[PVE-User] VxLAN and tagged frames
Daniel Berteaud
daniel at firewall-services.com
Fri Jan 24 08:20:22 CET 2020
----- Le 23 Jan 20, à 20:53, Alexandre DERUMIER aderumier at odiso.com a écrit :
> Hi,
>
>>>So, what's the recommended setup for this ? Create one (non vlan aware) bridge
>>>for each network zone, with 1 VxLAN tunnel per bridge between nodes ?
>
> yes, you need 1 non-vlan aware bridge + 1 vxlan tunnel.
OK
>
> Technically they are vlan (from aware bridge) to vxlan mapping in kernel, but
> it's realy new and unstable.
> I don't known if it's possible to send vlan tagged frame inside a vxlan, never
> tested it.
>
>>>This doesn't look very scalable compared with >>vlan aware bridges (or OVS
>>>bridges) with GRE tunnels, does it ?
>
> I have tested it with 2000 vxlans + 2000 bridges. Works fine. Is is enough for
> you ?
I mean, until the SDN plugin is ready, creating a new network zone requires manual editing of network config on every node (new bridge + new vxlan). Unlike vlan aware bridges where you setup network on the hypervisor once, and then just use a new VLAN id for a VM. But most likely your SDN plugin makes it easier.
>
>
>
>>>Are the expirimental SDN plugins available somewhere as deb so I can play a bit
>>>with it ? (couldn't find it in pve-test or no-subscription)
>
> #apt-get install libpve-network-perl (try for pvetest repo if possible)
Oh, OK thanks. I was looking for a pve-something package name, that's why I haven't saw it :-)
>
>
> The gui is not finished yet, but you can try it at
> http://odisoweb1.odiso.net/pve-manager_6.1-5_amd64.deb
>
>
>
>
>
> I think if you want to do something like a simple vxlan tunnel, with multiple
> vlan, something like this should work (need to be tested):
>
> auto vxlan2
> iface vxlan2 inet manual
> vxlan-id 2
> vxlan_remoteip 192.168.0.2
> vxlan_remoteip 192.168.0.3
>
> auto vmbr2
> iface vmbr2 inet manual
> bridge_ports vxlan2
> bridge_stp off
> bridge_fd 0
> bridge-vlan-aware yes
> bridge-vids 2-4096
I'll try something like that. Until now, I use this :
auto vmbr0
allow-ovs vmbr0
iface vmbr0 inet manual
ovs_type OVSBridge
ovs_ports none
up ovs-vsctl set Bridge ${IFACE} rstp_enable=true
Then a script get all the cluster members, and create one gre tunnel with each other node like :
ovs-vsctl add-port vmbr0 gre0 -- set interface gre0 type=gre options:remote_ip=10.22.5.2
ovs-vsctl add-port vmbr0 gre1 -- set interface gre1 type=gre options:remote_ip=10.22.5.3
etc.
Not perfect, but working. The single GRE tunnel transport all the VLAN
++
--
[ https://www.firewall-services.com/ ]
Daniel Berteaud
FIREWALL-SERVICES SAS, La sécurité des réseaux
Société de Services en Logiciels Libres
Tél : +33.5 56 64 15 32
Matrix: @dani:fws.fr
[ https://www.firewall-services.com/ | https://www.firewall-services.com ]
More information about the pve-user
mailing list