That's a far more elegant way then I tried, which was creating tagged 
interfaces within guests.

Sent from my iPhone

On Oct 15, 2012, at 12:54 AM, Chiradeep Vittal <chiradeep.vit...@citrix.com> 
wrote:

> This sounds like it can be modeled as multiple physical networks? That is,
> each "outer" vlan (400, 401, etc) is a separate physical network in the
> same zone. That could work, although it is probable that the zone
> configuration API bits prevent more than 4k VLANs per zone (that can be
> changed to per physical network).
> 
> As long as communication between guests on different physical networks
> happens via the public network, it should be Ok.
> I'd like to see the patch.
> 
> Thanks
> 
> On 10/12/12 1:09 AM, "Marcus Sorensen" <shadow...@gmail.com> wrote:
> 
>> Guys, in looking for a free and scalable way to provide private networks
>> for customers I've been running a QinQ setup that has been working quite
>> well. I've sort of laid the groundwork for it already in changing the
>> bridge naming conventions about a month ago for KVM(to names that won't
>> collide if the same vlans is used twice on different phys).
>> 
>> Basically the way it works is like this. Linux has two ways of creating
>> tagged networks, the eth#.# and the less used vlan# network devices. I
>> have
>> a tiny patch that causes cloudstack to treat vlan# devs as though they
>> were
>> physical NICs. In this way, you can do something like physical devices
>> eth0,eth1,and vlan400. management traffic on eth0's bridge, storage on
>> eth1.102's bridge, maybe eth1.103 for public/guest, then create say a
>> vlan400 that is tag 400 on eth1. You add a traffic type of guest to it and
>> give it a vlan range, say 10-4000. Then you end up with cloudstack handing
>> out vlan400.10, vlan400.11, etc for guest networks. Works great for
>> network
>> isolation without burning through a bunch of your "real" vlans. In the
>> unlikely event that you run out, you just create a physical vlan401 and
>> start over with the vlan numbers.
>> 
>> In theory all-you-can-eat isolated networks without having to configure
>> hundreds of vlans on your networking equipment. This may require
>> additional
>> config on any upstream switches to pass the double tags around, but in
>> general from what I've seen the inner tags just pass through on anything
>> layer 2, it should only get tricky if you try to tunnel, route or strip
>> tags.
>> 
>> This is especially nice with system VM routers and VPC (cloudstack takes
>> care of everything), but admittedly external routers probably will have
>> spotty support for being able to route double tagged stuff. I'm also a bit
>> afraid that if I were to get it merged in that it would just become this
>> undocumented hack thing that few know about and nobody uses. So I'm
>> looking
>> for feedback on whether this sounds useful enough to commit, how it should
>> be documented, and whether it makes sense to hint at this in the GUI
>> somehow.
> 

Reply via email to