Return-Path: X-Original-To: apmail-cloudstack-dev-archive@www.apache.org Delivered-To: apmail-cloudstack-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 16F86F120 for ; Wed, 10 Apr 2013 19:02:31 +0000 (UTC) Received: (qmail 43273 invoked by uid 500); 10 Apr 2013 19:02:30 -0000 Delivered-To: apmail-cloudstack-dev-archive@cloudstack.apache.org Received: (qmail 43215 invoked by uid 500); 10 Apr 2013 19:02:30 -0000 Mailing-List: contact dev-help@cloudstack.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@cloudstack.apache.org Delivered-To: mailing list dev@cloudstack.apache.org Received: (qmail 43207 invoked by uid 99); 10 Apr 2013 19:02:30 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 10 Apr 2013 19:02:30 +0000 X-ASF-Spam-Status: No, hits=-5.0 required=5.0 tests=RCVD_IN_DNSWL_HI,SPF_HELO_PASS,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of Chiradeep.Vittal@citrix.com designates 66.165.176.89 as permitted sender) Received: from [66.165.176.89] (HELO SMTP.CITRIX.COM) (66.165.176.89) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 10 Apr 2013 19:02:24 +0000 X-IronPort-AV: E=Sophos;i="4.87,449,1363132800"; d="scan'208";a="18678165" Received: from sjcpmailmx02.citrite.net ([10.216.14.75]) by FTLPIPO01.CITRIX.COM with ESMTP/TLS/RC4-MD5; 10 Apr 2013 19:02:02 +0000 Received: from SJCPMAILBOX01.citrite.net ([10.216.4.73]) by SJCPMAILMX02.citrite.net ([10.216.14.75]) with mapi; Wed, 10 Apr 2013 12:02:02 -0700 From: Chiradeep Vittal To: "dev@cloudstack.apache.org" Date: Wed, 10 Apr 2013 12:01:58 -0700 Subject: Re: Network architecture question Thread-Topic: Network architecture question Thread-Index: Ac42HeJzChv2ZzRCQ8CT7syzt2oa0Q== Message-ID: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/14.3.2.130206 acceptlanguage: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Virus-Checked: Checked by ClamAV on apache.org Please take a look at http://s.apache.org/k8w Slides 32-39 explain the networking layout in security groups in basic networking. The VR (one per pod) simply dispenses DHCP and user data. It is not a firewall. The firewall is implemented at the hypervisor level. This is what allows it to scale On 4/10/13 7:01 AM, "Murali Reddy" wrote: > >Justin, > >As Chiradeep mentioned, 'basic zone' is solution you should be trying out. >With basic zone, you could associate guest subnet per pod, there is no >VLAN's required in the zone. Your L2 broadcast domain is restricted to >POD. POD becomes unit of scale in basic zone, so east-west traffic across >the rack/POD's is through the router that connects TOR switches of POD. >Please try basic zone deployment and let us know if you still see >limitations. > >-Murali > >On 10/04/13 7:13 PM, "Justin Grudzien" wrote: > >>I looked at Security groups and I am not sure how this solves my >>problems. Sure it provides guest isolation but that is through the >>virtual router correct? The underlying physical network --outside of >>cloudstack-- is still layer 2? That is what I am concerned with. When >>defining what IPs my guests sit on CloudStack assumes that those are >>available, or tagged, on every host in my zone. If I have every host >>tagged with the guest network then broadcast packets, like ARP, will hit >>every box, regardless of whether a VM runs on it at all. My network >>engineers are worried that any kind of broadcast storm, or spanning tree >>loop, could take the whole cloud down. Does this make sense or am I still >>missing something? >> >>What we are looking at is creating a zone per physical rack of servers >>implementing the shared network offering. This allows my underlying >>network to be layer 3 between cabinets and limits my layer 2 guest >>traffic to far less servers. Between cabinets I will use routing for VMs >>to talk to each other. The problems this introduces is that CloudStack >>doesn't let me mount the same secondary storage for images so I have to >>replicate that data. It would be nice to be able to mount the images >>across all zones but leave the snapshots local to the zone. >> >>We have been intensively building and rebuilding CloudStack for the last >>three weeks and nowhere have I seen the ability to pin a guest subnet to >>a rack (pod) of servers. This is what suggests that the guest networks >>must be tagged on all physical host ports and why I am concerned about >>the large layer 2 domain. >> >>Sorry this was long winded some of these concepts are difficult I convey >>over email. >> >>Justin=20 >> >>Sent from my iPhone >> >>On Apr 9, 2013, at 12:26 PM, Chiradeep Vittal >> wrote: >> >>> You can do bonded nics in basic zone. The limitation with basic zone is >>> that the Vms cannot have multiple nics. Did you need multiple nics for >>> your vms? >>> If you need advanced network services such as static NAT and load >>> balancing, advanced networking is probably your best bet (currently, >>> unless you want to invest in a Netscaler for these services). >>>=20 >>> Not sure that VXLAN will solve your problems since that has scaling >>> problems as well. On vSphere an NX1000v DVS can only handle about 64 >>> hypervisors IIRC. >>>=20 >>>=20 >>>=20 >>> On 4/9/13 5:39 AM, "Justin Grudzien" wrote: >>>=20 >>>> We have 2 pairs of bonded 10g nics on each box. Wouldn't that require >>>>an >>>> advanced network? Is it possible to do the security groups with small >>>>L2 >>>> networks in advanced networking? >>>>=20 >>>> Justin=20 >>>>=20 >>>> Sent from my iPhone >>>>=20 >>>> On Apr 9, 2013, at 12:38 AM, Chiradeep Vittal >>>> wrote: >>>>=20 >>>>> Have you considered using a basic zone? >>>>> With security groups you can have *lots* (thousands of) with very >>>>>small >>>>> L2 >>>>> networks. >>>>>=20 >>>>> On 4/8/13 10:28 PM, "Justin Grudzien" wrote: >>>>>=20 >>>>>> My team has been working for three weeks with CloudStack >>>>>>architecture >>>>>> design and we are struggling to put together a network architecture >>>>>> that >>>>>> we feel will scale. From everything I can tell, CloudStack requires >>>>>>a a >>>>>> very large layer 2 network when using shared guest networks. We are >>>>>> looking to deploy almost a thousand physical hosts across 25 >>>>>>cabinets >>>>>> with over 4000 VMs in the next 18 months and having a broadcast >>>>>>domain >>>>>> this large feels problematic. >>>>>>=20 >>>>>> How have others solved this problem? I don't have a need or a desire >>>>>> for >>>>>> isolation and even if I had 100 guest networks I would still have to >>>>>> tag >>>>>> their VLANs into every host port. There doesn't seem to be a way to >>>>>> tie a >>>>>> network to anything smaller than a zone. >>>>>>=20 >>>>>> One solution we are looking into is Cisco's 1000v and utilizing >>>>>>VXLANs. >>>>>> This will allow us scale down the broadcast domains. I don't think >>>>>> CloudStack has support in configuring their VXLAN settings? Any >>>>>> comments >>>>>> or suggestions would be appreciated. >>>>>>=20 >>>>>> Justin >>>=20 >> > >