Sponsored Content
Operating Systems Solaris LDOM Solaris 11 add Network vsw (Virtual switch) Post 303009294 by Peasant on Tuesday 12th of December 2017 09:53:29 AM
Old 12-12-2017
Glad you got it working.

A couple of things you should notice.

You only need VLAN (dladm create-vlan) interface for the hypervisor IP address.
I would recommend using seperate VLAN id for hypervisor ip address (security wise).

Creating VSW with name of virtual machine is not proper naming.

Human is for instance : lab-vsw0, prod0-vsw or similar descriptive name.
You will use that virtual switch for other machines as well, so naming it after one ldom is not so straightforward.

Be careful about naming in Oracle VM server hypervisor, it will allow you to name anything you like as you like it.
When you have a lot of machines, naming policy will save you extra investigation what is mapped where (disks, vsw to ldom etc.)

Hope that helps
Regards
Peasant.
 

9 More Discussions You Might Find Interesting

1. Linux

Does a network switch behaves as webserver

Hi, I have a question on web servers and network switches. Why a network switch should support certificate management, that means generating public and private keys... installing a certificate etcetra. Regards Chaitanya. :b: (4 Replies)
Discussion started by: chaitus.28
4 Replies

2. IP Networking

2 WAN connections on 1 switch/network

I want to know potential problems with the following scenario OR if it is an ok way to have my network setup: I have 2 WAN connections to the internet. I have each WAN connection plugged into its own router. Router DD-WRT is gateway for servers (192.0.10.50). Router Tomato is gateway for pc's... (1 Reply)
Discussion started by: herot
1 Replies

3. Solaris

Change hostID of Solaris 10 virtual/guest machine installed by Virtual Box 4.1.12 on Windows-XP host

Trying to set or modify the randomly set hostID of a Solaris 10 virtual/guest machine that I installed on a Windows-XP host machine (using Virtual Box 4.1.12). I was able to set/modify the hostname of the Solaris 10 virtual/guest machine during installation as well as via the Virtual Box... (4 Replies)
Discussion started by: Matt_VB
4 Replies

4. Solaris

Network Config on Zone in a Guest LDOM

Solaris for Sparc 11.1 with the latest patches. Created a Guest LDOM with two vnet's net0 and net1, installed a guest whole root, ip exclusive zone that I want to be able to utilize DHCP. I have been able to create the zone but unable to get it to boot because I am unable to assign an anet to it.... (4 Replies)
Discussion started by: os2mac
4 Replies

5. Solaris

Virtual disks are not showing up in LDom

I have an Oracle VM set up with 1 virtual disk. I am trying to add 2 new disks to it. I was able to successfully add 1 (it appears when I run "format" in the VM) but when I add the second and third disks they do not appear in my VM. Here are the commands I ran: ldm add-vdsdev... (3 Replies)
Discussion started by: unblockable
3 Replies

6. Solaris

Virtual Switch in Solaris LDOM

Hi, Our existing environment is having primary domain and 3 guest domains are running over it. See the attached image. Now we want to add a new primary virtual switch and move LDOM3 to be connected with new primary switch. So, I am not sure how to achieve this because. If I remove the... (7 Replies)
Discussion started by: praveensharma21
7 Replies

7. UNIX for Beginners Questions & Answers

How to create a virtual switch from 2x10g card to 4 Ldoms?

Hello Guys, Can some help me with a configuration from 2x10g cards to 4 Ldoms and a Vlan configuration, Solaris 11 dladm show-phys LINK MEDIA STATE SPEED DUPLEX DEVICE net0 Ethernet up 1000 full ixgbe0 net1 Ethernet ... (2 Replies)
Discussion started by: roly
2 Replies

8. UNIX for Beginners Questions & Answers

Solaris 11 LDOM guest network not working

I'm really stuck here. I've created an LDOM on a SPARC T4-1 with Solaris 11.4 to run a copy of Linux for SPARC. I got the Linux ISO installed and Linux itself installed and booted OK. The only thing is is that there's no networking available in the Linux guest. This question is basically the... (7 Replies)
Discussion started by: Michele31416
7 Replies

9. Solaris

Solaris LDOM IP conflict

I have a Sun T4-1 running Solaris 11.4 with a static IP 192.168.0.183. On this machine is a Solaris 10 LDOM with a static IP of 192.168.0.78. The other day I had to stop the LDOM to do a memory reconfigure. When I rebooted it I got an error that the IP 192.168.0.78 was already in use and so... (4 Replies)
Discussion started by: Michele31416
4 Replies
SLAPD-RELAY(5)							File Formats Manual						    SLAPD-RELAY(5)

