\contentsline {subparagraph}{Paso 2}{78}{section*.94}% -\contentsline {subparagraph}{Paso 3}{82}{section*.99}% -\contentsline {subparagraph}{Paso 4}{83}{section*.102}% -\contentsline {subsection}{\numberline {8.2.2}Escenario 2}{84}{subsection.8.2.2}% -\contentsline {subsubsection}{\numberline {8.2.2.1}Análisis de componentes}{84}{subsubsection.8.2.2.1}% -\contentsline {subsubsection}{\numberline {8.2.2.2}Análisis de tráfico}{90}{subsubsection.8.2.2.2}% -\contentsline {subparagraph}{Paso 1}{90}{section*.104}% -\contentsline {subparagraph}{Paso 2}{90}{section*.105}% -\contentsline {subparagraph}{Paso 3}{90}{section*.106}% -\contentsline {subparagraph}{Paso 4}{91}{section*.108}% -\contentsline {subparagraph}{Paso 5}{91}{section*.109}% -\contentsline {subparagraph}{Paso 6}{91}{section*.110}% -\contentsline {subparagraph}{Paso 7}{91}{section*.112}% -\contentsline {subsection}{\numberline {8.2.3}Escenario 3}{92}{subsection.8.2.3}% -\contentsline {subsubsection}{\numberline {8.2.3.1}Análisis de componentes}{93}{subsubsection.8.2.3.1}% -\contentsline {subsubsection}{\numberline {8.2.3.2}Análisis de tráfico}{96}{subsubsection.8.2.3.2}% -\contentsline {subparagraph}{Paso 1}{96}{section*.114}% -\contentsline {subparagraph}{Paso 2}{96}{section*.115}% -\contentsline {subparagraph}{Paso 3}{96}{section*.116}% -\contentsline {subparagraph}{Paso 4}{97}{section*.118}% -\contentsline {subparagraph}{Paso 5}{97}{section*.119}% -\contentsline {subparagraph}{Paso 6}{98}{section*.121}% -\contentsline {subparagraph}{Paso 7}{99}{section*.123}% -\contentsline {subsection}{\numberline {8.2.4}Escenario 4}{100}{subsection.8.2.4}% -\contentsline {subsubsection}{\numberline {8.2.4.1}Análisis de componentes}{100}{subsubsection.8.2.4.1}% -\contentsline {subsubsection}{\numberline {8.2.4.2}Análisis de tráfico}{102}{subsubsection.8.2.4.2}% -\contentsline {subparagraph}{Paso 1}{102}{section*.125}% -\contentsline {subparagraph}{Paso 2}{102}{section*.126}% -\contentsline {subparagraph}{Paso 3}{102}{section*.127}% -\contentsline {subparagraph}{Paso 4}{103}{section*.130}% -\contentsline {subparagraph}{Paso 5}{103}{section*.131}% -\contentsline {subparagraph}{Paso 6}{104}{section*.133}% -\contentsline {section}{\numberline {8.3}Open vSwitch}{104}{section.8.3}% -\contentsline {subsubsection}{\numberline {8.3.0.1}Archivos de configuración}{106}{subsubsection.8.3.0.1}% -\contentsline {subsection}{\numberline {8.3.1}Escenario 1}{109}{subsection.8.3.1}% -\contentsline {subsubsection}{\numberline {8.3.1.1}Análisis de componentes}{109}{subsubsection.8.3.1.1}% -\contentsline {subsubsection}{\numberline {8.3.1.2}Análisis de tráfico}{115}{subsubsection.8.3.1.2}% -\contentsline {subparagraph}{Paso 1}{115}{section*.136}% -\contentsline {subparagraph}{Paso 2}{116}{section*.137}% -\contentsline {subparagraph}{Paso 3}{123}{section*.142}% -\contentsline {subparagraph}{Paso 4}{125}{section*.145}% -\contentsline {subsection}{\numberline {8.3.2}Escenario 2}{126}{subsection.8.3.2}% -\contentsline {subsubsection}{\numberline {8.3.2.1}Análisis de componentes}{126}{subsubsection.8.3.2.1}% -\contentsline {subsubsection}{\numberline {8.3.2.2}Análisis de tráfico}{130}{subsubsection.8.3.2.2}% -\contentsline {subparagraph}{Paso 1}{131}{section*.147}% -\contentsline {subparagraph}{Paso 2}{131}{section*.148}% -\contentsline {subparagraph}{Paso 3}{131}{section*.149}% -\contentsline {subparagraph}{Paso 4}{131}{section*.151}% -\contentsline {subparagraph}{Paso 5}{132}{section*.152}% -\contentsline {subparagraph}{Paso 6}{132}{section*.153}% -\contentsline {subparagraph}{Paso 7}{132}{section*.155}% -\contentsline {subsection}{\numberline {8.3.3}Escenario 3}{133}{subsection.8.3.3}% -\contentsline {subsubsection}{\numberline {8.3.3.1}Análisis de componentes}{133}{subsubsection.8.3.3.1}% -\contentsline {subsubsection}{\numberline {8.3.3.2}Análisis de tráfico}{136}{subsubsection.8.3.3.2}% -\contentsline {subparagraph}{Paso 1}{136}{section*.157}% -\contentsline {subparagraph}{Paso 2}{136}{section*.158}% -\contentsline {subparagraph}{Paso 3}{137}{section*.159}% -\contentsline {subparagraph}{Paso 4}{137}{section*.161}% -\contentsline {subparagraph}{Paso 5}{137}{section*.162}% -\contentsline {subparagraph}{Paso 6}{139}{section*.164}% -\contentsline {subparagraph}{Paso 7}{139}{section*.166}% -\contentsline {subsection}{\numberline {8.3.4}Escenario 4}{140}{subsection.8.3.4}% -\contentsline {subsubsection}{\numberline {8.3.4.1}Análisis de componentes}{140}{subsubsection.8.3.4.1}% -\contentsline {subsubsection}{\numberline {8.3.4.2}Análisis de tráfico}{141}{subsubsection.8.3.4.2}% -\contentsline {subparagraph}{Paso 1}{142}{section*.168}% -\contentsline {subparagraph}{Paso 2}{142}{section*.169}% -\contentsline {subparagraph}{Paso 3}{142}{section*.170}% -\contentsline {subparagraph}{Paso 4}{144}{section*.173}% -\contentsline {subparagraph}{Paso 5}{144}{section*.174}% -\contentsline {subparagraph}{Paso 6}{144}{section*.176}% -\contentsline {section}{\numberline {8.4}Comparativa de drivers}{144}{section.8.4}% -\contentsline {section}{\numberline {8.5}Funcionalidades avanzadas}{144}{section.8.5}% -\contentsline {subsection}{\numberline {8.5.1}Layer 3 High Availability}{144}{subsection.8.5.1}% -\contentsline {chapter}{\numberline {9}Trabajo a futuro}{145}{chapter.9}% -\contentsline {subsubsection}{\numberline {9.0.0.1}Firewall}{145}{subsubsection.9.0.0.1}% -\contentsline {subsubsection}{\numberline {9.0.0.2}Arquitectura segura}{145}{subsubsection.9.0.0.2}% -\contentsline {subsubsection}{\numberline {9.0.0.3}Brindar conexión directa a Internet}{146}{subsubsection.9.0.0.3}% -\contentsline {subsubsection}{\numberline {9.0.0.4}Gestión de Openstack en operación}{146}{subsubsection.9.0.0.4}% -\contentsline {chapter}{\numberline {10}Conclusiones}{147}{chapter.10}% -\contentsline {chapter}{Referencias bibliográficas}{148}{chapter*.177}% -\contentsline {chapter}{Glosario}{154}{chapter*.177}% -\contentsline {chapter}{\textbf {Apéndices}}{155}{section*.178}% +\contentsline {subsection}{\numberline {7.2.2}Eliminar