Editorial improvements requested in r7 review https://review.opendev.org/c/starlingx/docs/+/861840 Change-Id: Ie5a2d8223e302703402a934a10051bd7dea6a914 Signed-off-by: Elisamara Aoki Goncalves <elisamaraaoki.goncalves@windriver.com>
6.5 KiB
Configure PCI SR-IOV Ethernet Interface Devices
An Ethernet interface is a physical Ethernet that implements hardware-based virtualization mechanisms to expose multiple virtual network interfaces that can be used by one or more virtual machines simultaneously.
The -SIG Single Root I/O Virtualization and Sharing () specification defines a standardized mechanism to create individual virtual Ethernet devices from a single physical Ethernet interface. For each exposed virtual Ethernet device, formally referred to as a , the interface provides separate management memory space, work queues, interrupts resources, and streams, while utilizing common resources behind the host interface. Each therefore has direct access to the hardware and can be considered to be an independent Ethernet interface.
When compared with a Passthrough Ethernet interface, a Ethernet interface:
- Provides benefits similar to those of a Passthrough Ethernet interface, including lower latency packet processing.
- Scales up more easily in a virtualized environment by providing multiple VFs that can be attached to multiple virtual machine interfaces.
- Shares the same limitations, including the lack of support for , , , and live migration.
- Has the same requirements regarding the configuration of the access switches.
- Provides a similar configuration workflow when used on .
The configuration of a Ethernet interface is almost identical to
Configure PCI Passthrough Ethernet Interfaces
<configure-pci-passthrough-ethernet-interfaces>
and will be
detailed bellow.
Configure a on a host and request it for an instance at boot/create time.
- To use passthrough or devices, you must have Intel VT-x and Intel VT-d features enabled in the BIOS.
- The exercise assumes that the underlying data network group0-data0 exists already, and that ID 10 is a valid segmentation ID assigned to project1.
Log in as the admin user to the .
Lock the compute node you want to configure.
Configure the Ethernet interface to be used as a passthrough interface. You can do this using Horizon or the CLI.
Using Horizon:
Select Admin > Platform > Host Inventory from the left-hand pane.
Select the Hosts tab.
Click the name of the compute host.
Select the Interfaces tab.
Click the Edit Interface button associated with the interface you want to configure.
The Edit Interface dialog appears.
Select pci-sriov, from the Interface Class drop-down, and then select the data network to attach the interface.
(Optional) You may also need to change the .
Using the CLI:
Assign the
pci-sriov
class to the interface.~(keystone_admin)$ system host-if-modify -c pci-sriov compute-0 enp0s3 ~(keystone_admin)$ system interface-datanetwork-assign compute-0 <enp0s3_interface_uuid> <group0_data0_data_network_uuid>
Create the
net0
project network.Log in as the admin user to the .
Select Admin > Network > Networks, select the Networks tab, and then click Create Network. Fill in the Create Network dialog box as illustrated below. You must ensure that:
- project1 has access to the project network, either assigning it as the owner, as in the illustration (using Project), or by enabling the shared flag.
- The segmentation ID is set to 10.
The segmentation ID of the project network(s) used is more significant here since this identifies the particular of the interface.
Click the Next button to proceed to the Subnet tab.
Click the Next button to proceed to the Subnet Details tab.
Configure the access switch. Refer to your documentation for more details.
Log in as the admin user to the .
Configure the physical port on the access switch used to connect to Ethernet interface
enp0s3
as an access port with default ID of 10. Traffic across the connection is therefore untagged, and effectively integrated into the targeted project network.You can also use a trunk port on the access switch so that it handles tagged packets as well. However, this opens the possibility for guest applications to join other project networks using tagged packets with different IDs, which might compromise the security of the system. See :
L2 Access Switches <network-planning-l2-access-switches>
for other details regarding the configuration of the access switch.Unlock the compute node.
Create a neutron port with a of type
direct-physical
.Set up the environment and determine the correct network to use with the port.
~(keystone_admin)$ source /etc/platform/openrc ~(keystone_admin)$ OS_AUTH_URL=http://keystone.openstack.svc.cluster.local/v3 ~(keystone_admin)$ openstack network list | grep net0 ~(keystone_admin)$ openstack port create --network <uuid_of_net0> --vnic-type direct <port_name>
You have now created a port to be used when launching the server in the next step.
Launch the virtual machine specifying the of the port previously created.
Note
You will need to source to the same project selected in the
Create Network net0 <create-the-net0-project-network>
step.Specify the port uuid created.
~(keystone_admin)$ openstack server create --flavor <flavor_name> --image <image_name> --nic port-id=<port_uuid> <name>
For more information, see the Neutron documentation at: https://docs.openstack.org/neutron/train/admin/config-sriov.html.