NAME
slapd-relay - relay backend to slapd SYNOPSIS
/etc/openldap/slapd.conf DESCRIPTION
The primary purpose of this slapd(8) backend is to map a naming context defined in a database running in the same slapd(8) instance into a virtual naming context, with attributeType and objectClass manipulation, if required. It requires the slapo-rwm(5) overlay. This backend and the above mentioned overlay are experimental. CONFIGURATION
The following slapd.conf directives apply to the relay backend database. That is, they must follow a "database relay" line and come before any subsequent "backend" or "database" lines. Other database options are described in the slapd.conf(5) manual page; only the suffix directive is allowed by the relay backend. relay <real naming context> The naming context of the database that is presented under a virtual naming context. The presence of this directive implies that one specific database, i.e. the one serving the real naming context, will be presented under a virtual naming context. MASSAGING
The relay database does not automatically rewrite the naming context of requests and responses. For this purpose, the slapo-rwm(5) overlay must be explicitly instantiated, and configured as appropriate. Usually, the rwm-suffixmassage directive suffices if only naming context rewriting is required. ACCESS RULES
One important issue is that access rules are based on the identity that issued the operation. After massaging from the virtual to the real naming context, the frontend sees the operation as performed by the identity in the real naming context. Moreover, since back-relay bypasses the real database frontend operations by short-circuiting operations through the internal backend API, the original database access rules do not apply but in selected cases, i.e. when the backend itself applies access control. As a consequence, the instances of the relay database must provide own access rules that are consistent with those of the original database, possibly adding further specific restrictions. So, access rules in the relay database must refer to identities in the real naming context. Examples are reported in the EXAMPLES section. SCENARIOS
If no relay directive is given, the relay database does not refer to any specific database, but the most appropriate one is looked-up after rewriting the request DN for the operation that is being handled. This allows to write carefully crafted rewrite rules that cause some of the requests to be directed to one database, and some to another; e.g., authentication can be mapped to one database, and searches to another, or different target databases can be selected based on the DN of the request, and so. Another possibility is to map the same operation to different databases based on details of the virtual naming context, e.g. groups on one database and persons on another. EXAMPLES
To implement a plain virtual naming context mapping that refers to a single database, use database relay suffix "dc=virtual,dc=naming,dc=context" relay "dc=real,dc=naming,dc=context" overlay rwm rwm-suffixmassage "dc=real,dc=naming,dc=context" To implement a plain virtual naming context mapping that looks up the real naming context for each operation, use database relay suffix "dc=virtual,dc=naming,dc=context" overlay rwm rwm-suffixmassage "dc=real,dc=naming,dc=context" This is useful, for instance, to relay different databases that share the terminal portion of the naming context (the one that is rewrit- ten). To implement the old-fashioned suffixalias, e.g. mapping the virtual to the real naming context, but not the results back from the real to the virtual naming context, use database relay suffix "dc=virtual,dc=naming,dc=context" relay "dc=real,dc=naming,dc=context" overlay rwm rwm-rewriteEngine on rwm-rewriteContext default rwm-rewriteRule "dc=virtual,dc=naming,dc=context" "dc=real,dc=naming,dc=context" ":@" rwm-rewriteContext searchFilter rwm-rewriteContext searchEntryDN rwm-rewriteContext searchAttrDN rwm-rewriteContext matchedDN Note that the slapo-rwm(5) overlay is instantiated, but the rewrite rules are written explicitly, rather than automatically as with the rwm-suffixmassage statement, to map all the virtual to real naming context data flow, but none of the real to virtual. Access rules: database bdb suffix "dc=example,dc=com" # skip... access to dn.subtree="dc=example,dc=com" by dn.exact="cn=Supervisor,dc=example,dc=com" write by * read database relay suffix "o=Example,c=US" relay "dc=example,dc=com" overlay rwm rwm-suffixmassage "dc=example,dc=com" # skip ... access to dn.subtree="o=Example,c=US" by dn.exact="cn=Supervisor,dc=example,dc=com" write by dn.exact="cn=Relay Supervisor,dc=example,dc=com" write by * read Note that, in both databases, the identities (the <who> clause) are in the real naming context, i.e. `dc=example,dc=com', while the tar- gets (the <what> clause) are in the real and in the virtual naming context, respectively. ACCESS CONTROL
The relay backend does not honor any of the access control semantics described in slapd.access(5); all access control is delegated to the relayed database(s). Only read (=r) access to the entry pseudo-attribute and to the other attribute values of the entries returned by the search operation is honored, which is performed by the frontend. FILES
/etc/openldap/slapd.conf default slapd configuration file SEE ALSO
slapd.conf(5), slapd-config(5), slapo-rwm(5), slapd(8). OpenLDAP 2.4.28 2011/11/24 SLAPD-RELAY(5)
All times are GMT -4. The time now is 05:50 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy