VMware Networking Community
IvarHome
Hot Shot
Hot Shot

Deploy controller without boot?

Hi,

I need to deploy controller, but dont want it right after that boots it up. I need to configure it before it boots up. Need to lower cpu and memory (first release blocking in vCenter). Problem is - my host have only 8GB ram and right after deploy NSX want to boot it up. When boot unsuccess, it deletes controller VM. In other host I successfully lowered cpu to 1 vCPU and ram to 2GB.

0 Kudos
5 Replies
IvarHome
Hot Shot
Hot Shot

Ok, I fixed it - installed controller into other host, released vCenter blocking, lowered cpu and ram and then moved to right target host. All communication seems working. But now I have MTU problem. NSX GUI ping dont work. From host command-line I can ping with 1470, but with 1570 cant ping. Do I really need this 1600 MTU? I have between hosts 3 switches. I dont want to change those MTU-s, no any way. They must stay 1500. I readed about L2VPN by Edge. But Im little confused. In my known vxlan is made between vmkernels, how I then put this traffic to Edge-s.

0 Kudos
IvarHome
Hot Shot
Hot Shot

Just tested - 2 VMs in different hosts both connected to logical switch, logical switch dont have more connections. MTU in vmkernels is 1600, in vDS (both hosts have its own vDS) its 1500 and physical switches between hosts also 1500 MTU. And ping works, just with windows command-line. So, is this 1600 MTU talk, makes it at all any sense?  

0 Kudos
IvarHome
Hot Shot
Hot Shot

Ok, seems only ping works (when I dont set MTU), all other connections not. Of course, ping dont need jumbo stuff.......Ehh, its not sound at all professional when some software dont work without special MTU, bad software design, not in standard development.

0 Kudos
Sreec
VMware Employee
VMware Employee

Sorry to chip in bit late. Do you still have issues with MTU when you are using L2VPN ?  L2 VPN doesn't have any such requirement which you can see in the below screenshot as well.

pastedImage_0.png

Cheers,
Sree | VCIX-5X| VCAP-5X| VExpert 7x|Cisco Certified Specialist
Please KUDO helpful posts and mark the thread as solved if answered
0 Kudos
IvarHome
Hot Shot
Hot Shot

No, I havent experimented with L2VPN and brobably dont. I even have no idea how to tunnel vmkernel adapters traffic. But then I must set up 2 Edges and this is too much for me, as the traffic flows only between the same room. Its little strange to make VPN in the same room. In this case much easier becomes just send traffic through portgroups and VLAN to other host where Edge can do its job. The whole logical switch concept becomes non practical to use.......When some software needs larger MTU, then this reflect only non-completed programming. Programmer itself must be responsible to transfer packets, optimize speed, buffers etc. Example maybe needed to use WAN optimization, compression etc. This reflect only vmware bad developing process. Must more strive...........And maybe I explain why I at all need Edge in this case. I have top brands firewalls working in VM-s. Firewalls have also management interface. Management interface usually cant be connected with other interfaces, L2 loop happens. Also they cant be in the same subnet (no any interface cant be in the same subnet). But first they must be separated by VLAN.  I must access from my computer also management interface. Right now I have very unique solution. Managed L2 physical switch send traffic to two different ports. One with vlan tag and other without tag. Both wires go to Mikrotik SwOS. Mikrotik sends without tag port unchanged to output (connected to host where virtual firewalls brands). This is for firewalls management interfaces. Taged port Mikrotik first translates VLAN tag and sends to the same output (taged VLAN). This is for firewalls LAN interfaces. So, I can access both firewalls LAN and management interfaces, but management and LAN interfaces cant communicate temselves. Now I want to disable this implementation. I want to put one additional firewall for other firewalls management interfaces and access them still from the same subnet. This firewall must make many-to-many DNAT and also many-to-many SNAT. NSX Edge is just fine for this job.

0 Kudos