Enabling Efficient Application Monitoring in Cloud Data Centers Using SDN

Total Page:16

File Type:pdf, Size:1020Kb

Enabling Efficient Application Monitoring in Cloud Data Centers Using SDN Enabling efficient application monitoring in cloud data centers using SDN Mona Elsaadawy Mohamed Younis Bettina Kemme [email protected] [email protected] Department of Computer Science and Electrical [email protected] Engineering, UMBC School of Computer Science, McGill University Baltimore, Maryland, USA Montreal, Quebec, Canada Abstract to accomplish their goals. For example, user-facing compo- Software Defined Networking (SDN) not only enables agility nents at Google comprise 100s to 1000s of nodes that interact through the realization of part of the network functionality with each other and with other services (e.g., a spell-checking in software but also facilitates offering advanced features at service) to handle user requests. Even simple web applica- the network layer. Hence, SDN can support a wide range of tions today consist of multiple distributed tiers that interact middleware services; network performance monitoring is an with each other and may be integrated with a third party example of these services that are already deployed in prac- such as Facebook, payment gateways, etc. to accomplish tice. In this paper, we exploit the use of SDNs to efficiently one transaction. The performance of these applications has provide application monitoring functionality. The recent a direct impact on business metrics such as revenue and rise of complex cloud applications has made performance customer satisfaction. Examples of this impact are well docu- monitoring a major issue. We show that many performance mented. For example, Google loses 20% traffic for additional indicators can be inferred from messages exchanged among delay of 0.5 second to their page-load time and Amazon application components. By analyzing these messages, we loses 1% of revenue for every 100 ms in latency increase [17]. argue that the overhead of performance monitoring could Given the distributed character of the applications, effective be effectively moved from the end hosts into the SDN mid- logging and monitoring are important to keep track of per- dleware of the cloud infrastructure which enables more flex- formance, and to detect, diagnose and resolve performance- ible placement of logging functionality. This paper explores related problems. several approaches for supporting application monitoring Apart of standard hardware resource utilization measure- through SDN. In particular, we combine selective forwarding ments (CPU, memory, etc.), application layer metrics such as in SDN to enable message filtering and reformatting, and request service time or characteristics of service call distri- propose a customized port sniffing technique. We describe butions are also highly relevant [20]. Common approaches the implementation of the approach within the standard to collect the relevant data are to instrument the application SDN software, namely OVS. We further provide a compre- or the underlying platform to create log messages, such as hensive performance evaluation to analyze advantages and Apache Tomcat’s log valves [12]. An obvious disadvantage disadvantages of our approach, and highlight the trade-offs. is the application and/or platform dependence. Additionally, network monitoring middleware tools such as Wireshark CCS Concepts • Networks → Network measurement; [35], that perform live tracking of message flows and allow Network performance analysis; Data center networks; Pro- for sophisticated analysis of captured packages, can be used to perform some application-level performance assessment, arXiv:1902.11292v2 [cs.NI] 19 Aug 2019 grammable networks. such as request response times. These tools attach to any Keywords Software defined networking, Application log- software component or to the hypervisor and are able to ging, Openflow, Network function virtualization observe all incoming and outgoing messages. What is com- mon among all these approaches is that they generate the logging information on the end-hosts. The tools themselves 1 Introduction can then either additionally perform the analysis, write the Many application domains have started to move their ser- logging information to a file to be analyzed later, or send the vices into the cloud, e.g.,e-commerce, health management, logs to specialized analysis systems that run on a different education, entertainment, and many more. Many cloud ap- set of hosts. In any case, application performance may be af- plications are often deployed as multi-component systems fected by sharing the host resources with the logging and/or where the individual components and their replicas might analysis tasks. run across tens, hundreds or even thousands of nodes and In contrast to these traditional solutions, this paper ex- may communicate with other similarly distributed services plores how some of the application monitoring functionality can be moved to the network layer by taking advantage middleware. The first does the required complete analysis of Software-Defined Networking (SDN) and Network Func- locally on the switch host. The other performs some filtering tion Virtualization (NFV). SDN separates data and control and pre-processing of messages and then sends the neces- flow, and NFV allows software implementations of network sary information to an analysis node, similar in concept to functionality. In fact, SDN already provides some support the selective mirroring approach described above. for targeted network monitoring such as bandwidth and In summary, the contribution of this paper is as follows: message statistics for individual flows. SDN and NFV are • We analyze various approaches in which network com- invaluable for cloud data centers; according to Cisco’s No- ponents are used in support of application monitoring, vember 2018 cloud index report[5] 1/3 of cloud data center outlining