Skip to content

Commit f14fcbe

Browse files
asaroyanLevon Avagyan
and
Levon Avagyan
authored
Vpc anywhere (#194)
* Add VPC example * Rewrite of Softgate installation, Lots of changes * Finalize the doc * Corrected spelling typos * Simplify requirements for softgate installation * Removed requirements for OS * Missing link * Add image with green status * Fix typos * REvert changes in installation * Reverted changes in vpc upstream peering Co-authored-by: Levon Avagyan <[email protected]>
1 parent 8190c4f commit f14fcbe

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

63 files changed

+694
-677
lines changed

SoftGate-PRO-installation.rst

+1-1
Original file line numberDiff line numberDiff line change
@@ -69,4 +69,4 @@ Requires freshly installed Ubuntu Linux 18.04 LTS and internet connectivity conf
6969
7070
user@host:~$ sudo reboot
7171
72-
Once the server boots up you should see its heartbeat going from Critical to OK in **Net→Inventory**, **Telescope→Dashboard**, and the SoftGate color will reflect its health in **Net→Topology**.
72+
Once the server boots up you should see its heartbeat going from Critical to OK in **Net→Inventory**, **Telescope→Dashboard**, and the SoftGate color will reflect its health in **Net→Topology**.

SoftGate-installation.rst

+1-1
Original file line numberDiff line numberDiff line change
@@ -88,4 +88,4 @@ Requires freshly installed Ubuntu Linux 22.04 LTS and internet connectivity.
8888
8989
user@host:~$ sudo reboot
9090
91-
Once the server boots up, you should see its heartbeat going from Critical to OK in **Net→Inventory**, **Telescope→Dashboard**, and the SoftGate color will reflect its health in **Net→Topology**.
91+
Once the server boots up, you should see its heartbeat going from Critical to OK in **Net→Inventory**, **Telescope→Dashboard**, and the SoftGate color will reflect its health in **Net→Topology**.

images/.directory

+4
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
[Dolphin]
2+
Timestamp=2022,10,20,16,53,15.07
3+
Version=4
4+
ViewMode=1

images/sandbox-l4lb-kubeapi.png

-12 KB
Loading

images/sandbox-l4lbs.png

-17.2 KB
Loading

images/sandbox-podinfo-prov.png

-5.57 KB
Loading

images/sandbox-podinfo-ready.png

4 KB
Loading

images/sandbox3-l4lb-kubeapi.png

-32.9 KB
Binary file not shown.

images/sandbox3-l4lbs.png

-58.1 KB
Binary file not shown.

images/sandbox3-podinfo-prov.png

-24.3 KB
Binary file not shown.

images/sandbox3-podinfo-ready.png

-32 KB
Binary file not shown.

images/sandbox_topology_n.png

-73.7 KB
Binary file not shown.

index.rst

+1-1
Original file line numberDiff line numberDiff line change
@@ -92,4 +92,4 @@ You are welcome to join our `Slack channel <https://netris.io/slack>`_ to get ad
9292
:maxdepth: 4
9393
:caption: Lab Scenarios
9494

95-
onprem-k8s
95+
sandbox/Sandbox1/onprem-k8s

installing-netris-controller.rst

+2-2
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ Installing a Netris Controller
77

88
You can install the Netris controller almost on any 64-bit Linux host. Netris Controller may or may not be on the same network as the managed network nodes are. In fact if there are multiple Netris managed deployments there’s no need for an individual controller for each deployment.
99

10-
It doesnt matter where to host the Netris controller. What matters is that the Netris controller needs to be accessible over the Internet. So you can access the console, and nodes that are going to be managed by Netris need to have access to the Netris controller through their management network interface.
10+
It doesn't matter where to host the Netris controller. What matters is that the Netris controller needs to be accessible over the Internet. So you can access the console, and nodes that are going to be managed by Netris need to have access to the Netris controller through their management network interface.
1111

1212
Linux Host requirements
1313

@@ -18,7 +18,7 @@ Linux Host requirements
1818

1919
In this example I am running my Netris controller on an AWS hosted virtual machine (EC2) which has got a public IP address 54.219.211.71. While it is OK for users and nodes to refer to the Netris Controller through an IP address, I like using a DNS record (this way it will be easier to potentially move Netris Controller somewhere with a different IP address).
2020

21-
Im using Cloudflare to create this “example-netris-controller.netris.dev” DNS record to point to the public IP address of my EC2 : 54.219.211.71.
21+
I'm using Cloudflare to create this “example-netris-controller.netris.dev” DNS record to point to the public IP address of my EC2 : 54.219.211.71.
2222

2323
.. image:: images/cloudflare-dns-record.png
2424
:align: center

ipam.rst

+7-7
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ There are 2 main types of IP prefixes - allocation and subnet. Allocations are I
2424
:alt: IPAM Tree View
2525
:class: with-shadow
2626

27-
IPAM Tree View
27+
IPAM Tree View
2828

2929
--------------------------
3030

@@ -54,7 +54,7 @@ Add an Allocation
5454
:class: with-shadow
5555
:alt: Add a New IP Allocation
5656

57-
Add Allocation Window
57+
Add Allocation Window
5858

5959
--------------------------
6060

@@ -86,11 +86,11 @@ Add a Subnet
8686
- *management* - subnet which specifies the out-of-band management IP addresses for Netris hardware (switches and softgates).
8787
- *load-balancer* - hosts of this subnet are used in L4LB services only. Useful for deploying on-prem kubernetes with cloud-like experience.
8888
- *nat* - hosts of this subnet or subnet itself can be used to define NAT services.
89-
- *inactive* - cant be used in any services, useful for reserving/documenting prefixes for future use.
89+
- *inactive* - can't be used in any services, useful for reserving/documenting prefixes for future use.
9090

9191
.. image:: images/add-subnet.png
92-
:align: center
93-
:alt: Add a New Subnet
94-
:class: with-shadow
92+
:align: center
93+
:alt: Add a New Subnet
94+
:class: with-shadow
9595

96-
Add Subnet Window
96+
Add Subnet Window

l3-load-balancer.rst

+13-13
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
.. meta::
2-
:description: Layer-3 Load Balancer (Anycast)
2+
:description: Layer-3 Load Balancer (Anycast)
33

44
.. _l3lb_def:
55

@@ -23,22 +23,22 @@ To configure L3 (Anycast) load balancing:
2323
#. This will create a service under Services→Load Balancer and permit using the Anycast IP address in multiple ROH instances.
2424

2525
.. image:: images/add-l3-lb.png
26-
:align: center
27-
:class: with-shadow
28-
:alt: Add a L3 LB
26+
:align: center
27+
:class: with-shadow
28+
:alt: Add a L3 LB
2929

30-
Example: Adding an Anycast IPv4 address
30+
Example: Adding an Anycast IPv4 address
3131

3232
.. image:: images/list-l3-lb.png
33-
:align: center
34-
:class: with-shadow
35-
:alt: List L3 LBs
33+
:align: center
34+
:class: with-shadow
35+
:alt: List L3 LBs
3636

37-
Example: Under Services→Load Balancer, you can find the listing of L3 (Anycast) Load Balancers, service statuses, and you can add/remove more ROH instances and/or health checks.
37+
Example: Under Services→Load Balancer, you can find the listing of L3 (Anycast) Load Balancers, service statuses, and you can add/remove more ROH instances and/or health checks.
3838

3939
.. image:: images/list-l3-lb-detail.png
40-
:align: center
41-
:class: with-shadow
42-
:alt: List L3 LB Details
40+
:align: center
41+
:class: with-shadow
42+
:alt: List L3 LB Details
4343

44-
Screenshot: L3 (Anycast) Load Balancer Detail
44+
Screenshot: L3 (Anycast) Load Balancer Detail

l4-load-balancer.rst

+9-8
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
.. meta::
22
:description: Netris Services and Configuration Examples
33

4+
.. _l4lb_def:
45

56
#######################
67
L4 Load Balancer (L4LB)
@@ -16,17 +17,17 @@ The IP address pool for L4LB can be defined in the Net→IPAM section by adding
1617
Example: Adding a load-balancer IP pool assignment.
1718

1819
.. image:: images/add-allocation.png
19-
:align: center
20-
:class: with-shadow
21-
:alt: Add an IP Allocation
20+
:align: center
21+
:class: with-shadow
22+
:alt: Add an IP Allocation
2223

2324

2425
Screenshot: Listing of Net→IPAM after adding a load-balancer assignment
2526

2627
.. image:: images/list-subnets.png
27-
:align: center
28-
:class: with-shadow
29-
:alt: List IP Subnets
28+
:align: center
29+
:class: with-shadow
30+
:alt: List IP Subnets
3031

3132

3233
Consuming L4LB service
@@ -73,11 +74,11 @@ Add new L4 Load Balancer fields are described below:
7374
:class: with-shadow
7475
:alt: Request an L4 Load Balancer
7576

76-
Example: Requesting an L4 Load Balancer service.
77+
Example: Requesting an L4 Load Balancer service.
7778

7879
.. image:: images/list-l4-load-balancers.png
7980
:align: center
8081
:class: with-shadow
8182
:alt: List L4 Load Balancers
8283

83-
Example: Listing of L4 Load Balancer services
84+
Example: Listing of L4 Load Balancer services

network-policies.rst

+44-39
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,10 @@ Example: Declare a basic BGP neighbor
2828
:class: with-shadow
2929

3030
Example2: Declare BGP neighbor terminated on V-Net. Netris will automatically configure BGP session on the switch closest to the remote IP.
31+
3132
.. image:: images/add-bgp-basic-2.png
32-
:align: center
33-
:class: with-shadow
33+
:align: center
34+
:class: with-shadow
3435

3536

3637
############
@@ -45,7 +46,6 @@ Click Advanced to expand the BGP neighbor add/edit window.
4546
:widths: 25, 75
4647
:header-rows: 0
4748

48-
4949
--------------------------
5050

5151
BGP Objects
@@ -139,18 +139,20 @@ Located under Net→Routes is a method for describing static routing policies th
139139
We recommend using the Routes only if BGP is not supported by the remote end.
140140

141141
| Typical use cases for static routing:
142+
142143
* To connect the switch fabric to an ISP or upstream router in a situation where BGP and dual-homing are not supported.
143144
* Temporary interconnection with the old network for a migration.
144145
* Routing a subnet behind a VM hypervisor machine for an internal VM network.
145146
* Specifically routing traffic destined to a particular prefix through an out-of-band management network.
146147

147148
| Add new static route fields description:
149+
148150
* **Prefix** - Route destination to match.
149151
* **Next-Hop** - Traffic destined to the Prefix will be routed towards the Next-Hop. Note that static routes will be injected only on units that have the Next-Hop as a connected network.
150152
* **Description** - Free description.
151153
* **Site** - Site where Route belongs.
152154
* **State** - Administrative (enable/disable) state of the Route.
153-
* **Apply to** - Limit the scope to particular units. Its typically used for Null routes.
155+
* **Apply to** - Limit the scope to particular units. It's typically used for Null routes.
154156

155157

156158
Example: Default route pointing to a Next-Hop that belongs to one of V-NETs.
@@ -201,45 +203,46 @@ Example: Adding NAT IP addresses and NAT IP Address Pools to a SoftGate node.
201203
:align: center
202204
:class: with-shadow
203205

206+
204207
Defining NAT rules
205208
------------------
206209
NAT rules are defined under Net→NAT.
207210

