diff --git "a/docs/udelartex/capitulos/dise\303\261o.tex" "b/docs/udelartex/capitulos/dise\303\261o.tex" index e68be8adb82edbaa5584e78fd1ec310a597d2fbd..d93a7297260e724d83ca6ee28d212acc14b02619 100644 --- "a/docs/udelartex/capitulos/dise\303\261o.tex" +++ "b/docs/udelartex/capitulos/dise\303\261o.tex" @@ -150,18 +150,14 @@ Una de las principales caracterÃsticas de OpenStack-Ansible es el despliegue de En cuanto a los servicios a desplegar, los administradores pueden optar por cuáles instalar dentro de los opcionales y de qué forma con la finalidad de crear un ambiente que se adapte a las necesidades de cada caso. Dicho esto, un aspecto fundamental en todos los servicios y en especial sobre los que interactúan directamente los usuarios finales es la alta disponibilidad. -En este trabajo los servicios que se desplegaron directamente sobre los hosts fÃsicos son los relacionados con Neutron y Nova debido a que agregar una capa de abstracción como son los contenedores no es favorable en ninguno de los casos ya sea por los hipervisores o los recursos de red, en donde ambos requieren tener una comunicación directa con el kernel de Linux. Finalmente los servicios se encuentran distribuidos de la siguiente forma:\\ -\textbf{Nodo de infraestructura}\\ -En contenedores se encuentran los servicios: -Contenedor ceph-mon: - - ceph-crash - - ceph-mgr - - ceph-mon -Contenedor -VER BIEN COMO PONER ESTO, -porque poner cada servicio de cada contenedor capaz que es medio al pedo y con mencionar medio macro alcanza, por ejemplo el galera, basta con decir que el mariadb-galera corre en el contenedore xxx y chau. -\textbf{Nodo de cómputo}\\ -\textbf{Nodo de storage} +En este trabajo los servicios que se desplegaron directamente sobre los hosts fÃsicos son los relacionados con Neutron y Nova debido a que agregar una capa de abstracción como son los contenedores no es favorable en ninguno de los casos ya sea por los hipervisores o los recursos de red, en donde ambos requieren tener una comunicación directa con el kernel de Linux. Finalmente los servicios se encuentran distribuidos de la siguiente forma: + +\begin{figure}[H] + \centering + \includegraphics[width=0.8\columnwidth]{diseño/distribucion-servicios} + \caption{Diagrama con la distribución de los servicios.} + \label{distribucion-servicios} +\end{figure} \section{Ambiente de trabajo}\label{diseño:ambiente:trabajo} diff --git "a/docs/udelartex/imagenes/dise\303\261o/distribucion-servicios.jpg" "b/docs/udelartex/imagenes/dise\303\261o/distribucion-servicios.jpg" new file mode 100644 index 0000000000000000000000000000000000000000..34282b2428edf96de358cd504d35f8b4a3471162 Binary files /dev/null and "b/docs/udelartex/imagenes/dise\303\261o/distribucion-servicios.jpg" differ diff --git a/docs/udelartex/tesis.lof b/docs/udelartex/tesis.lof index 4fa6554f814872fbf95ead3b0e7bb1f06c5fba09..1f57f16bf20e07d8b17d4a0593c402f7b1c5c1d5 100644 --- a/docs/udelartex/tesis.lof +++ b/docs/udelartex/tesis.lof @@ -27,86 +27,87 @@ \addvspace {10\p@ } \contentsline {figure}{\numberline {6.1}{\ignorespaces Arquitectura diseñada.\relax }}{56}{figure.caption.69}% \contentsline {figure}{\numberline {6.2}{\ignorespaces Arquitectura diseñada para instalación Stein\relax }}{59}{figure.caption.70}% -\contentsline {figure}{\numberline {6.3}{\ignorespaces Acceso remoto al servidor renata.\relax }}{61}{figure.caption.71}% -\contentsline {figure}{\numberline {6.4}{\ignorespaces Túnel reverso y esquema de servidores.\relax }}{62}{figure.caption.72}% -\contentsline {figure}{\numberline {6.5}{\ignorespaces Salida a Internet en los nodos de Openstack.\relax }}{64}{figure.caption.73}% -\addvspace {10\p@ } -\addvspace {10\p@ } -\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{87}{figure.caption.99}% -\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.102}% -\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{91}{figure.caption.103}% -\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{93}{figure.caption.104}% -\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{94}{figure.caption.105}% -\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{94}{figure.caption.107}% -\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{95}{figure.caption.108}% -\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{96}{figure.caption.110}% -\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{102}{figure.caption.114}% -\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{103}{figure.caption.118}% -\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{104}{figure.caption.120}% -\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{108}{figure.caption.124}% -\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{109}{figure.caption.127}% -\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{110}{figure.caption.129}% -\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{111}{figure.caption.131}% -\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router fÃsico\relax }}{114}{figure.caption.135}% -\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{114}{figure.caption.136}% -\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{115}{figure.caption.139}% -\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{116}{figure.caption.141}% -\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{120}{figure.caption.142}% -\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{127}{figure.caption.145}% -\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{129}{figure.caption.146}% -\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{133}{figure.caption.147}% -\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{134}{figure.caption.148}% -\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{134}{figure.caption.150}% -\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{136}{figure.caption.151}% -\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{137}{figure.caption.153}% -\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{142}{figure.caption.157}% -\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{143}{figure.caption.161}% -\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{144}{figure.caption.163}% -\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{148}{figure.caption.167}% -\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{149}{figure.caption.170}% -\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{150}{figure.caption.172}% -\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{151}{figure.caption.174}% -\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router fÃsico\relax }}{154}{figure.caption.178}% -\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{154}{figure.caption.179}% -\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{155}{figure.caption.182}% -\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes fÃsicos funcionales\relax }}{156}{figure.caption.184}% -\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes fÃsicos luego de un fallo en uno de ellos\relax }}{156}{figure.caption.185}% -\addvspace {10\p@ } -\addvspace {10\p@ } -\addvspace {10\p@ } -\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{170}{figure.caption.191}% -\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{171}{figure.caption.192}% -\addvspace {10\p@ } -\addvspace {10\p@ } -\addvspace {10\p@ } -\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{213}{figure.caption.215}% -\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{214}{figure.caption.216}% -\addvspace {10\p@ } -\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{221}{figure.caption.230}% -\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{222}{figure.caption.232}% -\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{223}{figure.caption.233}% -\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{224}{figure.caption.235}% -\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{225}{figure.caption.237}% -\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{225}{figure.caption.238}% -\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{226}{figure.caption.240}% -\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{227}{figure.caption.241}% -\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{228}{figure.caption.243}% -\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{229}{figure.caption.244}% -\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{230}{figure.caption.246}% -\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{230}{figure.caption.247}% -\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{231}{figure.caption.248}% -\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{231}{figure.caption.250}% -\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{232}{figure.caption.252}% -\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{232}{figure.caption.254}% -\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{233}{figure.caption.256}% -\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{233}{figure.caption.257}% -\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{234}{figure.caption.258}% -\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{234}{figure.caption.259}% -\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{235}{figure.caption.260}% -\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{236}{figure.caption.261}% -\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{237}{figure.caption.262}% -\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{237}{figure.caption.263}% -\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{238}{figure.caption.264}% -\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{238}{figure.caption.265}% +\contentsline {figure}{\numberline {6.3}{\ignorespaces Diagrama con la distribución de los servicios.\relax }}{60}{figure.caption.71}% +\contentsline {figure}{\numberline {6.4}{\ignorespaces Acceso remoto al servidor renata.\relax }}{62}{figure.caption.72}% +\contentsline {figure}{\numberline {6.5}{\ignorespaces Túnel reverso y esquema de servidores.\relax }}{63}{figure.caption.73}% +\contentsline {figure}{\numberline {6.6}{\ignorespaces Salida a Internet en los nodos de Openstack.\relax }}{64}{figure.caption.74}% +\addvspace {10\p@ } +\addvspace {10\p@ } +\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{87}{figure.caption.100}% +\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.103}% +\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{91}{figure.caption.104}% +\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{93}{figure.caption.105}% +\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{94}{figure.caption.106}% +\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{94}{figure.caption.108}% +\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{95}{figure.caption.109}% +\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{96}{figure.caption.111}% +\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{102}{figure.caption.115}% +\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{103}{figure.caption.119}% +\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{104}{figure.caption.121}% +\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{108}{figure.caption.125}% +\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{109}{figure.caption.128}% +\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{110}{figure.caption.130}% +\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{111}{figure.caption.132}% +\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router fÃsico\relax }}{114}{figure.caption.136}% +\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{114}{figure.caption.137}% +\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{115}{figure.caption.140}% +\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{116}{figure.caption.142}% +\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{120}{figure.caption.143}% +\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{127}{figure.caption.146}% +\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{129}{figure.caption.147}% +\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{133}{figure.caption.148}% +\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{134}{figure.caption.149}% +\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