You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@cloudstack.apache.org by GitBox <gi...@apache.org> on 2020/02/06 22:43:49 UTC

[GitHub] [cloudstack] andrijapanicsb edited a comment on issue #3732: [Vmware] Enable PVLAN support on L2 networks

andrijapanicsb edited a comment on issue #3732: [Vmware] Enable PVLAN support on L2 networks
URL: https://github.com/apache/cloudstack/pull/3732#issuecomment-583147095
 
 
   TestID | Test Name | Steps | Expected Results | Status
   -- | -- | -- | -- | --
     | Backward compatibility API   syntax check | (API command expected to   succeed) |   |  
   1 | Create a promiscuous PVLAN   setup using old API syntax (no 'isolatedpvlantype' parameter, but identical   values for ‘vlan’ and ‘isolatedpvlan’ parameters) | Execute the ‘createNetwork’   API via CloudMonkey, using default ‘DefaultL2NetworkOfferingVlan’ and passing   the PVLAN parameters as below:       vlan=1050   isolatedpvlan=1050 | A network is created, and   when attached to a running VM, the appropriate Port Group is created on   dvSwitch1 | Passed
   2 | Create an isolated PVLAN   setup using old API syntax (no 'isolatedpvlantype' parameter, but different   values for ‘vlan’ and ‘isolatedpvlan’ parameters) | …   vlan=1050   isolatedpvlan=150 | A network is created, and   when attached to a running VM, the appropriate Port Group is created on   dvSwitch1 | Passed
     | Positive checks | (API command expected to   succeed) |   |  
   3 | Primary 1020, Isolated   Secondary 1021 | …   vlan=1020   isolatedpvlan=1021 isolatedpvlantype=isolated | A network is created, and   when attached to a running VM, the appropriate Port Group is created on   dvSwitch1 | Passed
   4 | Primary 1020, Secondary   Promiscuous (1020) | …   vlan=1020   isolatedpvlan=1020 isolatedpvlantype=promiscuous | A network is created, and   when attached to a running VM, the appropriate Port Group is created on   dvSwitch1 | Passed
   5 | Primary 1020, Secondary   Community 1022 | …   vlan=1020   isolatedpvlan=1022 isolatedpvlantype=community | A network is created, and   when attached to a running VM, the appropriate Port Group is created on   dvSwitch1 | Passed
   6 | Create additional Secondary   Community 1023, on the same Primary 1020 | …   vlan=1020   isolatedpvlan=1023 isolatedpvlantype=community | A network is created, and   when attached to a running VM, the appropriate Port Group is created on   dvSwitch1 | Passed
   7 | Create a promiscuous   network without using   ‘isolatedpvlan’ parameter | …   vlan=1060   isolatedpvlantype=promiscuous | A network is created, and   when attached to a running VM, the appropriate Port Group is created on   dvSwitch1 | Passed
     | Negative checks | (API command expected to fail) |   | Passed
   8 | ‘isolatedpvlan’ parameter   missing, while ‘isolatedpvlantype’ != promiscuous | …   vlan=1070 isolatedpvlantype=isolated | API call should fail:       Error: (HTTP 431, error   code 4350) Private VLAN ID has not been set, therefore Promiscuous type is   expected | Passed
   9 | ‘isolatedpvlan’ parameter   missing, while ‘isolatedpvlantype’ != promicuous | …   vlan=1070   isolatedpvlantype=community | API call should fail:       Error: (HTTP 431, error   code 4350) Private VLAN ID has not been set, therefore Promiscuous   type is expected | Passed
   10 | Create identical PVLAN   setup that already exist, Primary 1020 and Secondary Promiscuous (1020) | …   vlan=1020   isolatedpvlan=1020 isolatedpvlantype=promiscuous | API call should fail:       Error: (HTTP 431, error   code 4350) Network with primary vlan 1020 and secondary vlan 1020 type   Promiscuous already exists or overlaps with other network pvlans in zone 1 | Passed
   11 | Create identical PVLAN   setup that already exist, Primary 1020 and using Secondary Isolated 1022 (that   is the value of an existing Secondary Community) | …   vlan=1020   isolatedpvlan=1022 isolatedpvlantype=isolated | API call should fail:       Error: (HTTP 431, error   code 4350) Network with primary vlan 1020 and secondary vlan 1022 type   Isolated already exists or overlaps with other network pvlans in zone 1 | Passed
