My system is Two Node Cluster Neutron ML2&OVS&GRE configured as follows
[root@dfw02 neutron(keystone_admin)]$ cat dhcp_agent.ini | grep -v ^# | grep -v ^$
[DEFAULT]
interface_driver = neutron.agent.linux.interface.OVSInterfaceDriver
handle_internal_only_routers = TRUE
external_network_bridge = br-ex
ovs_use_veth = True
use_namespaces = True
dnsmasq_config_file = /etc/neutron/dnsmasq.conf
[root@dfw02 neutron(keystone_admin)]$ cat dnsmasq.conf
log-facility = /var/log/neutron/dnsmasq.log
log-dhcp
dhcp-option=26,1454
It forces any new created VM's ( Ubuntu,F20) MTU to be set to 1454
Deployed CentOS 7 VM had MTU 1500 what was verified via load
without ssh-keypair wit post creation script assigning password to
user "centos". I believe that current image would have problems on
GRE Systems.
Boris
> Date: Wed, 27 Aug 2014 13:38:46 +0100
> From: mail-lists@karan.org
> To: bderzhavets@hotmail.com; rdo-list@redhat.com
> Subject: Re: [Rdo-list] Request for testing: CentOS-7-x86_64 Generic Cloud image
>
> On 08/27/2014 01:14 PM, Boris Derzhavets wrote:
>
> > [boris@icehouse1 Downloads]$ ssh -i oskey25.pem cloud-user@192.168.1.180
> >
> > The authenticity of host '192.168.1.180 (192.168.1.180)' can't be
> > established.
> > ECDSA key fingerprint is 56:dc:7e:14:ee:8d:4c:bb:09:d1:da:7b:fd:a7:8b:60.
> > Are you sure you want to continue connecting (yes/no)? yes
> > Warning: Permanently added '192.168.1.180' (ECDSA) to the list of known
> > hosts.
> > Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
> >
> > Attempt to SSH with ssh-keypair been used when launching fails.
> > That seems to be the same issue I experienced trying to reproduce
> > http://openstack.redhat.com/Creating_CentOS_and_Fedora_images_ready_for_Openstack
> >
>
> what happens when you try ssh -l centos -i oskey25.pem 192.168.1.180
>
> the issue then is - why are you expecting for the login to be cloud-user
> and not 'centos'.
>
> - KB
>
> --
> Karanbir Singh
> +44-207-0999389 | http://www.karan.org/ | twitter.com/kbsingh
> GnuPG Key : http://www.karan.org/publickey.asc