{134}{figure.caption.151}% +\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{136}{figure.caption.152}% +\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{137}{figure.caption.154}% +\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{142}{figure.caption.158}% +\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{143}{figure.caption.162}% +\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{144}{figure.caption.164}% +\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{148}{figure.caption.168}% +\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{149}{figure.caption.171}% +\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{150}{figure.caption.173}% +\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{151}{figure.caption.175}% +\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router fÃsico\relax }}{154}{figure.caption.179}% +\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{154}{figure.caption.180}% +\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{155}{figure.caption.183}% +\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes fÃsicos funcionales\relax }}{156}{figure.caption.185}% +\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes fÃsicos luego de un fallo en uno de ellos\relax }}{156}{figure.caption.186}% +\addvspace {10\p@ } +\addvspace {10\p@ } +\addvspace {10\p@ } +\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{170}{figure.caption.192}% +\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{171}{figure.caption.193}% +\addvspace {10\p@ } +\addvspace {10\p@ } +\addvspace {10\p@ } +\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{213}{figure.caption.216}% +\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{214}{figure.caption.217}% +\addvspace {10\p@ } +\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{221}{figure.caption.231}% +\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{222}{figure.caption.233}% +\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{223}{figure.caption.234}% +\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{224}{figure.caption.236}% +\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{225}{figure.caption.238}% +\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{225}{figure.caption.239}% +\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{226}{figure.caption.241}% +\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{227}{figure.caption.242}% +\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{228}{figure.caption.244}% +\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{229}{figure.caption.245}% +\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{230}{figure.caption.247}% +\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{230}{figure.caption.248}% +\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{231}{figure.caption.249}% +\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{231}{figure.caption.251}% +\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{232}{figure.caption.253}% +\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{232}{figure.caption.255}% +\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{233}{figure.caption.257}% +\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{233}{figure.caption.258}% +\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{234}{figure.caption.259}% +\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{234}{figure.caption.260}% +\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{235}{figure.caption.261}% +\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{236}{figure.caption.262}% +\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{237}{figure.caption.263}% +\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{237}{figure.caption.264}% +\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{238}{figure.caption.265}% +\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{238}{figure.caption.266}% \addvspace {10\p@ } \contentsfinish diff --git a/docs/udelartex/tesis.out b/docs/udelartex/tesis.out index