   12 | Create identical PVLAN   setup that already exist, Primary 1020 and using identical Secondary   Community (1022 or 1023) | …   vlan=1020   isolatedpvlan=1023 isolatedpvlantype=community | API call should fail:       Error: (HTTP 431, error   code 4350) Network with primary vlan 1020 and secondary vlan 1023 type   Community already exists or overlaps with other network pvlans in zone 1 | Passed
   13 | Create identical PVLAN   setup that already exist, Primary 1020 and using Secondary Community 1021 (that   is the value of an existing Secondary Isolated) | …   vlan=1020   isolatedpvlan=1021 isolatedpvlantype=community | API call should fail:       Error: (HTTP 431, error   code 4350) Network with primary vlan 1020 and secondary vlan 1021 type   Community already exists or overlaps with other network pvlans in zone 1 | Passed
   14 | Create   "overlapping" PVLAN setup, using already used Primary 1020, but   different/unique Secondary Isolated | …   vlan=1020   isolatedpvlan=1033 isolatedpvlantype=isolated | API call should fail:       Error: (HTTP 431, error   code 4350) Network with primary vlan 1020 and secondary vlan 1033 type   Isolated already exists or overlaps with other network pvlans in zone 1 | Passed
   15 | Not testing using already   used Primary 1020, but different/unique Community, since it will work by   design | NA | NA | NA
   16 | Create   "overlapping" PVLAN setup, using unique/new Primary 1030, but same   Isolated 1021 that is used already | …   vlan=1030   isolatedpvlan=1021 isolatedpvlantype=isolated | API call should fail:       Error: (HTTP 431, error   code 4350) Network with primary vlan 1030 and secondary vlan 1021 type   Isolated already exists or overlaps with other network pvlans in zone 1 | Passed
   17 | Create   "overlapping" PVLAN setup, using unique/new Primary 1030, but same   Community 1023 that is used already | …   vlan=1030   isolatedpvlan=1023 isolatedpvlantype=community | API call should fail:       Error: (HTTP 431, error   code 4350) Network with primary vlan 1030 and secondary vlan 1023 type   Community already exists or overlaps with other network pvlans in zone 1 | Passed
   18 | (VLANs 960-980 configured   as reserved for the Physical network guest traffic)         Confirm that the Primary   VLAN overlap check is in place | …    vlan=979 isolatedpvlan=980   isolatedpvlantype=community | API call should fail:       Error: (HTTP 431, error   code 4350) The VLAN tag 979 is already being used for dynamic vlan   allocation for the guest network in zone ref-trl-374-v-M7-apanic | Passed
   19 | (VLANs 960-980 configured   as reserved for the Physical network guest traffic)         Confirm that the Secondary   VLAN overlap check is in place | …   vlan=988 isolatedpvlan=980   isolatedpvlantype=community | API call should fail:       Error: (HTTP 431, error   code 4350) The VLAN tag 980 is already being used for dynamic vlan allocation   for the guest network in zone ref-trl-374-v-M7-apanic | Passed
   20 | Create PVLAN setup where   Promiscuous Secondary VLAN has value different than the Primary VLAN | …   vlan=1040   isolatedpvlan=1044 isolatedpvlantype=promiscuous | API call should fail:       Error: (HTTP 431, error   code 4350) Private VLAN type is set to Promiscouos, but VLAN ID and Secondary   VLAN ID differ | Passed
   21 | Create PVLAN setup where Isolated   Secondary VLAN has the same value as the Primary VLAN | …   vlan=1040   isolatedpvlan=1040 isolatedpvlantype=isolated | API call should fail:       Error: (HTTP 431, error   code 4350) Private VLAN type is set to Isolated, but VLAN ID and Secondary   VLAN ID are equal | Passed
   22 | Create PVLAN setup where Community   Secondary VLAN has the same value as the Primary VLAN | …   vlan=1040   isolatedpvlan=1040 isolatedpvlantype=community | API call should fail:       Error: (HTTP 431, error   code 4350) Private VLAN type is set to Community, but VLAN ID and Secondary   VLAN ID are equal | Passed
