After installing the undercloud based on mitaka, the deploy of the overcloud in baremetal servers is not working. When the servers are trying to PXE boot, they don’t get any responses back. I’ve used tcpdump on several parts of the undercloud to see what was going on when the baremetal servers were PXE booting and this is what I obtained:

------------------- 
[stack@undercloud ~]$ sudo ovs-dpctl show
system@ovs-system:
lookups: hit:7971 missed:512 lost:0
flows: 2
masks: hit:14405 total:2 hit/pkt:1.70
port 0: ovs-system (internal)
port 1: br-int (internal)
port 2: br-ctlplane (internal)
port 3: eth1
port 4: tap77898498-bf (internal)

[stack@undercloud ~]$ sudo tcpdump -i eth1
tcpdump: WARNING: eth1: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
13:43:30.962477 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b4:b5:2f:58:61:a8 (oui Unknown), length 548
13:43:33.269272 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b4:b5:2f:58:61:a8 (oui Unknown), length 548
13:43:37.553341 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b4:b5:2f:58:61:a8 (oui Unknown), length 548
13:43:45.847061 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b4:b5:2f:58:61:a8 (oui Unknown), length 548


[stack@undercloud ~]$ sudo tcpdump -i br-ctlplane
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on br-ctlplane, link-type EN10MB (Ethernet), capture size 65535 bytes
13:43:30.962758 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b4:b5:2f:58:61:a8 (oui Unknown), length 548
13:43:33.269272 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b4:b5:2f:58:61:a8 (oui Unknown), length 548
13:43:37.553341 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b4:b5:2f:58:61:a8 (oui Unknown), length 548
13:43:45.847061 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b4:b5:2f:58:61:a8 (oui Unknown), length 548

[stack@undercloud ~]$ sudo ip netns exec qdhcp-a98f8425-c458-4db4-befe-807055f7a8e8 tcpdump -i tap77898498-bf
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on tap77898498-bf, link-type EN10MB (Ethernet), capture size 65535 bytes
13:43:30.962761 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b4:b5:2f:58:61:a8 (oui Unknown), length 548
13:43:33.269272 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b4:b5:2f:58:61:a8 (oui Unknown), length 548
13:43:37.553341 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b4:b5:2f:58:61:a8 (oui Unknown), length 548
13:43:45.847061 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b4:b5:2f:58:61:a8 (oui Unknown), length 548

------------------- 


I deployed the undercloud using the default network configuration (192.0.2.x) and I can see that dnsmasq is running:

[stack@undercloud ~]$ ps aux | grep dnsmasq
nobody    1452  0.0  0.0  15524   396 ?        S    May02   0:00 /sbin/dnsmasq --conf-file=/etc/ironic-inspector/dnsmasq.conf
stack     3409  0.0  0.0 112648   964 pts/2    S+   13:58   0:00 grep --color=auto dnsmasq
nobody    4015  0.0  0.0  15552   956 ?        S    May02   0:00 dnsmasq --no-hosts --no-resolv --strict-order --except-interface=lo --pid-file=/var/lib/neutron/dhcp/a98f8425-c458-4db4-befe-807055f7a8e8/pid --dhcp-hostsfile=/var/lib/neutron/dhcp/a98f8425-c458-4db4-befe-807055f7a8e8/host --addn-hosts=/var/lib/neutron/dhcp/a98f8425-c458-4db4-befe-807055f7a8e8/addn_hosts --dhcp-optsfile=/var/lib/neutron/dhcp/a98f8425-c458-4db4-befe-807055f7a8e8/opts --dhcp-leasefile=/var/lib/neutron/dhcp/a98f8425-c458-4db4-befe-807055f7a8e8/leases --dhcp-match=set:ipxe,175 --bind-interfaces --interface=tap77898498-bf --dhcp-range=set:tag0,192.0.2.0,static,86400s --dhcp-option-force=option:mtu,1500 --dhcp-lease-max=256 --conf-file=/etc/dnsmasq-ironic.conf


Ideas?


__
Ignacio Bravo
LTG Federal, Inc
www.ltgfederal.com