their advantages and disadvantages. have partially or fully adopted SDN and 2/3 will do so by • We propose a solution in which monitoring function- 2021. By then SDN and NFV traffic volume will make up ality is loosely integrated into software-based switch 50% of the data traffic within the data center. Given such fast components, allowing for a flexible and adjustable de- adoption, we believe it is important to explore how much ployment of application-based monitoring and analy- SDN can be exploited as a low-level middleware to support sis. cloud-wide application monitoring. • We have implemented and evaluated our proposed We have been inspired to do so by a number of recent stud- solutions, and compared them against existing mon- ies that explore the feasibility of performing a more global itoring solutions that are deployed on the end-hosts network monitoring approach based on SDN [14, 26, 39]. on which the application is running. Our evaluation The most basic approach is to enable the port mirroring fea- is based on the YCSB benchmark and analyzes the ture in switches and routers, in such a way that they mirror corresponding trade-offs in terms of impact on the ap- application traffic to specialized analysis systems. That is, plication performance, general resource consumption, messages are duplicated at the network component, and the switching speed and communication overhead. actual analysis takes place somewhere else. Although such The remainder of the paper is as follows. Section 2 pro- an approach is simple, and does not impose major compu- vides background about SDNs, cloud network architectures tational overhead at the switch/router, the message traffic and traditional end-host based application monitoring. Sec- overhead can be significantly high. Such overhead can be tions 3 and 4 present our network-based application moni- reduced by filtering messages at the SDN switches/routers toring solutions. Specifically, Section 3 focuses on the role using forwarding rules that ensure that only packets that of the software switch and how relevant information can are important for monitoring are mirrored to the specialized be filtered and transmitted to the monitoring component. analysis system. The disadvantage of selective mirroring is Section 4 then explains how application-relevant data can be that it might lead to a delay in the forwarding path. inferred from the individual messages. Section 5 discusses Other research [4, 10, 15, 25, 34, 37] extends the source the validation methodology and report the performance re- code of the SDN switch to have an inclusive analysis func- sults. Section 6 present related work and Section 7 concludes tion. However, the results show significant performance the paper. degradation in terms of the modified SDN switch forwarding throughput. In this paper, we have a closer look at some of 2 Background these approaches and see how they can be adjusted to work for application monitoring. In particular, we analyze how 2.1 Software Defined Networking effective selective mirroring is able to truly filter only rele- In Software Defined Networking, the SDN controller repre- vant messages. We also provide insight into the performance sents the control plane that decides on how messages are implications. routed and SDN switches represent the forwarding plane Furthermore, driven by the deployment limitations of ex- (data plane) that guide messages through the network. The isting approaches, we propose a conceptually different so- controller provides each switch with a set of rules indicating lution that can be used for software switches which run how to forward the different flows of messages they receive on general purpose hardware. Such software switches are from end hosts
Recommended publications
  • Open Virtualization Infrastructure for Large Telco: How Turkcell Adopted Ovirt for Its Test and Development Environments
    Open Virtualization Infrastructure for large Telco: How Turkcell adopted oVirt for its test and development environments DEVRIM YILMAZ SAYGIN BAKTIR Senior Expert Cloud Engineer Cloud Systems Administrator 09/2020 This presentation is licensed under a Creative Commons Attribution 4.0 International License About Turkcell ● Turkcell is a digital operator headquartered in Turkey ● Turkcell Group companies operate in 5 countries – Turkey, Ukraine, Belarus, Northern Cyprus, Germany ● Turkcell is the only NYSE-listed company in Turkey. ● www.turkcell.com.tr 3 Business Objectives ● Alternative solutions compatible with Turkcell operational and security standards ● Dissemination of open source infrastructure technologies within the company ● Competitive infrastructure with cost advantage 3 The journey of oVirt 4 The Journey of oVirt 3. Step three 1. Research & 2. Go-Live 3. Go-Live 4. Private Cloud 5. Go-Live Development Phase-1 Phase-2 Automation RHV 5 Research & Development ● Motivation Factors ○ Cost 1. Research & ○ Participation Development ○ Regulation ○ Independence ○ Expertise ● Risk Factors ○ Security ○ Quality ○ Compliance ○ Support ○ Worst Practices 6 Research & Development ● Why oVirt? ○ Open Source licensing 1. Research & ○ Community contribution Development ○ The same roadmap with commercial product ○ Support via subscription if required ○ Adequate features for enterprise management ○ Rest API support 6 Research & Development ● Difficulties for new infra solution ○ Integration with current infrastructure 1. Research & - Centralized Management Development - Certified/Licensed Solutions - Integration Cost ○ Incident & Problem Management - 3rd Party Support - Support with SLA ○ Acquired Habits - Customer Expectations - Quality of IT Infrastructure Services 6 Research & Development ● What we achieved ○ Building of PoC environment 1. Research & ○ V2V Migration Development ○ Upgrade Tests starting with v.4.3.2 ○ Functional Tests ○ Backup Alternative Solutions 6 Go-Live Phase-1 ● Phase-1 contains : ○ Building of new oVirt platform with unused h/w 2.
    [Show full text]
  • VDI with UDS Enterprise and Microsoft Hyper-V
    UDS Enterprise VDI with UDS Enterprise & Microsoft Hyper-V www.udsenterprise.com About UDS Enterprise UDS Enterprise functionalities UDS Enterprise is a multiplatform connection broker . Scalable platform. It supports configurations for: in high availability by deploying several UDS Enterprise brokers in cluster . VDI: Windows and Linux virtual desktops . Unlimited number of configurations thanks to administration and deployment its additional module management system . Windows and Linux app virtualization and the definition of configuration variables . Desktop services consolidation on two levels: . Remote access to physical and virtual devices o Definition of configuration variables at system level UDS Enterprise is ideal for managing workstations o Definition of independent module because, among other functions, it allows you to configuration variables perform the following tasks: . Virtual desktop cache system in two levels for fast connection . Manage the life cycle of the endpoint . Administer and manage Windows and Linux . Management of unlimited services (Microsoft virtual desktops, virtualized applications and Hyper-V, Microsoft Azure, VMware vSphere, IP services deployed on different platforms Nutanix Acropolis, OpenNebula, OpenStack, from a single console Proxmox, oVirt, Terminal Server…) . Connect users and user groups of different . Unlimited user and device authentication authentication systems at the same time with systems (AD, Microsoft Azure Active virtual desktops and different IP services Directory, eDirectory, LDAP, SAML, internal . Connect users with remote desktop services by enabling one or more connection authentication system, authentication by IP) protocols at the same time . Log visualization system and system . Define policies for the use of deployed virtual statistics desktops or other resources . Deployment of virtual desktops in multiple . Deploy template-based virtual desktops hypervisors at the same time and managed .
    [Show full text]
  • Model to Implement Virtual Computing Labs Via Cloud Computing Services
    S S symmetry Article Model to Implement Virtual Computing Labs via Cloud Computing Services Washington Luna Encalada 1,2,* ID and José Luis Castillo Sequera 3 ID 1 Department of Informatics and Electronics, Polytechnic School of Chimborazo, Riobamba 060155, EC, Ecuador 2 Department of Doctorate in Systems Engineering and Computer Science, National University of San Marcos, Lima 15081, Peru; [email protected] 3 Department of Computer Sciences, Higher Polytechnic School, University of Alcala, 28871 Alcala de Henares, Spain; [email protected] * Correspondence: [email protected]; Tel.: +593-032-969-472 Academic Editor: Yunsick Sung Received: 1 May 2017; Accepted: 3 July 2017; Published: 13 July 2017 Abstract: In recent years, we have seen a significant number of new technological ideas appearing in literature discussing the future of education. For example, E-learning, cloud computing, social networking, virtual laboratories, virtual realities, virtual worlds, massive open online courses (MOOCs), and bring your own device (BYOD) are all new concepts of immersive and global education that have emerged in educational literature. One of the greatest challenges presented to e-learning solutions is the reproduction of the benefits of an educational institution’s physical laboratory. For a university without a computing lab, to obtain hands-on IT training with software, operating systems, networks, servers, storage, and cloud computing similar to that which could be received on a university campus computing lab, it is necessary to use a combination of technological tools. Such teaching tools must promote the transmission of knowledge, encourage interaction and collaboration, and ensure students obtain valuable hands-on experience.
    [Show full text]
  • Attacker Chatbots for Randomised and Interactive Security Labs, Using Secgen and Ovirt
    Hackerbot: Attacker Chatbots for Randomised and Interactive Security Labs, Using SecGen and oVirt Z. Cliffe Schreuders, Thomas Shaw, Aimée Mac Muireadhaigh, Paul Staniforth, Leeds Beckett University Abstract challenges, rewarding correct solutions with flags. We deployed an oVirt infrastructure to host the VMs, and Capture the flag (CTF) has been applied with success in leveraged the SecGen framework [6] to generate lab cybersecurity education, and works particularly well sheets, provision VMs, and provide randomisation when learning offensive techniques. However, between students. defensive security and incident response do not always naturally fit the existing approaches to CTF. We present 2. Related Literature Hackerbot, a unique approach for teaching computer Capture the flag (CTF) is a type of cyber security game security: students interact with a malicious attacker which involves collecting flags by solving security chatbot, who challenges them to complete a variety of challenges. CTF events give professionals, students, security tasks, including defensive and investigatory and enthusiasts an opportunity to test their security challenges. Challenges are randomised using SecGen, skills in competition. CTFs emerged out of the and deployed onto an oVirt infrastructure. DEFCON hacker conference [7] and remain common Evaluation data included system performance, mixed activities at cybersecurity conferences and online [8]. methods questionnaires (including the Instructional Some events target students with the goal of Materials Motivation Survey (IMMS) and the System encouraging interest in the field: for example, PicoCTF Usability Scale (SUS)), and group interviews/focus is an annual high school competition [9], and CSAW groups. Results were encouraging, finding the approach CTF is an annual competition for students in Higher convenient, engaging, fun, and interactive; while Education (HE) [10].
    [Show full text]
  • Ovirt and Openstack Storage (Present and Future)
    oVirt and OpenStack Storage (present and future) Federico Simoncelli Principal Software Engineer, Red Hat January 2014 1 Federico Simoncelli – oVirt and OpenStack Storage (present and future) Agenda ● Introduction ● oVirt and OpenStack Overview ● Present ● oVirt and Glance Integration ● Importing and Exporting Glance Images ● Current Constraints and Limitations ● Future ● Glance Future Integration ● Keystone Authentication in oVirt ● oVirt and Cinder Integration 2 Federico Simoncelli – oVirt and OpenStack Storage (present and future) oVirt Overview ● oVirt is a virtualization management application ● manages hardware nodes, storage and network resources, in order to deploy and monitor virtual machines running in your data center ● Free open source software released under the terms of the Apache License 3 Federico Simoncelli – oVirt and OpenStack Storage (present and future) The oVirt Virtualization Architecture 4 Federico Simoncelli – oVirt and OpenStack Storage (present and future) OpenStack Overview ● Cloud computing project to provide an Infrastructure as a Service (IaaS) ● Controls large pools of compute, storage, and networking resources ● Free open source software released under the terms of the Apache License ● Project is managed by the OpenStack Foundation, a non-profit corporate entity established in September 2012 5 Federico Simoncelli – oVirt and OpenStack Storage (present and future) OpenStack Glance Service ● Provides services for discovering, registering, and retrieving virtual machine images ● RESTful API that allows querying
    [Show full text]
  • Ovirt and Docker Integration
    oVirt and Docker Integration October 2014 Federico Simoncelli Principal Software Engineer – Red Hat oVirt and Docker Integration, Oct 2014 1 Agenda ● Deploying an Application (Old-Fashion and Docker) ● Ecosystem: Kubernetes and Project Atomic ● Current Status of Integration ● oVirt Docker User-Interface Plugin ● “Dockerized” oVirt Engine ● Docker on Virtualization ● Possible Future Integration ● Managing Containers as VMs ● Future Multi-Purpose Data Center oVirt and Docker Integration, Oct 2014 2 Deploying an Application (Old-Fashion) ● Deploying an instance of Etherpad # yum search etherpad Warning: No matches found for: etherpad No matches found $ unzip etherpad-lite-1.4.1.zip $ cd etherpad-lite-1.4.1 $ vim README.md ... ## GNU/Linux and other UNIX-like systems You'll need gzip, git, curl, libssl develop libraries, python and gcc. *For Debian/Ubuntu*: `apt-get install gzip git-core curl python libssl-dev pkg- config build-essential` *For Fedora/CentOS*: `yum install gzip git-core curl python openssl-devel && yum groupinstall "Development Tools"` *For FreeBSD*: `portinstall node, npm, git (optional)` Additionally, you'll need [node.js](http://nodejs.org) installed, Ideally the latest stable version, be careful of installing nodejs from apt. ... oVirt and Docker Integration, Oct 2014 3 Installing Dependencies (Old-Fashion) ● 134 new packages required $ yum install gzip git-core curl python openssl-devel Transaction Summary ================================================================================ Install 2 Packages (+14 Dependent
    [Show full text]
  • Oracle® Linux Virtualization Manager Getting Started Guide
    Oracle® Linux Virtualization Manager Getting Started Guide F25124-11 September 2021 Oracle Legal Notices Copyright © 2019, 2021 Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Red Hat Openshift 4.2 on Dell EMC Vxflex Ready Nodes Installation and Configuration Overview with Vxflex Ready Nodes
    White Paper White Paper Red Hat OpenShift 4.2 on Dell EMC VxFlex Ready Nodes Installation and Configuration overview with VxFlex Ready Nodes Abstract This white paper provides guidance on deployment and exercising basic functionality of Red Hat® OpenShift® Container Platform on Dell EMC VxFlex Ready Nodes for customers requiring an on-premises container platform solution. March 2020 000062 Revisions Revisions Date Description March 2020 Initial release Acknowledgements This paper was produced by the following: Author: Sunil Kumar HS and Raghavendra Biligiri Support: Raghvendra Tripathi, David J Adams and Shalini G The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any software described in this publication requires an applicable software license. Copyright © 2020 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. [3/27/2020] [White Paper] [000062] 2 Red Hat OpenShift 4.2 on Dell EMC VxFlex Ready Nodes | 000062 Table of contents Table of contents Revisions............................................................................................................................................................................. 2 Acknowledgements
    [Show full text]
  • Managed Conversion of Guests to Ovirt
    Managed Conversion of Guests to oVirt Arik Hadas Senior Software Engineer Red Hat 21/8/15 KVM Forum, August 2015 Agenda ● Motivation ● Architecture ● Demonstration ● Implementation ● Future work KVM Forum, August 2015 Many ways to run Virtual Machines ● There are many virtualization tools ● Different hypervisors – KVM, E !"E Xi, Xen, VirtualBo$, .%% ● Different management systems – oVirt, virt'manager, v phere, Ganeti, .%% KVM Forum, August 2015 “I don't want to lose my VMs” ● Virtualization technologies are used for a long time ● +o standardization ● ,eople are tied up to the technologies they currently use ● Conversion tools are neede). KVM Forum, August 2015 virt-v2v ● ,art of virt tools – /pen source virtualization management tools ● Foreign hypervisor -0 KVM ● Standalone conversion tool KVM Forum, August 2015 Conversion to oVirt using virt-v2v ● Converts disk formats ● Enables VirtIO drivers (If needed) – Network, torage ● Fixes boot'loader ● ,roduces full oVirt-compatible OVF ● Outputs the VM in oVirt's export domain KVM Forum, August 2015 Drawbacks ● Slow ● Tedious ● Error-prone ● 5equires separate installation ● Do not support conversion of OVA 7les ● Error handlin& KVM Forum, August 2015 Our goal Improve the conversion process to oVirt – Faster – Tools are availa1le – Graphical user interface ● To con7&ure ● To monitor/cancel – Ro1ust – Support conversion of OVA files KVM Forum, August 2015 Design principles ● 8se virt-v9v capabilities – For &uest-level operations ● oVirt mana&es the conversion – -on7&ure conversion properties
    [Show full text]
  • Open Source Virtualization