     | Positive checks    on second Physical network | (API command expected to   succeed) |   |  
   23 | Confirm it’s possible to   create an identical PVLAN setup on second Physical network (dvSwitch2) using   Primary 1020 and Secondary Isolated 1021, that already exists on the first   Physical network (dvSwitch1) | Ensure to have another/additional   Physical network and add "Guest" traffic type with a reserved range   of VLAN IDs for guest networks. Set the same tag on both the Physical network   and the ‘DefaultL2NetworkOfferingVlan’ network offering, to ensure that the   new guest network will be created on this new Physical network.   Repeat the test No.3 –   creating the PVLAN setup using the same Primary VLAN 1020 and Secondary   Isolated VLAN 1021, that already exists on the original/different Physical   network      …   vlan=1020   isolatedpvlan=1021 isolatedpvlantype=isolated | A network is created, and   when attached to a running VM, the appropriate Port Group is created on   dvSwitch2 | Passed
     | VM ingestion of   PVLAN-enabled VMs | (API command expected to   succeed) |   |  
   24 | Import VM with a PVLAN   network setup (single NIC, Promiscuous), with explicitly assigning NIC to an   ACS L2 network | Have a stopped VM with a   single NIC on the vSphere Port Group "net2000-p2000" (Primary VLAN   2000, Secondary Promiscuous VLAN 2000).    Create an L2 PVLAN network in CloudStack with the same combination of Primary   and Secondary VLANs.    Import the VM by explicitly stating the destination ACS network for the NIC   of the VM. Start the VM. | VM is imported and start   successfully, while the NIC is moved from the "net2000-p2000" to   the new port groups (with identical PVLAN setup) created by ACS   "cloud.guest.2000.s2000.200.1-dvSwitch1" | Passed
   25 | Import VM with a PVLAN   network setup (single NIC, Isolated), with auto-assigning NIC to an ACS L2   network. | Have a running VM with a   single NIC on the vSphere Port Group "net2000-i2001" (Primary VLAN   2000, Secondary Isolated VLAN 2001).    Create an L2 PVLAN network in CloudStack with the same combination of Primary   and Secondary VLANs.    Import the VM without explicitly stating the destination ACS network for the   NIC of the VM. Stop and start the VM. | VM is imported to the   correct ACS network and then stopped and started successfully. VM’s NIC is   moved from the "net2000-i2001" to the new port groups (with   identical PVLAN setup) created by ACS   "cloud.guest.2000.s2001.200.1-dvSwitch1" | Passed
   26 | Import VM with a PVLAN   network setup (4 NICs, different PVLAN setup), with auto-assigning NICs to   ACS L2 networks | Have a running VM with a 4   NIC on the vSphere Port Groups "net2000-c2003"(Primary VLAN 2000,   Secondary Community VLAN 2003), "net2000-c2002"(Primary VLAN 2000,   Secondary Community VLAN 2002), "net2000-i2001"(Primary VLAN 2000,   Secondary Isolated VLAN 2001) and "net2000-p2000"(Primary VLAN   2000, Secondary Promiscuous VLAN 2000).    Create 4 x L2 PVLAN network in CloudStack with the same combination of   Primary and Secondary VLANs the existing Port Groups have.    Import the VM without explicitly stating destination ACS networks for the   NICs of the VM. Stop and start the VM. | VM is imported to the   correct ACS networks and then stopped and started successfully. VM's NICs are   moved from the original Port Groups to the new ones(with respectively   identical PVLAN setup) created by ACS i.e.   "cloud.guest.2000.s2003.200.1-dvSwitch1",   "cloud.guest.2000.s2002.200.1-dvSwitch1",   "cloud.guest.2000.s2001.200.1-dvSwitch1" and   "cloud.guest.2000.s2000.200.1-dvSwitch1". | Passed
   
   [images missing during copy/paste]

----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
users@infra.apache.org


With regards,
Apache Git Services