You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/networking/best-practice.md
+27-23Lines changed: 27 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
sidebar_position: 6
3
-
sidebar_label: Best Practice
4
-
title: "Harvester Network Best Practice"
3
+
sidebar_label: Best Practices
4
+
title: "Harvester Network Best Practices"
5
5
keywords:
6
6
- Harvester
7
7
- Networking
@@ -12,55 +12,59 @@ keywords:
12
12
</head>
13
13
14
14
## Overview
15
+
15
16
This best practice guide introduces how to configure Harvester and the external network to achieve the following goals:
16
-
- Traffic isolation between the management plane and the data plane
17
-
- General external switch and router configurations
18
-
- Network access to VMs from different VLANs
19
-
- Access Harvester load balancers from different VLANs
17
+
- Traffic isolation between the management plane and the data plane.
18
+
- General external switch and router configurations.
19
+
- Network access to VMs from different VLANs.
20
+
- Access Harvester load balancers from different VLANs.
20
21
21
-
We will use the following diagram as an example to illustrate the best practice.
22
+
We will use the following diagram to illustrate an example and the best practices.
22
23
23
24

24
25
25
26
The diagram shows a Harvester cluster composed of two hosts. It contains:
26
-
- Hardware:
27
+
-**Hardware**:
27
28
- Two Harvester servers with dual-port network cards.
28
29
- One non-VLAN-aware switch and one VLAN-aware switch. We will use the Cisco-like configuration as an example.
29
30
- One router. We will use the Cisco-like configuration as an example.
30
31
31
-
- Cabling:
32
+
-**Cabling**:
32
33
- The NIC eth0 of the node1 is connected to the port `ethernet1/1` of the switch1, while the NIC eth0 of the node2 is connected to the port `ethernet1/2` of the switch1.
33
34
- The NIC eth1 of the node1 is connected to the port `ethernet1/1` of the switch2, while the NIC eth1 of the node2 is connected to the port `ethernet1/2` of the switch2.
34
35
- The port `ethernet1/3` of the switch1 is connected to the port `ethernet0/1` of the router.
35
36
- The port `ethernet1/3` of the switch2 is connected to the port `ethernet0/2` of the router.
36
37
37
-
- Network specification:
38
+
-**Network specification**:
38
39
- The subnet of the Harvester hosts is in the VLAN untagged network.
39
40
- All hosts are in the IPv4 subnet `10.10.0.0/24`, and the gateway IP address is `10.10.0.254`.
40
41
- The VM network allows VLAN 100-200.
41
42
- The IPv4 subnets of the VM network are:
42
-
-untagged network: `192.168.0.0/24`, and the gateway IP address is `192.168.0.254`.
43
+
-Untagged network: `192.168.0.0/24`, and the gateway IP address is `192.168.0.254`.
43
44
- VLAN 100: `192.168.100.0/24`, and the gateway IP address is `192.168.100.254`.
44
45
- VLAN 200: `192.168.200.0/24`, and the gateway IP address is `192.168.200.254`.
45
46
46
-
- Harvester configuration:
47
+
-**Harvester configuration**:
47
48
- Two cluster networks: `mgmt` and `vm`.
48
49
- Three VM networks under the cluster network `vm`: `vlan100`, `vlan200`, and `untagged`.
49
50
- Six VMs, from `VM1` to `VM6`.
50
51
- One guest cluster `demo` composed of `VM3` and `VM4`.
51
52
- Two VM load balancers and one guest Kubernetes cluster load balancer.
52
53
53
54
## Multiple Cluster Networks for Traffic Isolation
54
-
The two Harvester hosts are equipped with two NICs. Specifically, NIC `eth0` is used for the management network (mapped to the cluster network `mgmt`), while NIC `eth1` is used for the VM network (mapped to the cluster network `vm`).
55
+
56
+
The two Harvester hosts have two NICs. Specifically, NIC `eth0` is used for the management network (mapped to the cluster network `mgmt`), while NIC `eth1` is used for the VM network (mapped to the cluster network `vm`).
55
57
56
58
It's beneficial to use two cluster networks to achieve traffic isolation between the management plane and the data plane. If there is an issue with the VM network, you can still use the management network for emergency handling to ensure business continuity. Similarly, if there is a failure in the management network, VM traffic is not affected.
57
59
58
-
If your hardware is equipped with more NICs, it's recommended that you use at least two NICs for one cluster network. For example, you can use NIC `eth0` and `eth1` for the management network, and use NIC `eth2` and `eth3` for the VM network.
60
+
If your hardware has more NICs, we recommend using at least two NICs for one cluster network. For example, you can use NIC `eth0` and `eth1` for the management network and NIC `eth2` and `eth3` for the VM network.
59
61
60
62
## External Switch and Router Configuration
63
+
61
64
1.** Switch1 configuration**:
62
65
63
-
Since the management network is under the untagged network, switch1 can be a non-VLAN-aware switch. Typically, a non-VLAN-aware switch cannot be configured.
66
+
67
+
Since the management network is under the untagged network, `switch1` can be a non-VLAN-aware switch. Typically, you can't configure a non-VLAN-aware switch.
64
68
65
69
2.** Switch2 configuration**:
66
70
@@ -136,11 +140,11 @@ Set the ports `ethernet1/1`, `ethernet1/2`, and `ethernet1/3` as trunk ports, an
136
140
137
141
1.**Network connection between VM networks**:
138
142
139
-
The router configuration above uses the [`A router on a stick`](https://www.grandmetric.com/knowledge-base/design_and_configure/router-on-a-stick-approach-cisco-configuration/) technology to allow VMs among untagged network, VLAN 100, and VLAN 200 to communicate with each other. Thus, it's not required to add any more configurations to the router.
143
+
The router configuration above uses the [`A router on a stick`](https://www.grandmetric.com/knowledge-base/design_and_configure/router-on-a-stick-approach-cisco-configuration/) technology to allow VMs among untagged network, `vlan100`and `vlan200`, to communicate with each other. Thus, adding more configurations to the router is not required.
140
144
141
-
2.**Network connection between VM networks and the management network**:
145
+
1.**Network connection between VM networks and the management network**:
142
146
143
-
A feasible method to ensure network connectivity between VM networks and the management network is to manually add static routes. The following commands add static routes on the router to allow VMs in the untagged network, VLAN 100, and VLAN 200 to access the management network.
147
+
A feasible method to ensure network connectivity between VM networks and the management network is manually adding static routes. The following commands add static routes on the router to allow VMs in the untagged network, `vlan100`and `vlan200`, to access the management network.
144
148
145
149
```
146
150
router(config)# config terminal
@@ -151,7 +155,7 @@ Set the ports `ethernet1/1`, `ethernet1/2`, and `ethernet1/3` as trunk ports, an
151
155
router(config)# end
152
156
```
153
157
154
-
The route table would be like this:
158
+
The route table would look like this:
155
159
156
160
```
157
161
Router#show ip route
@@ -182,10 +186,10 @@ The Harvester load balancer is divided into two types: VM load balancer and gues
182
186
router(config)# ip route 192.168.0.0 255.255.255.0 ethernet0/2
183
187
```
184
188
185
-
2. The load balancer IP of the guest Kubernetes cluster load balancer is exposed within the VM network. In the diagram above, the guest cluster `demo` is within the VM network `vlan200` because the VMs consisting of the guest cluster are in the `vlan200`. Thus, the guest Kubernetes cluster load balancer `lb2` is exposed within the VM network `vlan200`. There are three scenarios to explain how to access `lb2` if it has obtained the load balancer IP via DHCP:
189
+
1. The load balancer IP of the guest Kubernetes cluster load balancer is exposed within the VM network. In the diagram above, the guest cluster `demo` is within the VM network `vlan200` because the VMs consisting of the guest cluster are in the `vlan200`. Thus, the guest Kubernetes cluster load balancer `lb2` is exposed within the VM network `vlan200`. There are three scenarios to explain how to access `lb2` if it has obtained the load balancer IP via DHCP:
186
190
- You can access it from the VM `VM3` and `VM4` directly because they are in the `vlan200`.
187
-
- You can also access it from the VMs in other VM network directly because of the `A router on a stick` configuration.
188
-
- You can access it from the Harvester hosts, or in other words, the management network by adding the following static routes on the router.
191
+
- You can also access it directly from the VMs in other VM networks because of the `A router on a stick` configuration.
192
+
- You can access it from the Harvester hosts, or in other words, the management network, by adding the following static routes on the router.
189
193
190
194
```
191
195
router(config)# ip route 10.10.0.0 255.255.255.0 ethernet0/1
@@ -195,6 +199,6 @@ The Harvester load balancer is divided into two types: VM load balancer and gues
195
199
196
200
:::note
197
201
198
-
Except for the static routes above, you can also use dynamic routing protocols such as RIP, BGP, OSPF, and ISIS according to your network planning and requirements.
202
+
Except for the static routes above, you can use dynamic routing protocols such as RIP, BGP, OSPF, and ISIS according to your network planning and requirements.
Copy file name to clipboardExpand all lines: docs/networking/deep-dive.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -113,7 +113,7 @@ External network devices typically refer to switches and DHCP servers. With a cl
113
113
| mode 5(balance-tlb) | none |
114
114
| mode 6(balance-alb) | none |
115
115
116
-
For example, if the bond mode is 802.3ad, you need to configure LACP on the switch. The following is an example of LACP configuration on Cisco switch:
116
+
For example, if the bond mode is `802.3ad`, you need to configure LACP on the switch. The following is an example of LACP configuration on a Cisco switch:
0 commit comments