Changed paths to avoid '..', which breaks symlinks in newer versions of sphinx. Consolidated installation include files under /_includes. Prefixed r5 versions with 'r5_' Moved files that are used up/down, but at different paths under /shared/_includes and /shared/figures Move two include files to /_includes Moved addtional images to /shared/figures/... Required for DS platform builds. Signed-off-by: Ron Stone <ronald.stone@windriver.com> Change-Id: Ia38f4205c5803b3d1fc043e6c59617c34a4e5cbd Signed-off-by: Ron Stone <ronald.stone@windriver.com>
6.8 KiB
Configure PCI Passthrough Ethernet Interfaces
A passthrough Ethernet interface is a physical Ethernet on a compute node to which a virtual machine is granted direct access. This minimizes packet processing delays but at the same time demands special operational considerations.
You can specify interfaces when you launch an instance.
Note
To use passthrough or devices, you must have Intel VT-x and Intel VT-d features enabled in the BIOS.
The exercise assumes that the underlying data network group0-data0 exists already, and that ID 10 is a valid segmentation ID assigned to project1.
Log in as the admin user to the interface.
Lock the compute node you want to configure.
Configure the Ethernet interface to be used as a PCI passthrough interface.
- Select Admin > Platform > Host Inventory from the left-hand pane.
- Select the Hosts tab.
- Click the name of the compute host.
- Select the Interfaces tab.
- Click the Edit Interface button associated with the interface you want to configure.
The Edit Interface dialog appears.
Select pci-passthrough, from the Interface Class drop-down, and then select the data network to attach the interface.
You may also need to change the .
The interface can also be configured from the as illustrated below:
~(keystone_admin)$ system host-if-modify -c pci-passthrough compute-0 enp0s3 ~(keystone_admin)$ system interface-datanetwork-assign compute-0 <enp0s3_interface_uuid> <group0_data0_data_network_uuid>
Create the net0 project network
Select Admin > Network > Networks, select the Networks tab, and then click Create Network. Fill in the Create Network dialog box as illustrated below. You must ensure that:
- project1 has access to the project network, either assigning it as the owner, as in the illustration (using Project), or by enabling the shared flag.
- The segmentation ID is set to 10.
Click the Next button to proceed to the Subnet tab.
Click the Next button to proceed to the Subnet Details tab.
Configure the access switch. Refer to the OEM documentation to configure the access switch.
Configure the physical port on the access switch used to connect to Ethernet interface enp0s3 as an access port with default ID of 10. Traffic across the connection is therefore untagged, and effectively integrated into the targeted project network.
You can also use a trunk port on the access switch so that it handles tagged packets as well. However, this opens the possibility for guest applications to join other project networks using tagged packets with different IDs, which might compromise the security of the system. See :
L2 Access Switches <network-planning-l2-access-switches>
for other details regarding the configuration of the access switch.Unlock the compute node.
Create a neutron port with a type, direct-physical.
The neutron port can also be created from the , using the following command. First, you must set up the environment and determine the correct network to use with the port.
~(keystone_admin)$ source /etc/platform/openrc ~(keystone_admin)$ OS_AUTH_URL=http://keystone.openstack.svc.cluster.local/v3 ~(keystone_admin)$ openstack network list | grep net0 ~(keystone_admin)$ openstack port create --network <uuid_of_net0> --vnic-type direct-physical <port_name>
You have now created a port to be used when launching the server in the next step.
Launch the virtual machine, specifying the port uuid created in Step 7.
Note
You will need to source to the same project selected in the Create Network 'net0' in step 4.
~(keystone_admin)$ openstack server create --flavor <flavor_name> --image <image_name> --nic port-id=<port_uuid> <name>
For more information, see the Neutron documentation at: https://docs.openstack.org/neutron/train/admin/config-sriov.html.
The new virtual machine instance is up now. It has a PCI passthrough connection to the net0 project network identified with ID 10.
partner
- start-after
-
warning-text-begin
- end-before
-
warning-text-end
Access switches must be properly configured to ensure that virtual machines using -passthrough or Ethernet interfaces have the expected connectivity. In a common scenario, the virtual machine using these interfaces connects to external end points only, that is, it does not connect to other virtual machines in the same cluster. In this case:
- Traffic between the virtual machine and the access switch can be tagged or untagged.
- The connecting port on the access switch is part of a port-based .
partner
- start-after
-
vlan-bullet-1-begin
- end-before
-
vlan-bullet-1-end
- The port-based provides the required connectivity to external switching and routing equipment needed by guest applications to establish connections to the intended end points.
For connectivity to other virtual machines in the cluster the following configuration is also required:
- The ID used for the project network, 10 in this example, and the default port ID of the access port on the switch are the same. This ensures that incoming traffic from the virtual machine is tagged internally by the switch as belonging to ID 10, and switched to the appropriate exit ports.
partner
- start-after
-
vlan-bullet-2-begin
- end-before
-
vlan-bullet-2-end
partner
- start-after
-
vlan-bullet-3-begin
- end-before
-
vlan-bullet-3-end