Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons! latest RDO questions

  • What details actually should be in the " instackenv.json " file during Instack-Overcloud deployment in a VM ?? - Posted on 25 April 2015 | 3:05 am
  • Security Group Not Working - Posted on 24 April 2015 | 2:10 pm
  • neutron-ovs-cleanup failure on juno rdo lacp bonded port - Posted on 24 April 2015 | 3:02 am
  • Installation fails on CentOS 7 - Posted on 24 April 2015 | 12:57 am
  • Can Openstack juno installed using 2 system using one NIC card on each ? - Posted on 23 April 2015 | 4:42 pm
  • RDO Kilo snapshot setup issues on CentOS 7.1 - Posted on 23 April 2015 | 4:07 am
  • openvswitch with rdo repo on centos 7 crash - Posted on 22 April 2015 | 9:00 pm
  • flat_interface public_interface on same ethernet - Posted on 21 April 2015 | 11:02 am
  • [Mirantis] Fuel OpenStack Web UI enless loading - Posted on 21 April 2015 | 5:43 am
  • Help Openstack allinone Icehouse instance is not connecting through externally - Posted on 20 April 2015 | 1:01 am
  • Juno installation errors on RHEL 6.5 (subscribed) - Posted on 17 April 2015 | 5:41 am
  • RDO unable to boot VM with disk size specified - Posted on 16 April 2015 | 6:20 am
  • Managing volume: Do I have to use a whole disk for Cinder? - Posted on 31 March 2015 | 4:16 pm
  • You should rebuild using libgmp >= 5 to avoid timing attack vulnerability. _warn("Not using mpz_powm_sec. You should rebuild using libgmp >= 5 to avoid timing attack vulnerability.", PowmInsecureWarning) - Posted on 29 April 2014 | 4:45 am
  • Ingress issue from spawned instance to compute host
    • I've used packstack for a allinone install on a VM (VMware Fusion), grizzly, no quantum networking.

      My problem is that a spawned instance cannot communicate with the openstack compute API or any other tcp/http service on the single controller/compute node (I have no problem pinging the spawned instance or ssh'ing to it). This is necessary because I'm installing cloud foundry on top of openstack ( and there is a step where a bosh (like puppet) instance is spawned and must coordinate the install of cloud foundry services across a number of additional spawned instances, which requires use of the Compute API (these services requires communication with controller/compute node as well).

      On the spawned instance a process attempts to send a http request to the compute API running on, but gets a EHOSTUNREACH no route to host error, error Error 100: Unable to connect to the OpenStack Compute API.

      My controller/compute node ( is Fedora 18, is using a static ip and has named configured for DNS.

      I can log on to spawned instance and verify that:

      -- curl fails to controller/compute node:

      vcap@bm-76db0be2-7803-47da-9d8a-1848b5e024e0:~$ curl
      curl: (7) couldn't connect to host

      nmap shows only ports 22 and 53 open on controller/compute host

      vcap@bm-76db0be2-7803-47da-9d8a-1848b5e024e0:~$ nmap -PN

      Starting Nmap 5.00 ( ) at 2013-09-21 08:42 UTC
      Interesting ports on
      Not shown: 998 filtered ports
      22/tcp open ssh
      53/tcp open domain

      Nmap done: 1 IP address (1 host up) scanned in 5.33 seconds

      -- the spawned instance can ping fine.

      -- the spawned instance can successfully connect to http services running externally ( or another machine on my network); i.e. curl and curl gets a response for example.

      I was able to isolate that iptables on is blocking traffic and if I add a rule to allow all tcp traffic to be accepted by I can temporarily get things to work (nmap works, curl works, my install proceeds a bit further). Here's the command I run on controller/compute node (host0/

      [root@host0 cf-release(keystone_admin)]# iptables -A nova-network-INPUT -i br100 -p tcp -m tcp -j ACCEPT
      [root@host0 cf-release(keystone_admin)]# iptables --list-rules | grep nova-network-INPUT -A nova-network-INPUT -i br100 -p udp -m udp --dport 67 -j ACCEPT
      -A nova-network-INPUT -i br100 -p tcp -m tcp --dport 67 -j ACCEPT
      -A nova-network-INPUT -i br100 -p udp -m udp --dport 53 -j ACCEPT
      -A nova-network-INPUT -i br100 -p tcp -m tcp --dport 53 -j ACCEPT
      -A nova-network-INPUT -i br100 -p tcp -m tcp -j ACCEPT

      and resulting success using curl on spawned instance: vcap@bm-76db0be2-7803-47da-9d8a-1848b5e024e0:/var/vcap/store/director/tasks/1$ curl
      {"version": {"status": "stable", "updated": "2013-03-06T00:00:00Z",...}]}}

      The problem is that that rule will disappear when an instance is being spawned and I believe when nova networking is restarted, so I keep running into this issue during the install process and need a permanent fix (iptables save doesn't make a difference). I'm basically setting up a POC environment at home, so would accept non-secure fixes.

      Note that the nova security groups and rules don't seem to have any impact on this, as I'm not seeing any ingress specific rules (looks like that's not supported in nova networking) and have tried adding rules for specific ports (tcp/80 for example) and seen no impact.

      I've also tried the Noop firewall as you can see in nova.conf below, and tried net.ipv4.conf.all.rp_filter = 0 net.ipv4.conf.default.rp_filter = 0.

      Any guidance would be much appreciated! In general, I can see that spawned instances shouldn't be allowed to communicate with compute/controller node(s) by default, but it's not clear to me why it's not easier to configure access if desired. Maybe I'm missing something?

      here's my config: