XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    NBD setup - No such item

    Scheduled Pinned Locked Moved Management
    43 Posts 3 Posters 12.1k Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Tristis OrisT Offline
      Tristis Oris Top contributor @florent
      last edited by Tristis Oris

      @florent as i say, XO only one interface it's same host interface where NBD is enabled.
      030e1b04-968f-4d2c-a030-fc016096b848-изображение.png

      florentF 1 Reply Last reply Reply Quote 0
      • florentF Offline
        florent Vates 🪐 XO Team @Tristis Oris
        last edited by

        @Tristis-Oris And you don't have message like can't connect to nbd server in the system log / Xo-server output ?

        Tristis OrisT 1 Reply Last reply Reply Quote 0
        • Tristis OrisT Offline
          Tristis Oris Top contributor @florent
          last edited by

          @florent never seen such errors. At which step it should happens?

          florentF 1 Reply Last reply Reply Quote 0
          • florentF Offline
            florent Vates 🪐 XO Team @Tristis Oris
            last edited by

            @Tristis-Oris when launching a backup, between the snapshot and the beginning of the the transfer. It should try to connect to the host(s) NBD server

            florentF 1 Reply Last reply Reply Quote 0
            • florentF Offline
              florent Vates 🪐 XO Team @florent
              last edited by

              @florent also , is there a firewall/network filtering between XO and the host ? the conneciton to the NBD server go through the port 10809

              Tristis OrisT 1 Reply Last reply Reply Quote 0
              • Tristis OrisT Offline
                Tristis Oris Top contributor @florent
                last edited by Tristis Oris

                @florent is NBD server running at dom0?

                for clear test: disabled nbd, removed all XO logs. Enabled NBD on host, changed XO interface to this one, run backup task with NBD > no one error at logs.

                florentF 1 Reply Last reply Reply Quote 0
                • florentF Offline
                  florent Vates 🪐 XO Team @Tristis Oris
                  last edited by

                  @Tristis-Oris yes the NBD server run in the dom0, one per host

                  Tristis OrisT 1 Reply Last reply Reply Quote 0
                  • Tristis OrisT Offline
                    Tristis Oris Top contributor @florent
                    last edited by

                    @florent hm. Telnet to 10809 is refused even from dom0, to both backup interface and management.
                    We have no any additional firewalls at network. Host's iptable looks fine.

                    What a name of service, to check if it running?

                    Tristis OrisT florentF 2 Replies Last reply Reply Quote 0
                    • Tristis OrisT Offline
                      Tristis Oris Top contributor @Tristis Oris
                      last edited by

                      also add filter = 'xo:backups:DeltaBackupWriter' to config.toml. Anyway no one error during backup.

                      1 Reply Last reply Reply Quote 0
                      • florentF Offline
                        florent Vates 🪐 XO Team @Tristis Oris
                        last edited by

                        @Tristis-Oris I think it is built in in the xapi .
                        ss -tulpn on my host :
                        d0a68a53-401b-46ed-a520-f1453f7e007b-image.png

                        there is a xapi-nbd service

                        Tristis OrisT 1 Reply Last reply Reply Quote 0
                        • Tristis OrisT Offline
                          Tristis Oris Top contributor @florent
                          last edited by

                          @florent looks fine.
                          8aecaa4d-39e2-4797-b0b0-8daaa0f4a46a-изображение.png

                          also i add extra iptables rules, nothing changed.

                          iptables -A INPUT -p tcp --dport 10809 -m comment --comment "NBD" -j ACCEPT
                          iptables -A OUTPUT -p tcp --dport 10809 -m comment --comment "NBD" -j ACCEPT
                          
                          florentF 1 Reply Last reply Reply Quote 0
                          • florentF Offline
                            florent Vates 🪐 XO Team @Tristis Oris
                            last edited by

                            @Tristis-Oris my iptable are

                            -P INPUT ACCEPT
                            -P FORWARD ACCEPT
                            -P OUTPUT ACCEPT
                            -N RH-Firewall-1-INPUT
                            -N xapi_nbd_input_chain
                            -N xapi_nbd_output_chain
                            -A INPUT -p tcp -m tcp --dport 10809 -j xapi_nbd_input_chain
                            -A INPUT -p gre -j ACCEPT
                            -A INPUT -j RH-Firewall-1-INPUT
                            -A FORWARD -j RH-Firewall-1-INPUT
                            -A OUTPUT -p tcp -m tcp --sport 10809 -j xapi_nbd_output_chain
                            -A RH-Firewall-1-INPUT -i lo -j ACCEPT
                            -A RH-Firewall-1-INPUT -p icmp -m icmp --icmp-type any -j ACCEPT
                            -A RH-Firewall-1-INPUT -i xenapi -p udp -m udp --dport 67 -j ACCEPT
                            -A RH-Firewall-1-INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
                            -A RH-Firewall-1-INPUT -p udp -m conntrack --ctstate NEW -m udp --dport 694 -j ACCEPT
                            -A RH-Firewall-1-INPUT -p tcp -m conntrack --ctstate NEW -m tcp --dport 22 -j ACCEPT
                            -A RH-Firewall-1-INPUT -p tcp -m conntrack --ctstate NEW -m tcp --dport 80 -j ACCEPT
                            -A RH-Firewall-1-INPUT -p tcp -m conntrack --ctstate NEW -m tcp --dport 443 -j ACCEPT
                            -A RH-Firewall-1-INPUT -p tcp -m tcp --dport 21064 -j ACCEPT
                            -A RH-Firewall-1-INPUT -p udp -m multiport --dports 5404,5405 -j ACCEPT
                            -A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
                            -A xapi_nbd_input_chain -i xenbr0 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
                            -A xapi_nbd_input_chain -j REJECT --reject-with icmp-port-unreachable
                            -A xapi_nbd_output_chain -o xenbr0 -j RETURN
                            -A xapi_nbd_output_chain -j REJECT --reject-with icmp-port-unreachable
                            
                            

                            there is already a line for nbd

                            Tristis OrisT 1 Reply Last reply Reply Quote 0
                            • Tristis OrisT Offline
                              Tristis Oris Top contributor @florent
                              last edited by

                              @florent everything is default except NBD rule. looks similar.

                              Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
                               pkts bytes target     prot opt in     out     source               destination
                                 16   960 xapi_nbd_input_chain  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:10809
                                  0     0 ACCEPT     47   --  *      *       0.0.0.0/0            0.0.0.0/0
                              9872M  155T RH-Firewall-1-INPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
                                  0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:10809 /* NBD */
                                  0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0            udp dpt:10809 /* NBD */
                              
                              Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
                               pkts bytes target     prot opt in     out     source               destination
                                  0     0 RH-Firewall-1-INPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
                              
                              Chain OUTPUT (policy ACCEPT 22M packets, 34G bytes)
                               pkts bytes target     prot opt in     out     source               destination
                                  0     0 xapi_nbd_output_chain  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp spt:10809
                                  4   240 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:10809 /* NBD */
                                  0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0            udp dpt:10809 /* NBD */
                              
                              Chain RH-Firewall-1-INPUT (2 references)
                               pkts bytes target     prot opt in     out     source               destination
                               341M 9622G ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0
                                 29  5104 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0            icmptype 255
                                  0     0 ACCEPT     udp  --  xenapi *       0.0.0.0/0            0.0.0.0/0            udp dpt:67
                              9530M  146T ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ESTABLISHED
                                  0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate NEW udp dpt:694
                                  1    52 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate NEW tcp dpt:22
                              65232 3914K ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate NEW tcp dpt:80
                               488K   29M ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate NEW tcp dpt:443
                                  0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:21064
                                  0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0            multiport dports 5404,5405
                               588K 4800M REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
                              
                              Chain xapi_nbd_input_chain (1 references)
                               pkts bytes target     prot opt in     out     source               destination
                                  0     0 ACCEPT     all  --  xenbr0 *       0.0.0.0/0            0.0.0.0/0            ctstate NEW,ESTABLISHED
                                 16   960 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-port-unreachable
                              
                              Chain xapi_nbd_output_chain (1 references)
                               pkts bytes target     prot opt in     out     source               destination
                                  0     0 RETURN     all  --  *      xenbr0  0.0.0.0/0            0.0.0.0/0
                                  0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-port-unreachable
                              
                              Tristis OrisT 1 Reply Last reply Reply Quote 0
                              • Tristis OrisT Offline
                                Tristis Oris Top contributor @Tristis Oris
                                last edited by

                                after telnet request to 10809, rejected packages increased.

                                Chain xapi_nbd_input_chain (1 references)
                                 pkts bytes target     prot opt in     out     source               destination
                                    0     0 ACCEPT     all  --  xenbr0 *       0.0.0.0/0            0.0.0.0/0            ctstate NEW,ESTABLISHED
                                   17  1020 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-port-unreachable
                                
                                Tristis OrisT 1 Reply Last reply Reply Quote 0
                                • Tristis OrisT Offline
                                  Tristis Oris Top contributor @Tristis Oris
                                  last edited by Tristis Oris

                                  if i have no errors during backup, it means XO didn't try to use NBD?

                                  but at begining of each NBD backup i got +1 to iptables rejected list.

                                  florentF 1 Reply Last reply Reply Quote 0
                                  • florentF Offline
                                    florent Vates 🪐 XO Team @Tristis Oris
                                    last edited by

                                    @Tristis-Oris said in NBD setup - No such item:

                                    but at begining of each NBD backup i got +1 to iptables rejected list.

                                    I think there is something with the network configuration, but I am far out of my element here .

                                    Tristis OrisT 1 Reply Last reply Reply Quote 0
                                    • Tristis OrisT Offline
                                      Tristis Oris Top contributor @florent
                                      last edited by

                                      @florent is it any requirements for network\switch etc. Any layers outside of Xen.

                                      florentF 1 Reply Last reply Reply Quote 0
                                      • florentF Offline
                                        florent Vates 🪐 XO Team @Tristis Oris
                                        last edited by

                                        @Tristis-Oris it hae to let the encrypted traffic flow through the 10809 port. XO will connect directly to the hosts through NBD, not only to the master

                                        Tristis OrisT 1 Reply Last reply Reply Quote 0
                                        • Tristis OrisT Offline
                                          Tristis Oris Top contributor @florent
                                          last edited by

                                          @florent sounds pretty simple. Nothing at my network should block that traffic.

                                          Anyway, if i got rejected packets at iptables - backup task try to connect NBD server. Then it can't do something, so i should get an error at XO, but it not happens.

                                          1 Reply Last reply Reply Quote 0
                                          • Tristis OrisT Offline
                                            Tristis Oris Top contributor
                                            last edited by

                                            No such item task happens when host interface at status none without IP.

                                            1 Reply Last reply Reply Quote 0

                                            Hello! It looks like you're interested in this conversation, but you don't have an account yet.

                                            Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.

                                            With your input, this post could be even better 💗

                                            Register Login
                                            • First post
                                              Last post