    Open Source Virtualization Souvalioti Maria Internet Systematics LAB Institute of Informatics and Telecommunications NCSR Demokritos Athens, July, 2019 Basic concepts > Open Source > Virtualization # Categories # Virtualization Software $ VMware $ Openstack $ KVM $ oVirt # Deployment tools – components $ Ansible $ GlusterFS > Case Studies Open Source > Open Source Software is software that its source code is open and available for all users to see, check, change and optimize. > Open Source programs are available for free to the public. > There are commercial products with additional functions which are based on Open Source code. Virtualization What is it? > Virtualization is the ability, via the appropriate software, to create,manage, edit and operate Virtual Machines on a physical machine (PC, Server). > Utilizes the resources of the physical machine accordingly, whether they are storage, network or compute resources and allocates them to virtual machines. What are the reasons that led to the need for the development of Virtualization? > 1960 # As a method of dividing system computing resources from mainframes between different applications. > 1999 #VMware Workstation on hardware Intel IA-32 > Σήμερα # Expanding hardware capabilities involves more parallel tasks achieved through Virtualization as optimizing hardware usage. # Cost control and simplification of management through the integration of servers (Server Consolidation). # Control of large computer installations and clusters. # Ability to run complex
    [Show full text]
  • Ovirt Architecture
    oVirt Architecture Itamar Heim Director, RHEV-M Engineering, Red Hat oVirt Engine Architecture 1 oVirt Engine Large scale, centralized management for server and desktop virtualization Based on leading performance, scalability and security infrastructure technologies oVirt Engine Architecture 2 Kenrel-based Virtual Machine (KVM) ● Included in Linux kernel since 2006 ● Runs Linux, Windows and other operating system guests ● Advanced features ● Live migration ● Memory page sharing ● Thin provisioning ● PCI Pass-through ● KVM architecture provides high “feature-velocity” – leverages the power of Linux oVirt Engine Architecture 3 Linux as a Hypervisor? ● What makes up a hypervisor ? ● Hardware management ● Device drivers ● I/O Stack ● Resource Management ● Scheduling ● Access Control ● Power Management ● Memory Manager ● Device Model (emulation) ● Virtual Machine Monitor oVirt Engine Architecture 4 Linux as a Hypervisor? ● What makes up a hypervisor ? ● Hardware management ● Device drivers ● I/O Stack ● Resource Management Operating System Kernel ● Scheduling ● Access Control ● Power Management ● } Memory Manager ● Device Model (emulation) ● Virtual Machine Monitor oVirt Engine Architecture 5 Linux as a Hypervisor? How well does Linux perform as a hypervisor? Isn't Linux a general purpose operating system? Linux is architected to scale from the smallest embedded systems through to the largest multi-socket servers ● From cell phones through to mainframes KVM benefits from mature, time tested infrastructure ● Powerful, scalable memory manager
    [Show full text]
  • SDN with Neutron and Skydive
    SDN with Neutron and Skydive Dominik Holler Senior Software Engineer - Red Hat 10/2019 This presentation is licensed under a Creative Commons Attribution 4.0 International License SDN deployment with OVN, Neutron and Skydive ● Neutron Integration ● Skydive Integration 1 Neutron Integration Networking in oVirt ● Linux bridge based networking ○ VLAN for interhost communication ○ Basic filtering, QoS ● SR-IOV based networking ○ VLAN for interhost communication ● NIC PCI passthrough ● External: ○ 3rd-party ○ Open vSwitch based networking ■ oVirt internal OVN for tunneled interhost communication ■ OpenStack Neutron OVN/ODL 2 Neutron Integration in oVirt Create or import 1 network oVirt Engine Neutron 3 Create port Create or read Create 2 network vNIC 5 4 Create port 6 OVN Associate vNIC with VDSM port 3 Example ovirtmgmt Engine host Host0, OVS Host1, Linux bridge Host2 No Spoof oVirt Engine VM OpenStack Controller OVN Controller OVN Controller Neutron Vm0 OVN Central Vm1 ... 4 Deployment yum install -y centos-release-openstack-stein && \ yum install -y openstack-packstack && \ packstack --os-glance-install=y --os-cinder-install=y \ --os-manila-install=n --os-nova-install=y --os-horizon-install=y \ --os-swift-install=n --os-ceilometer-install=n --os-aodh-install=n \ --os-panko-install=n --os-sahara-install=n --os-heat-install=n \ oVirt engine --os-magnum-install=n --os-trove-install=n --os-ironic-install=n \ --os-client-install=y --os-neutron-install=y \ --default-password=123456 \ --provision-demo=y \ --install-hosts=$controller_host \ --os-network-hosts=$controller_host,$network_host0,$network_host1
    [Show full text]