+1 the more isolation methods, the better.

On Thu, May 2, 2013 at 1:31 PM, Chip Childers <chip.child...@sungard.com>wrote:

> On Wed, May 01, 2013 at 04:58:12PM -0400, Toshiaki Hatano wrote:
> > Hi all,
> >
> > I’d like to add Linux native VXLAN support on KVM hypervisor.
> >
> > Currently, advanced zone with VLAN isolation can hold only 4k networks
> (= accounts) in a zone due to the VLAN ID limitation.
> > 4k accounts per zone is not enough for IaaS provider like us.
> > Furthermore, VPC will allow single account to consume multiple networks.
> >
> > Linux kernel 3.7 or later supports VXLAN as part of its ordinal
> networking function.
> > VXLAN enable Layer 2 tunneling over UDP/IP with VLAN-like encapsulation
> and allow 16M isolated networks in the domain.
> > So, by using linux native VXLAN support, we can extend network limits
> without introducing unnecessary complexity.
> > (But in other words, it’s not as flexible as Open vSwitch. Only thing
> Linux native VXLAN provides is multipoint L2 tunneling.)
> >
> > Any thoughts about this?
> >
> >
> > P.S.
> >
> > I’m currently working on this as my internship project.
> > As proof of concept, I’ve modified “modifyvlan.sh” script which is
> actual VLAN create/delete manipulation script called from cloud-agent, to
> create and to use VXLAN interface instead of VLAN interface.
> > Modified script is tested with CloudStack 4.0.1 and 3 KVM hypervisors
> based on CentOS 6.4 + 3.8.6 kernel.
> > And it looks working. (But I’m still testing)
> >
> >
> > P.S.2.
> >
> > FYI: OpenStack already started process [1] to support Linux native VXLAN.
> > [1] https://review.openstack.org/#/c/26516/
> >
> >
> > Best Regards,
> > --
> > Toshiaki Hatano
>
> I note that no one has replied to this thread yet, but I'll give you my
> general +1 on the idea.
>
> Can some of the network-centric folks on the dev list please speak up on
> the proposal?
>
> -chip
>

Reply via email to