208211
.. list-table:: NAT Rule Fields
209-
:widths: 25 75
210-
:header-rows: 1
211-
212-
* - Name
213-
- Unique name
214-
* - **State**
215-
- State of rule (enabled or disabled)
216-
* - **Site**
217-
- Site to apply the rule
218-
* - **Action**
219-
- *SNAT* - Replace the source IP address with specified NAT IP along with port overloading
220-
*DNAT* - Replace the destination IP address and/or destination port with specified NAT IP
221-
*ACCEPT* - Silently forward, typically used to add an exclusion to broader SNAT or DNAT rule
222-
*MASQUERADE* - Replace the source IP address with the IP address of the exit interface
223-
* - **Protocol**
224-
- *All* - Match any IP protocol
225-
*TCP* - Match TCP traffic and ports
226-
*UDP* - Match UDP traffic and ports
227-
*ICMP* - Match ICMP traffic
228-
* - **Source**
229-
- *Address* - Source IP address to match
230-
*Port* - Source ports range to match with this value (TCP/UDP)
231-
* - **Destination**
232-
- *Address* - Destination IP address to match. In the case of DNAT it should be one of the predefined NAT IP addresses
233-
*Port* - For DNAT only, to match a single destination port
234-
*Ports* - For SNAT/ACCEPT only. Destination ports range to match with this value (TCP/UDP)
235-
* - **DNAT to IP**
236-
- The global IP address for SNAT to be visible on the Public Internet. The internal IP address for DNAT to replace the original destination address with
237-
* - **DNAT to Port**
238-
- The Port to which destination Port of the packet should be NAT'd
239-
* - **Status**
240-
- Administrative state (enable/disable)
241-
* - **Comment**
242-
- Free optional comment
212+
:widths: 25 75
213+
:header-rows: 1
214+
215+
* - Name
216+
- Unique name
217+
* - **State**
218+
- State of rule (enabled or disabled)
219+
* - **Site**
220+
- Site to apply the rule
221+
* - **Action**
222+
- *SNAT* - Replace the source IP address with specified NAT IP along with port overloading
223+
*DNAT* - Replace the destination IP address and/or destination port with specified NAT IP
224+
*ACCEPT* - Silently forward, typically used to add an exclusion to broader SNAT or DNAT rule
225+
*MASQUERADE* - Replace the source IP address with the IP address of the exit interface
226+
* - **Protocol**
227+
- *All* - Match any IP protocol
228+
*TCP* - Match TCP traffic and ports
229+
*UDP* - Match UDP traffic and ports
230+
*ICMP* - Match ICMP traffic
231+
* - **Source**
232+
- *Address* - Source IP address to match
233+
*Port* - Source ports range to match with this value (TCP/UDP)
234+
* - **Destination**
235+
- *Address* - Destination IP address to match. In the case of DNAT it should be one of the predefined NAT IP addresses
236+
*Port* - For DNAT only, to match a single destination port
237+
*Ports* - For SNAT/ACCEPT only. Destination ports range to match with this value (TCP/UDP)
238+
* - **DNAT to IP**
239+
- The global IP address for SNAT to be visible on the Public Internet. The internal IP address for DNAT to replace the original destination address with
240+
* - **DNAT to Port**
241+
- The Port to which destination Port of the packet should be NAT'd
242+
* - **Status**
243+
- Administrative state (enable/disable)
244+
* - **Comment**
245+
- Free optional comment
243246

244247

245248
Example: SNAT all hosts on 10.0.0.0/8 to the Internet using 198.51.100.65 as a global IP.
@@ -319,11 +322,13 @@ Example: Ping.
319322
:class: with-shadow
320323

321324
| Looking Glass controls described for the EVPN family.
322-
* **BGP Summary** - Show brief summary of BGP adjacencies with neighbors, interface names, and EVPN prefixes received.
325+
326+
* **BGP Summary** - Show brief summary of BGP adjacencies with neighbors, interface names, and EVPN prefixes received.
323327
* **VNI** - List VNIs learned.
324328
* **BGP EVPN** - List detailed EVPN routing information optionally for the given route distinguisher.
325329
* **MAC table** - List MAC address table for the given VNI.
326330

331+
327332
Example: Listing of adjacent BGP neighbors and number of EVPN prefixes received.
328333

329334
.. image:: images/BGP_neighbors_listing.png

roh.rst

+8-8
Original file line numberDiff line numberDiff line change
@@ -44,15 +44,15 @@ Description of ROH instance fields:
4444
.. tip:: Many switches can’t autodetect old 1Gbps ports. If attaching hosts with 1Gbps ports to 10Gpbs switch ports, you’ll need to change the speed for a given Switch Port from Auto(default) to 1Gbps. You can edit a port in Net→Switch Ports individually or in bulk.
4545

4646
.. image:: images/ROH-instance.png
47-
:align: center
48-
:class: with-shadow
49-
:alt: ROH Instances
47+
:align: center
48+
:class: with-shadow
49+
:alt: ROH Instances
5050

51-
Example: Adding an ROH instance. (Yes, you can use A.B.C.0/32 and A.B.C.255/32)
51+
Example: Adding an ROH instance. (Yes, you can use A.B.C.0/32 and A.B.C.255/32)
5252

5353
.. image:: images/ROH-listing.png
54-
:align: center
55-
:class: with-shadow
56-
:alt: ROH Listings
54+
:align: center
55+
:class: with-shadow
56+
:alt: ROH Listings
5757

58-
Expanded view of ROH listing. BGP sessions are up, and the expected IP is in fact received from the actual ROH server. Traffic stats are available per port.
58+
Expanded view of ROH listing. BGP sessions are up, and the expected IP is in fact received from the actual ROH server. Traffic stats are available per port.

0 commit comments

Comments
 (0)