un nodo de cómputo}{66}{subsection.7.2.2}% +\contentsline {subsection}{\numberline {7.2.3}Infraestructura}{68}{subsection.7.2.3}% +\contentsline {subsection}{\numberline {7.2.4}Storage}{68}{subsection.7.2.4}% +\contentsline {section}{\numberline {7.3}Actualizar versión}{68}{section.7.3}% +\contentsline {chapter}{\numberline {8}Análisis del módulo de red}{69}{chapter.8}% +\contentsline {section}{\numberline {8.1}Escenarios de prueba}{69}{section.8.1}% +\contentsline {subsection}{\numberline {8.1.1}Escenario 1: tráfico este-oeste (misma red tenant)}{70}{subsection.8.1.1}% +\contentsline {subsubsection}{\numberline {8.1.1.1}Composición del escenario}{70}{subsubsection.8.1.1.1}% +\contentsline {subsection}{\numberline {8.1.2}Escenario 2: tráfico este-oeste (distintas redes tenant)}{71}{subsection.8.1.2}% +\contentsline {subsubsection}{\numberline {8.1.2.1}Composición del escenario}{71}{subsubsection.8.1.2.1}% +\contentsline {subsection}{\numberline {8.1.3}Escenario 3: tráfico norte-sur (acceso hacia el exterior)}{72}{subsection.8.1.3}% +\contentsline {subsubsection}{\numberline {8.1.3.1}Composición del escenario}{73}{subsubsection.8.1.3.1}% +\contentsline {subsection}{\numberline {8.1.4}Escenario 4: tráfico norte-sur (acceso desde el exterior)}{74}{subsection.8.1.4}% +\contentsline {subsubsection}{\numberline {8.1.4.1}Composición del escenario}{74}{subsubsection.8.1.4.1}% +\contentsline {section}{\numberline {8.2}Linux bridge}{74}{section.8.2}% +\contentsline {subsection}{\numberline {8.2.1}Escenario 1}{75}{subsection.8.2.1}% +\contentsline {subsubsection}{\numberline {8.2.1.1}Análisis de componentes}{76}{subsubsection.8.2.1.1}% +\contentsline {subsubsection}{\numberline {8.2.1.2}Análisis de tráfico}{79}{subsubsection.8.2.1.2}% +\contentsline {subparagraph}{Paso 1}{79}{section*.94}% +\contentsline {subparagraph}{Paso 2}{79}{section*.95}% +\contentsline {subparagraph}{Paso 3}{83}{section*.100}% +\contentsline {subparagraph}{Paso 4}{84}{section*.103}% +\contentsline {subsection}{\numberline {8.2.2}Escenario 2}{85}{subsection.8.2.2}% +\contentsline {subsubsection}{\numberline {8.2.2.1}Análisis de componentes}{85}{subsubsection.8.2.2.1}% +\contentsline {subsubsection}{\numberline {8.2.2.2}Análisis de tráfico}{91}{subsubsection.8.2.2.2}% +\contentsline {subparagraph}{Paso 1}{91}{section*.105}% +\contentsline {subparagraph}{Paso 2}{91}{section*.106}% +\contentsline {subparagraph}{Paso 3}{91}{section*.107}% +\contentsline {subparagraph}{Paso 4}{92}{section*.109}% +\contentsline {subparagraph}{Paso 5}{92}{section*.110}% +\contentsline {subparagraph}{Paso 6}{92}{section*.111}% +\contentsline {subparagraph}{Paso 7}{92}{section*.113}% +\contentsline {subsection}{\numberline {8.2.3}Escenario 3}{93}{subsection.8.2.3}% +\contentsline {subsubsection}{\numberline {8.2.3.1}Análisis de componentes}{94}{subsubsection.8.2.3.1}% +\contentsline {subsubsection}{\numberline {8.2.3.2}Análisis de tráfico}{97}{subsubsection.8.2.3.2}% +\contentsline {subparagraph}{Paso 1}{97}{section*.115}% +\contentsline {subparagraph}{Paso 2}{97}{section*.116}% +\contentsline {subparagraph}{Paso 3}{97}{section*.117}% +\contentsline {subparagraph}{Paso 4}{98}{section*.119}% +\contentsline {subparagraph}{Paso 5}{98}{section*.120}% +\contentsline {subparagraph}{Paso 6}{99}{section*.122}% +\contentsline {subparagraph}{Paso 7}{100}{section*.124}% +\contentsline {subsection}{\numberline {8.2.4}Escenario 4}{101}{subsection.8.2.4}% +\contentsline {subsubsection}{\numberline {8.2.4.1}Análisis de componentes}{101}{subsubsection.8.2.4.1}% +\contentsline {subsubsection}{\numberline {8.2.4.2}Análisis de tráfico}{103}{subsubsection.8.2.4.2}% +\contentsline {subparagraph}{Paso 1}{103}{section*.126}% +\contentsline {subparagraph}{Paso 2}{103}{section*.127}% +\contentsline {subparagraph}{Paso 3}{103}{section*.128}% +\contentsline {subparagraph}{Paso 4}{104}{section*.131}% +\contentsline {subparagraph}{Paso 5}{104}{section*.132}% +\contentsline {subparagraph}{Paso 6}{105}{section*.134}% +\contentsline {section}{\numberline {8.3}Open vSwitch}{105}{section.8.3}% +\contentsline {subsubsection}{\numberline {8.3.0.1}Archivos de configuración}{107}{subsubsection.8.3.0.1}% +\contentsline {subsection}{\numberline {8.3.1}Escenario 1}{110}{subsection.8.3.1}% +\contentsline {subsubsection}{\numberline {8.3.1.1}Análisis de componentes}{110}{subsubsection.8.3.1.1}% +\contentsline {subsubsection}{\numberline {8.3.1.2}Análisis de tráfico}{116}{subsubsection.8.3.1.2}% +\contentsline {subparagraph}{Paso 1}{116}{section*.137}% +\contentsline {subparagraph}{Paso 2}{117}{section*.138}% +\contentsline {subparagraph}{Paso 3}{124}{section*.143}% +\contentsline {subparagraph}{Paso 4}{126}{section*.146}% +\contentsline {subsection}{\numberline {8.3.2}Escenario 2}{127}{subsection.8.3.2}% +\contentsline {subsubsection}{\numberline {8.3.2.1}Análisis de componentes}{127}{subsubsection.8.3.2.1}% +\contentsline {subsubsection}{\numberline {8.3.2.2}Análisis de tráfico}{131}{subsubsection.8.3.2.2}% +\contentsline {subparagraph}{Paso 1}{132}{section*.148}% +\contentsline {subparagraph}{Paso 2}{132}{section*.149}% +\contentsline {subparagraph}{Paso 3}{132}{section*.150}% +\contentsline {subparagraph}{Paso 4}{132}{section*.152}% +\contentsline {subparagraph}{Paso 5}{133}{section*.153}% +\contentsline {subparagraph}{Paso 6}{133}{section*.154}% +\contentsline {subparagraph}{Paso 7}{133}{section*.156}% +\contentsline {subsection}{\numberline {8.3.3}Escenario 3}{134}{subsection.8.3.3}% +\contentsline {subsubsection}{\numberline {8.3.3.1}Análisis de componentes}{134}{subsubsection.8.3.3.1}% +\contentsline {subsubsection}{\numberline {8.3.3.2}Análisis de tráfico}{137}{subsubsection.8.3.3.2}% +\contentsline {subparagraph}{Paso 1}{137}{section*.158}% +\contentsline {subparagraph}{Paso 2}{137}{section*.159}% +\contentsline {subparagraph}{Paso 3}{138}{section*.160}% +\contentsline {subparagraph}{Paso 4}{138}{section*.162}% +\contentsline {subparagraph}{Paso 5}{138}{section*.163}% +\contentsline {subparagraph}{Paso 6}{140}{section*.165}% +\contentsline {subparagraph}{Paso 7}{140}{section*.167}% +\contentsline {subsection}{\numberline {8.3.4}Escenario 4}{141}{subsection.8.3.4}% +\contentsline {subsubsection}{\numberline {8.3.4.1}Análisis de componentes}{141}{subsubsection.8.3.4.1}% +\contentsline {subsubsection}{\numberline {8.3.4.2}Análisis de tráfico}{142}{subsubsection.8.3.4.2}% +\contentsline {subparagraph}{Paso 1}{143}{section*.169}% +\contentsline {subparagraph}{Paso 2}{143}{section*.170}% +\contentsline {subparagraph}{Paso 3}{143}{section*.171}% +\contentsline {subparagraph}{Paso 4}{145}{section*.174}% +\contentsline {subparagraph}{Paso 5}{145}{section*.175}% +\contentsline {subparagraph}{Paso 6}{145}{section*.177}% +\contentsline {section}{\numberline {8.4}Comparativa de drivers}{145}{section.8.4}% +\contentsline {section}{\numberline {8.5}Funcionalidades avanzadas}{145}{section.8.5}% +\contentsline {subsection}{\numberline {8.5.1}Layer 3 High Availability}{145}{subsection.8.5.1}% +\contentsline {chapter}{\numberline {9}Trabajo a futuro}{146}{chapter.9}% +\contentsline {subsubsection}{\numberline {9.0.0.1}Firewall}{146}{subsubsection.9.0.0.1}% +\contentsline {subsubsection}{\numberline {9.0.0.2}Arquitectura segura}{146}{subsubsection.9.0.0.2}% +\contentsline {subsubsection}{\numberline {9.0.0.3}Brindar conexión directa a Internet}{147}{subsubsection.9.0.0.3}% +\contentsline {subsubsection}{\numberline {9.0.0.4}Gestión de Openstack en operación}{147}{subsubsection.9.0.0.4}% +\contentsline {chapter}{\numberline {10}Conclusiones}{148}{chapter.10}% +\contentsline {chapter}{Referencias bibliográficas}{149}{chapter*.178}% +\contentsline {chapter}{Glosario}{155}{chapter*.178}% +\contentsline {chapter}{\textbf {Apéndices}}{156}{section*.179}% \ttl@change@i {\@ne }{chapter}{13pt}{}{ Apéndice\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax \ttl@change@v {chapter}{}{}{}\relax -\contentsline {chapter}{\numberline {1}Imágenes}{156}{appendix.Alph1}% +\contentsline {chapter}{\numberline {1}Imágenes}{157}{appendix.Alph1}% \ttl@change@i {\@ne }{chapter}{0pt}{\vspace *{0.45cm}}{\thecontentslabel \quad }{}{\bfseries \hfill \contentspage }\relax \ttl@change@v {chapter}{}{}{}\relax -\contentsline {chapter}{\textbf {Anexos}}{159}{section*.181}% +\contentsline {chapter}{\textbf {Anexos}}{160}{section*.182}% \ttl@change@i {\@ne }{chapter}{13pt}{}{ Anexo\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax \ttl@change@v {chapter}{}{}{}\relax -\contentsline {chapter}{\numberline {1}Instalación versión Queens}{160}{appendix.Anexo.1}% -\contentsline {section}{\numberline {1.1}Preparación de nodos}{160}{section.Anexo.1.1}% -\contentsline {subsubsection}{\numberline {1.1.0.1}Deploy}{160}{subsubsection.Anexo.1.1.0.1}% -\contentsline {subsubsection}{\numberline {1.1.0.2}Infra1}{163}{subsubsection.Anexo.1.1.0.2}% -\contentsline {subsubsection}{\numberline {1.1.0.3}Compute1}{165}{subsubsection.Anexo.1.1.0.3}% -\contentsline {subsubsection}{\numberline {1.1.0.4}Storage1}{167}{subsubsection.Anexo.1.1.0.4}% -\contentsline {subsubsection}{\numberline {1.1.0.5}HAproxy1}{168}{subsubsection.Anexo.1.1.0.5}% -\contentsline {section}{\numberline {1.2}Configuración}{169}{section.Anexo.1.2}% -\contentsline {subsection}{\numberline {1.2.1}Configuración claves SSH}{169}{subsection.Anexo.1.2.1}% -\contentsline {subsection}{\numberline {1.2.2}Archivos de configuración OSA}{170}{subsection.Anexo.1.2.2}% -\contentsline {subsubsection}{\numberline {1.2.2.1}openstack\_user\_config.yml}{170}{subsubsection.Anexo.1.2.2.1}% -\contentsline {subsubsection}{\numberline {1.2.2.2}user\_variables.yml}{173}{subsubsection.Anexo.1.2.2.2}% -\contentsline {subsubsection}{\numberline {1.2.2.3}cinder.yml}{175}{subsubsection.Anexo.1.2.2.3}% -\contentsline {subsection}{\numberline {1.2.3}Generación de claves}{175}{subsection.Anexo.1.2.3}% -\contentsline {subsection}{\numberline {1.2.4}Correcciones}{175}{subsection.Anexo.1.2.4}% -\contentsline {subsubsection}{\numberline {1.2.4.1}SELinux}{175}{subsubsection.Anexo.1.2.4.1}% -\contentsline {chapter}{\numberline {2}Instalación versión Stein}{176}{appendix.Anexo.2}% -\contentsline {section}{\numberline {2.1}Preparación de nodos}{176}{section.Anexo.2.1}% -\contentsline {subsubsection}{\numberline {2.1.0.1}Deploy}{176}{subsubsection.Anexo.2.1.0.1}% -\contentsline {subsubsection}{\numberline {2.1.0.2}Infra1}{179}{subsubsection.Anexo.2.1.0.2}% -\contentsline {subsubsection}{\numberline {2.1.0.3}Compute1}{181}{subsubsection.Anexo.2.1.0.3}% -\contentsline {subsubsection}{\numberline {2.1.0.4}Compute2}{183}{subsubsection.Anexo.2.1.0.4}% -\contentsline {subsubsection}{\numberline {2.1.0.5}Storage1}{183}{subsubsection.Anexo.2.1.0.5}% -\contentsline {subsubsection}{\numberline {2.1.0.6}Storage2}{184}{subsubsection.Anexo.2.1.0.6}% -\contentsline {subsubsection}{\numberline {2.1.0.7}HAproxy1}{184}{subsubsection.Anexo.2.1.0.7}% -\contentsline {subsubsection}{\numberline {2.1.0.8}Router}{185}{subsubsection.Anexo.2.1.0.8}% -\contentsline {section}{\numberline {2.2}Configuración archivos OSA}{189}{section.Anexo.2.2}% -\contentsline {subsubsection}{\numberline {2.2.0.1}openstack\_user\_config.yml}{189}{subsubsection.Anexo.2.2.0.1}% -\contentsline {subsubsection}{\numberline {2.2.0.2}user\_variables.yml}{194}{subsubsection.Anexo.2.2.0.2}% -\contentsline {subsubsection}{\numberline {2.2.0.3}cinder.yml}{196}{subsubsection.Anexo.2.2.0.3}% -\contentsline {section}{\numberline {2.3}Ejecución de playbooks}{196}{section.Anexo.2.3}% -\contentsline {section}{\numberline {2.4}Cambios para driver OVS}{197}{section.Anexo.2.4}% -\contentsline {chapter}{\numberline {3}Virtualización con KVM}{200}{appendix.Anexo.3}% -\contentsline {section}{\numberline {3.1}Utilización virt-manager}{200}{section.Anexo.3.1}% -\contentsline {subsection}{\numberline {3.1.1}Conexión remota}{200}{subsection.Anexo.3.1.1}% -\contentsline {subsection}{\numberline {3.1.2}Creación de una red}{201}{subsection.Anexo.3.1.2}% -\contentsline {subsection}{\numberline {3.1.3}Crear