f84b40ea9d4fa47eb1ea6f7217476af0c2f3636c..5097e810176effc036e1065b8e61399eeb392106 100644 --- a/docs/udelartex/tesis.out +++ b/docs/udelartex/tesis.out @@ -80,11 +80,11 @@ \BOOKMARK [2][-]{subsection.8.5.1}{Layer 3 High Availability}{section.8.5}% 80 \BOOKMARK [0][-]{chapter.9}{Trabajo a futuro}{}% 81 \BOOKMARK [0][-]{chapter.10}{Conclusiones}{}% 82 -\BOOKMARK [0][-]{chapter*.189}{Referencias bibliogr\341ficas}{}% 83 -\BOOKMARK [0][-]{chapter*.189}{Glosario}{}% 84 -\BOOKMARK [0][-]{section*.190}{Ap\351ndices}{}% 85 +\BOOKMARK [0][-]{chapter*.190}{Referencias bibliogr\341ficas}{}% 83 +\BOOKMARK [0][-]{chapter*.190}{Glosario}{}% 84 +\BOOKMARK [0][-]{section*.191}{Ap\351ndices}{}% 85 \BOOKMARK [0][-]{appendix.Alph1}{Im\341genes}{}% 86 -\BOOKMARK [0][-]{section*.193}{Anexos}{}% 87 +\BOOKMARK [0][-]{section*.194}{Anexos}{}% 87 \BOOKMARK [0][-]{appendix.Anexo.1}{Instalaci\363n versi\363n Queens}{}% 88 \BOOKMARK [1][-]{section.Anexo.1.1}{Preparaci\363n de nodos}{appendix.Anexo.1}% 89 \BOOKMARK [1][-]{section.Anexo.1.2}{Configuraci\363n}{appendix.Anexo.1}% 90 diff --git a/docs/udelartex/tesis.pdf b/docs/udelartex/tesis.pdf index 97043f37e2bef07d4cbf4da47b00b00a0581ef35..673a20b43ff979fe8f81743b95c5a2c0fa42ee94 100644 Binary files a/docs/udelartex/tesis.pdf and b/docs/udelartex/tesis.pdf differ diff --git a/docs/udelartex/tesis.synctex.gz b/docs/udelartex/tesis.synctex.gz index 25a4caf4358d12ce03b58e5cd85a07dc4586a5fa..e760de8e63ce73656debb5ca795902c9bd6aa50d 100644 Binary files a/docs/udelartex/tesis.synctex.gz and b/docs/udelartex/tesis.synctex.gz differ diff --git a/docs/udelartex/tesis.toc b/docs/udelartex/tesis.toc index cad01eba248192c42edf8342cf669cba0232a146..010c50cbd68744785e551386d1c2c3f19e390774 100644 --- a/docs/udelartex/tesis.toc +++ b/docs/udelartex/tesis.toc @@ -91,7 +91,7 @@ \contentsline {subsection}{\numberline {6.2.1}Hardware utilizado}{60}{subsection.6.2.1}% \contentsline {subsection}{\numberline {6.2.2}Conexión remota hacia el servidor renata}{61}{subsection.6.2.2}% \contentsline {subsection}{\numberline {6.2.3}Especificaciones servidor renata}{62}{subsection.6.2.3}% -\contentsline {subsection}{\numberline {6.2.4}Acceso al exterior desde nodos}{63}{subsection.6.2.4}% +\contentsline {subsection}{\numberline {6.2.4}Acceso al exterior desde nodos}{64}{subsection.6.2.4}% \contentsline {chapter}{\numberline {7}Gestión del Datacenter}{65}{chapter.7}% \contentsline {section}{\numberline {7.1}Recuperación ante fallas}{65}{section.7.1}% \contentsline {subsection}{\numberline {7.1.1}Verificación general}{65}{subsection.7.1.1}% @@ -117,91 +117,91 @@ \contentsline {subsection}{\numberline {8.2.1}Escenario 1}{87}{subsection.8.2.1}% \contentsline {subsubsection}{\numberline {8.2.1.1}Análisis de componentes}{87}{subsubsection.8.2.1.1}% \contentsline {subsubsection}{\numberline {8.2.1.2}Análisis de tráfico}{90}{subsubsection.8.2.1.2}% -\contentsline {subparagraph}{Paso 1}{90}{section*.100}% -\contentsline {subparagraph}{Paso 2}{90}{section*.101}% -\contentsline {subparagraph}{Paso 3}{94}{section*.106}% -\contentsline {subparagraph}{Paso 4}{95}{section*.109}% +\contentsline {subparagraph}{Paso 1}{90}{section*.101}% +\contentsline {subparagraph}{Paso 2}{90}{section*.102}% +\contentsline {subparagraph}{Paso 3}{94}{section*.107}% +\contentsline {subparagraph}{Paso 4}{95}{section*.110}% \contentsline {subsection}{\numberline {8.2.2}Escenario 2}{96}{subsection.8.2.2}% \contentsline {subsubsection}{\numberline {8.2.2.1}Análisis de componentes}{96}{subsubsection.8.2.2.1}% \contentsline {subsubsection}{\numberline {8.2.2.2}Análisis de tráfico}{101}{subsubsection.8.2.2.2}% -\contentsline {subparagraph}{Paso 1}{101}{section*.111}% -\contentsline {subparagraph}{Paso 2}{102}{section*.112}% -\contentsline {subparagraph}{Paso 3}{102}{section*.113}% -\contentsline {subparagraph}{Paso 4}{102}{section*.115}% -\contentsline {subparagraph}{Paso 5}{103}{section*.116}% -\contentsline {subparagraph}{Paso 6}{103}{section*.117}% -\contentsline {subparagraph}{Paso 7}{103}{section*.119}% +\contentsline {subparagraph}{Paso 1}{101}{section*.112}% +\contentsline {subparagraph}{Paso 2}{102}{section*.113}% +\contentsline {subparagraph}{Paso 3}{102}{section*.114}% +\contentsline {subparagraph}{Paso 4}{102}{section*.116}% +\contentsline {subparagraph}{Paso 5}{103}{section*.117}% +\contentsline {subparagraph}{Paso 6}{103}{section*.118}% +\contentsline {subparagraph}{Paso 7}{103}{section*.120}% \contentsline {subsection}{\numberline {8.2.3}Escenario 3}{104}{subsection.8.2.3}% \contentsline {subsubsection}{\numberline {8.2.3.1}Análisis de componentes}{104}{subsubsection.8.2.3.1}% \contentsline {subsubsection}{\numberline {8.2.3.2}Análisis de tráfico}{107}{subsubsection.8.2.3.2}% -\contentsline {subparagraph}{Paso 1}{108}{section*.121}% -\contentsline {subparagraph}{Paso 2}{108}{section*.122}% -\contentsline {subparagraph}{Paso 3}{108}{section*.123}% -\contentsline {subparagraph}{Paso 4}{108}{section*.125}% -\contentsline {subparagraph}{Paso 5}{109}{section*.126}% -\contentsline {subparagraph}{Paso 6}{110}{section*.128}% -\contentsline {subparagraph}{Paso 7}{110}{section*.130}% +\contentsline {subparagraph}{Paso 1}{108}{section*.122}% +\contentsline {subparagraph}{Paso 2}{108}{section*.123}% +\contentsline {subparagraph}{Paso 3}{108}{section*.124}% +\contentsline {subparagraph}{Paso 4}{108}{section*.126}% +\contentsline {subparagraph}{Paso 5}{109}{section*.127}% +\contentsline {subparagraph}{Paso 6}{110}{section*.129}% +\contentsline {subparagraph}{Paso 7}{110}{section*.131}% \contentsline {subsection}{\numberline {8.2.4}Escenario 4}{111}{subsection.8.2.4}% \contentsline {subsubsection}{\numberline {8.2.4.1}Análisis de componentes}{111}{subsubsection.8.2.4.1}% \contentsline {subsubsection}{\numberline {8.2.4.2}Análisis de tráfico}{113}{subsubsection.8.2.4.2}% -\contentsline {subparagraph}{Paso 1}{113}{section*.132}% -\contentsline {subparagraph}{Paso 2}{113}{section*.133}% -\contentsline {subparagraph}{Paso 3}{113}{section*.134}% -\contentsline {subparagraph}{Paso 4}{114}{section*.137}% -\contentsline {subparagraph}{Paso 5}{114}{section*.138}% -\contentsline {subparagraph}{Paso 6}{115}{section*.140}% +\contentsline {subparagraph}{Paso 1}{113}{section*.133}% +\contentsline {subparagraph}{Paso 2}{113}{section*.134}% +\contentsline {subparagraph}{Paso 3}{113}{section*.135}% +\contentsline {subparagraph}{Paso 4}{114}{section*.138}% +\contentsline {subparagraph}{Paso 5}{114}{section*.139}% +\contentsline {subparagraph}{Paso 6}{115}{section*.141}% \contentsline {section}{\numberline {8.3}Open vSwitch}{115}{section.8.3}% \contentsline {subsubsection}{\numberline {8.3.0.1}Archivos de configuración}{117}{subsubsection.8.3.0.1}% \contentsline {subsection}{\numberline {8.3.1}Escenario 1}{120}{subsection.8.3.1}% \contentsline {subsubsection}{\numberline {8.3.1.1}Análisis de componentes}{120}{subsubsection.8.3.1.1}% \contentsline {subsubsection}{\numberline {8.3.1.2}Análisis de tráfico}{126}{subsubsection.8.3.1.2}% -\contentsline {subparagraph}{Paso 1}{126}{section*.143}% -\contentsline {subparagraph}{Paso 2}{127}{section*.144}% -\contentsline {subparagraph}{Paso 3}{134}{section*.149}% -\contentsline {subparagraph}{Paso 4}{136}{section*.152}% +\contentsline {subparagraph}{Paso 1}{126}{section*.144}% +\contentsline {subparagraph}{Paso 2}{127}{section*.145}% +\contentsline {subparagraph}{Paso 3}{134}{section*.150}% +\contentsline {subparagraph}{Paso 4}{136}{section*.153}% \contentsline {subsection}{\numberline {8.3.2}Escenario 2}{137}{subsection.8.3.2}% \contentsline {subsubsection}{\numberline {8.3.2.1}Análisis de componentes}{137}{subsubsection.8.3.2.1}% \contentsline {subsubsection}{\numberline {8.3.2.2}Análisis de tráfico}{141}{subsubsection.8.3.2.2}% -\contentsline {subparagraph}{Paso 1}{142}{section*.154}% -\contentsline {subparagraph}{Paso 2}{142}{section*.155}% -\contentsline {subparagraph}{Paso 3}{142}{section*.156}% -\contentsline {subparagraph}{Paso 4}{142}{section*.158}% -\contentsline {subparagraph}{Paso 5}{143}{section*.159}% -\contentsline {subparagraph}{Paso 6}{143}{section*.160}% -\contentsline {subparagraph}{Paso 