Closed Bug 1562289 Opened 5 years ago Closed 5 years ago

Allocate and set up new IP space for releng tier3 workers in mdc1 and mdc2

Categories

(Infrastructure & Operations Graveyard :: NetOps: DC Other, task)

task
Not set
normal

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: dividehex, Assigned: nfette)

References

Details

As discussed with secops during the June 2019 All Hands, we will need to carve out network space for tier3 taskcluster workers which carry a greater security risk and impact than the talos/try taskcluster workers located in the test and wintest releng networks. This work currently block setup and implementation of mac minis PGO build tasks. See bug 1395325 and bug 1530732

Please allocate and setup a new vlan and network segment for tier3 related workers in mdc1 and mdc2.

This new network segment should be within the releng mdc1/2 cidr ranges and /22 bits wide. This network should be similar to the test.releng.mdc[1,2].mozilla.com networks with regards to firewall policies.

Releng cidr ranges in mdc1 and mdc2:
10.49.0.0 mdc1
10.51.0.0 mdc2

Domains:
.tier3.releng.mdc1.mozilla.com
.tier3.releng.mdc2.mozilla.com

Assignee: network-operations → nfette

Looks like we have the following vlans free:
MDC 1 10.49.60.0/22 range 10.49.60.1 - 10.49.63.254 VLAN 260
MDC 2 10.51.60.0/22 range 10.51.60.1 - 10.51.63.254 VLAN 260

getting JohnB's ok to use the ranges before I proceed.

Status: NEW → ASSIGNED

got the go ahead to build the above subnets and vlans for releng from John.

Created Layer 2 vlan and name: vlan 260 tier3.releng.mdc1 in all mdc1 switches
Created Layer 2 vlan and name: vlan 260 tier3.releng.mdc2 in all mdc2 switches

Created a layer 3 SVI on the Palo Alto firewall tagged vlan 260
MDC 1 10.49.60.0/22
MDC 2 10.51.60.0/22

Created a zone called tier3-releng and enabled dhcp

Added the new tier3-releng zone to the following rules:
Rule 183 anything-to-git-zlb
Rule 226 bacula-bidirectional
Rule 215 infoblox-dhcp-client
Rule 227 infoblox-dhcp-server
Rule 228 infoblox-udp67
Rule 212 Key Management Server - MS
Rule 170 Proxy ByPass

If you want me to remove the zone from any of the rules let me know, also if I missed any rules let me know as well.

Created both MDC1 and MDC2 subnets in infoblox.

(In reply to Jake Watkins [:dividehex] from comment #0)

As discussed with secops during the June 2019 All Hands, we will need to carve out network space for tier3 taskcluster workers which carry a greater security risk and impact than the talos/try taskcluster workers located in the test and wintest releng networks. This work currently block setup and implementation of mac minis PGO build tasks. See bug 1395325 and bug 1530732

Please allocate and setup a new vlan and network segment for tier3 related workers in mdc1 and mdc2.

This new network segment should be within the releng mdc1/2 cidr ranges and /22 bits wide. This network should be similar to the test.releng.mdc[1,2].mozilla.com networks with regards to firewall policies.

Releng cidr ranges in mdc1 and mdc2:
10.49.0.0 mdc1
10.51.0.0 mdc2

Domains:
.tier3.releng.mdc1.mozilla.com
.tier3.releng.mdc2.mozilla.com

OK this should be good to test and verify.

If this is working completely to your liking please close this out.

Regards,
Nadia

Flags: needinfo?(jwatkins)

Can we please trunk this VLAN into the UCS in MDC1 and MDC2?

Flags: needinfo?(jwatkins) → needinfo?(nfette)

access05.private.mdc1#sh run int po17
interface Port-Channel17
description esxucs1-A
switchport trunk allowed vlan 5,8,60,62,69-72,74-75,77,81,86-87,121,124-125,130,220,240,248,256,260,275,278,3000-3002
switchport mode trunk
mlag 17
access05.private.mdc1#sh run int po18
interface Port-Channel18
description esxucs1-B
switchport trunk allowed vlan 5,8,60,62,69-72,74-75,77,81,86-87,121,124-125,130,220,240,248,256,260,275,278,3000-3002
switchport mode trunk
mlag 18

access06.private.mdc1#sh run int po17
interface Port-Channel17
description esxucs1-A
switchport trunk allowed vlan 5,8,60,62,69-72,74-75,77,81,86-87,121,124-125,130,220,240,248,256,260,275,278,3000-3002
switchport mode trunk
mlag 17
access06.private.mdc1#sh run int po18
interface Port-Channel18
description esxucs1-B
switchport trunk allowed vlan 5,8,60,62,69-72,74-75,77,81,86-87,121,124-125,130,220,240,248,256,260,275,278,3000-3002
switchport mode trunk
mlag 18

Flags: needinfo?(nfette)

Excellent - But I'm still not able to DHCP addresses in that VLAN from the UCS. I've confirmed that the UCS/ESX are setup to handle VLAN260 traffic, but when I try to DHCP, I don't see any logging in the infoblox to indicate that things are getting there.

Any help is appreciated.

Flags: needinfo?(nfette)

(In reply to Chris Knowles [:cknowles] from comment #10)

Excellent - But I'm still not able to DHCP addresses in that VLAN from the UCS. I've confirmed that the UCS/ESX are setup to handle VLAN260 traffic, but when I try to DHCP, I don't see any logging in the infoblox to indicate that things are getting there.

Any help is appreciated.

Was the dhcphelper setup to forward requests to infoblox on the new vlans?

Added vlan 260 to vxlan, core, and firewall uplinks verified with Chris over slack now gets dhcp requests.

Flags: needinfo?(nfette)
Status: ASSIGNED → RESOLVED
Closed: 5 years ago
Resolution: --- → FIXED
Product: Infrastructure & Operations → Infrastructure & Operations Graveyard
You need to log in before you can comment on or make changes to this bug.