nodo}{203}{subsection.Anexo.3.1.3}% -\contentsline {chapter}{\numberline {4}Interacción}{207}{appendix.Anexo.4}% -\contentsline {section}{\numberline {4.1}Configuraciones de administrador}{208}{section.Anexo.4.1}% -\contentsline {section}{\numberline {4.2}Interacción de un usuario}{214}{section.Anexo.4.2}% -\contentsline {section}{\numberline {4.3}Acceso a una instancia}{222}{section.Anexo.4.3}% -\contentsline {subsection}{\numberline {4.3.1}Por SPICE}{222}{subsection.Anexo.4.3.1}% -\contentsline {subsection}{\numberline {4.3.2}Por SSH}{223}{subsection.Anexo.4.3.2}% -\contentsline {subsubsection}{\numberline {4.3.2.1}Asociar una Floating IP a la instancia}{223}{subsubsection.Anexo.4.3.2.1}% -\contentsline {subsubsection}{\numberline {4.3.2.2}Modificar security group}{224}{subsubsection.Anexo.4.3.2.2}% -\contentsline {subsubsection}{\numberline {4.3.2.3}SSH}{225}{subsubsection.Anexo.4.3.2.3}% -\contentsline {subsection}{\numberline {4.3.3}Por virsh}{226}{subsection.Anexo.4.3.3}% +\contentsline {chapter}{\numberline {1}Instalación versión Queens}{161}{appendix.Anexo.1}% +\contentsline {section}{\numberline {1.1}Preparación de nodos}{161}{section.Anexo.1.1}% +\contentsline {subsubsection}{\numberline {1.1.0.1}Deploy}{161}{subsubsection.Anexo.1.1.0.1}% +\contentsline {subsubsection}{\numberline {1.1.0.2}Infra1}{164}{subsubsection.Anexo.1.1.0.2}% +\contentsline {subsubsection}{\numberline {1.1.0.3}Compute1}{166}{subsubsection.Anexo.1.1.0.3}% +\contentsline {subsubsection}{\numberline {1.1.0.4}Storage1}{168}{subsubsection.Anexo.1.1.0.4}% +\contentsline {subsubsection}{\numberline {1.1.0.5}HAproxy1}{169}{subsubsection.Anexo.1.1.0.5}% +\contentsline {section}{\numberline {1.2}Configuración}{170}{section.Anexo.1.2}% +\contentsline {subsection}{\numberline {1.2.1}Configuración claves SSH}{170}{subsection.Anexo.1.2.1}% +\contentsline {subsection}{\numberline {1.2.2}Archivos de configuración OSA}{171}{subsection.Anexo.1.2.2}% +\contentsline {subsubsection}{\numberline {1.2.2.1}openstack\_user\_config.yml}{171}{subsubsection.Anexo.1.2.2.1}% +\contentsline {subsubsection}{\numberline {1.2.2.2}user\_variables.yml}{174}{subsubsection.Anexo.1.2.2.2}% +\contentsline {subsubsection}{\numberline {1.2.2.3}cinder.yml}{176}{subsubsection.Anexo.1.2.2.3}% +\contentsline {subsection}{\numberline {1.2.3}Generación de claves}{176}{subsection.Anexo.1.2.3}% +\contentsline {subsection}{\numberline {1.2.4}Correcciones}{176}{subsection.Anexo.1.2.4}% +\contentsline {subsubsection}{\numberline {1.2.4.1}SELinux}{176}{subsubsection.Anexo.1.2.4.1}% +\contentsline {chapter}{\numberline {2}Instalación versión Stein}{177}{appendix.Anexo.2}% +\contentsline {section}{\numberline {2.1}Preparación de nodos}{177}{section.Anexo.2.1}% +\contentsline {subsubsection}{\numberline {2.1.0.1}Deploy}{177}{subsubsection.Anexo.2.1.0.1}% +\contentsline {subsubsection}{\numberline {2.1.0.2}Infra1}{180}{subsubsection.Anexo.2.1.0.2}% +\contentsline {subsubsection}{\numberline {2.1.0.3}Compute1}{182}{subsubsection.Anexo.2.1.0.3}% +\contentsline {subsubsection}{\numberline {2.1.0.4}Compute2}{184}{subsubsection.Anexo.2.1.0.4}% +\contentsline {subsubsection}{\numberline {2.1.0.5}Storage1}{184}{subsubsection.Anexo.2.1.0.5}% +\contentsline {subsubsection}{\numberline {2.1.0.6}Storage2}{185}{subsubsection.Anexo.2.1.0.6}% +\contentsline {subsubsection}{\numberline {2.1.0.7}HAproxy1}{185}{subsubsection.Anexo.2.1.0.7}% +\contentsline {subsubsection}{\numberline {2.1.0.8}Router}{186}{subsubsection.Anexo.2.1.0.8}% +\contentsline {section}{\numberline {2.2}Configuración archivos OSA}{190}{section.Anexo.2.2}% +\contentsline {subsubsection}{\numberline {2.2.0.1}openstack\_user\_config.yml}{190}{subsubsection.Anexo.2.2.0.1}% +\contentsline {subsubsection}{\numberline {2.2.0.2}user\_variables.yml}{195}{subsubsection.Anexo.2.2.0.2}% +\contentsline {subsubsection}{\numberline {2.2.0.3}cinder.yml}{197}{subsubsection.Anexo.2.2.0.3}% +\contentsline {section}{\numberline {2.3}Ejecución de playbooks}{197}{section.Anexo.2.3}% +\contentsline {section}{\numberline {2.4}Cambios para driver OVS}{198}{section.Anexo.2.4}% +\contentsline {chapter}{\numberline {3}Virtualización con KVM}{201}{appendix.Anexo.3}% +\contentsline {section}{\numberline {3.1}Utilización virt-manager}{201}{section.Anexo.3.1}% +\contentsline {subsection}{\numberline {3.1.1}Conexión remota}{201}{subsection.Anexo.3.1.1}% +\contentsline {subsection}{\numberline {3.1.2}Creación de una red}{202}{subsection.Anexo.3.1.2}% +\contentsline {subsection}{\numberline {3.1.3}Crear nodo}{204}{subsection.Anexo.3.1.3}% +\contentsline {chapter}{\numberline {4}Interacción}{208}{appendix.Anexo.4}% +\contentsline {section}{\numberline {4.1}Configuraciones de administrador}{209}{section.Anexo.4.1}% +\contentsline {section}{\numberline {4.2}Interacción de un usuario}{215}{section.Anexo.4.2}% +\contentsline {section}{\numberline {4.3}Acceso a una instancia}{223}{section.Anexo.4.3}% +\contentsline {subsection}{\numberline {4.3.1}Por SPICE}{223}{subsection.Anexo.4.3.1}% +\contentsline {subsection}{\numberline {4.3.2}Por SSH}{224}{subsection.Anexo.4.3.2}% +\contentsline {subsubsection}{\numberline {4.3.2.1}Asociar una Floating IP a la instancia}{224}{subsubsection.Anexo.4.3.2.1}% +\contentsline {subsubsection}{\numberline {4.3.2.2}Modificar security group}{225}{subsubsection.Anexo.4.3.2.2}% +\contentsline {subsubsection}{\numberline {4.3.2.3}SSH}{226}{subsubsection.Anexo.4.3.2.3}% +\contentsline {subsection}{\numberline {4.3.3}Por virsh}{227}{subsection.Anexo.4.3.3}% +\contentsline {chapter}{\numberline {5}migrate\_instance.sh}{228}{appendix.Anexo.5}% \contentsfinish diff --git a/docs/udelartex/tesis.xwm b/docs/udelartex/tesis.xwm index 7d979f62201b6e6625404b37c9c42a0d87cc5320..3c7d5ca06e0c3365ddbd4c33645f7a30c490dd4e 100644 --- a/docs/udelartex/tesis.xwm +++ b/docs/udelartex/tesis.xwm @@ -1,2 +1,2 @@ \relax -\xwmnewlabel{xwmlastpage}{{4.3.3}{226}{Conclusiones\relax }{section*.234}{}} +\xwmnewlabel{xwmlastpage}{{5}{229}{migrate\_instance.sh\relax }{lstnumber.-283.30}{}}