7}{143}{section*.162}% +\contentsline {subparagraph}{Paso 1}{142}{section*.155}% +\contentsline {subparagraph}{Paso 2}{142}{section*.156}% +\contentsline {subparagraph}{Paso 3}{142}{section*.157}% +\contentsline {subparagraph}{Paso 4}{142}{section*.159}% +\contentsline {subparagraph}{Paso 5}{143}{section*.160}% +\contentsline {subparagraph}{Paso 6}{143}{section*.161}% +\contentsline {subparagraph}{Paso 7}{143}{section*.163}% \contentsline {subsection}{\numberline {8.3.3}Escenario 3}{144}{subsection.8.3.3}% \contentsline {subsubsection}{\numberline {8.3.3.1}Análisis de componentes}{144}{subsubsection.8.3.3.1}% \contentsline {subsubsection}{\numberline {8.3.3.2}Análisis de tráfico}{147}{subsubsection.8.3.3.2}% -\contentsline {subparagraph}{Paso 1}{147}{section*.164}% -\contentsline {subparagraph}{Paso 2}{147}{section*.165}% -\contentsline {subparagraph}{Paso 3}{148}{section*.166}% -\contentsline {subparagraph}{Paso 4}{148}{section*.168}% -\contentsline {subparagraph}{Paso 5}{148}{section*.169}% -\contentsline {subparagraph}{Paso 6}{150}{section*.171}% -\contentsline {subparagraph}{Paso 7}{150}{section*.173}% +\contentsline {subparagraph}{Paso 1}{147}{section*.165}% +\contentsline {subparagraph}{Paso 2}{147}{section*.166}% +\contentsline {subparagraph}{Paso 3}{148}{section*.167}% +\contentsline {subparagraph}{Paso 4}{148}{section*.169}% +\contentsline {subparagraph}{Paso 5}{148}{section*.170}% +\contentsline {subparagraph}{Paso 6}{150}{section*.172}% +\contentsline {subparagraph}{Paso 7}{150}{section*.174}% \contentsline {subsection}{\numberline {8.3.4}Escenario 4}{151}{subsection.8.3.4}% \contentsline {subsubsection}{\numberline {8.3.4.1}Análisis de componentes}{151}{subsubsection.8.3.4.1}% \contentsline {subsubsection}{\numberline {8.3.4.2}Análisis de tráfico}{152}{subsubsection.8.3.4.2}% -\contentsline {subparagraph}{Paso 1}{153}{section*.175}% -\contentsline {subparagraph}{Paso 2}{153}{section*.176}% -\contentsline {subparagraph}{Paso 3}{153}{section*.177}% -\contentsline {subparagraph}{Paso 4}{155}{section*.180}% -\contentsline {subparagraph}{Paso 5}{155}{section*.181}% -\contentsline {subparagraph}{Paso 6}{155}{section*.183}% +\contentsline {subparagraph}{Paso 1}{153}{section*.176}% +\contentsline {subparagraph}{Paso 2}{153}{section*.177}% +\contentsline {subparagraph}{Paso 3}{153}{section*.178}% +\contentsline {subparagraph}{Paso 4}{155}{section*.181}% +\contentsline {subparagraph}{Paso 5}{155}{section*.182}% +\contentsline {subparagraph}{Paso 6}{155}{section*.184}% \contentsline {section}{\numberline {8.4}Comparativa de drivers}{155}{section.8.4}% \contentsline {section}{\numberline {8.5}Funcionalidades avanzadas}{155}{section.8.5}% \contentsline {subsection}{\numberline {8.5.1}Layer 3 High Availability}{155}{subsection.8.5.1}% \contentsline {chapter}{\numberline {9}Trabajo a futuro}{157}{chapter.9}% \contentsline {chapter}{\numberline {10}Conclusiones}{159}{chapter.10}% -\contentsline {chapter}{Referencias bibliográficas}{160}{chapter*.189}% -\contentsline {chapter}{Glosario}{167}{chapter*.189}% -\contentsline {chapter}{\textbf {Apéndices}}{168}{section*.190}% +\contentsline {chapter}{Referencias bibliográficas}{160}{chapter*.190}% +\contentsline {chapter}{Glosario}{167}{chapter*.190}% +\contentsline {chapter}{\textbf {Apéndices}}{168}{section*.191}% \ttl@change@i {\@ne }{chapter}{13pt}{}{ Apéndice\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax \ttl@change@v {chapter}{}{}{}\relax \contentsline {chapter}{\numberline {1}Imágenes}{169}{appendix.Alph1}% \ttl@change@i {\@ne }{chapter}{0pt}{\vspace *{0.45cm}}{\thecontentslabel \quad }{}{\bfseries \hfill \contentspage }\relax \ttl@change@v {chapter}{}{}{}\relax -\contentsline {chapter}{\textbf {Anexos}}{172}{section*.193}% +\contentsline {chapter}{\textbf {Anexos}}{172}{section*.194}% \ttl@change@i {\@ne }{chapter}{13pt}{}{ Anexo\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax \ttl@change@v {chapter}{}{}{}\relax \contentsline {chapter}{\numberline {1}Instalación versión Queens}{173}{appendix.Anexo.1}%