Here at PANTHEON.tech, we really enjoy perfecting the user experience around VPP and creating projects based around this framework. That is why we have developed a handy tool, which lets you analyze several crucial data points while using VPP. We call it VPPTop.
Requirements
In order to run VPPTop, you will need to install these dependencies first:
VPPTop is an application for sysadmins and testers, implemented in Go. The goal of VPPTop is to provide VPP statistics which are updated in real-time, in one terminal window.
Before the release of our tool, admins could only rely on the usage of a CLI, to first request the data flow and then receive information, which are not up-to-date, nor in real-time.
Now, you can use our VPPTop tool, to find up-to-date information on your framework!
Version 1.11 supports statistics for:
Interfaces
Nodes
Errors
Memory Usage per Thread
Per Thread-Data
Version 1.11 supports these functionalities:
Clearing counters
Filter by Name
Sorting
Why should you start to use Vector Package Processing?
The main advantages are:
high performance with a proven technology
production level quality
flexible and extensible
The main advantage of VPP is, that you can plug in a new graph node, adapt it to your networks purposes and run it right away. Including a new plugin does not mean, you need to change your core-code with each new addition. Plugins can be either included in the processing graph, or they can be built outside the source tree and become an individual component in your build.
Furthermore, this separation of plugins makes crashes a matter of a simple process restart, which does not require your whole build to be restarted because of one plugin failure.
You can read more in our PANTHEON.tech series on VPP.
Ansible is a powerful automation tool, widely used by administrators for the automation of configuration and management of servers.
It started being adopted by network engineers as a tool for automation of configuration and management of networking devices (bare metal or virtual). Steps of the specific automated process are implemented as tasks, defined in YAML format. Tasks can be grouped into roles with other tasks and are executed as so-called plays, defined in another YAML file called playbook.
Playbooks also associate definitions of variables and list of hosts, where the roles and tasks will be performed. All of the mentioned (tasks, roles, playbooks, variables, hosts) can be specified as YAML files with a well-defined directory structure.
This makes Ansible suitable to be used as a base of Infrastructure as Code (IaC) approach to configuration management and orchestration in the telco industry, data centers (orchestration of virtualization and networking) & many more.
Figure A: An Ansible Playbook example structure
Ansible playbook structure
AWX provides UI and REST API on top of Ansible and also adds the management of inventories (lists of hosts and groups of hosts), credentials (SSH & more) integration with CVS (Code Versioning Systems, e.g.: Git).
In AWX, you can define job templates, which associates playbooks with repositories, credentials, configuration, etc. and you can execute them. The job templates can be used to build graphs, defining the order of execution of multiple job templates (sequentially or in parallel). Such graphs are called workflows and they can use job templates & other workflows as graph nodes.
In this article, we’re going to describe some example Ansible playbooks and Ansible modules, using an SDN controller based on lighty.io. We will also be orchestrating Open vSwitch instances as a networking infrastructure of core data centers and edge data centers. This way, we are able to build solutions, utilizing Service Functions (SFs) and Service Function Chaining (SFC), which are dedicated to a specific tenant or particular service.
Figure 1: Data Center Simulation Setup
Data Center Simulation Setup
In the above Figure 1, we can see a topology of the testing setup, where 3 virtual machines are running in a Virtual Box and connected into an L2 switch, representing the underlay network.
Each VM has an IP address, configured from the same subnet. The two VMs simulate data centers or servers respectively. In each DC VM, there is an Open vSwitch installed and running without any configuration (using the default configuration, which will be overridden by our SDN controller), together with ovs-vsctl and ovs-ofctl utilities.
In the management VM, Ansible and AWX are installed & running. Also, an SDN controller based on lighty.io. using OVSDB and OpenFlow Southbound plugins and a RESTCONF northbound plugin is in the same VM.
This way, it is possible to use the SDN controller to manage and configure Open vSwitch instances over the HTTP REST API – according to RESTCONF specification and YANG models of OVSDB and OpenFlow plugins. See the implementation of Ansible roles and Ansible module for more details regarding specific RESTCONF requests usage.
In addition to the RESTCONF requests, Ansible uses also CLI commands over SSH to create namespaces, veth links and to connect them with a bridge instance created in respective Open vSwitch instance. OpeFlow flows are used as for configuration of rules forwarding packets from one port of virtual bride to another (and vice versa). All flow configurations are being sent as RESTCONF requests to the SDN controller which forwards them to the specific bridge of specific Open vSwitch instance.
Starting our Datacenters
We will also use a simple testing command for each DC VM. The command sends 3 ICMP echo requests from the tenant’s namespace, to the other tenant’s namespace in another DC VM. The requests are being sent in an infinite loop (using the watch command). Therefore, at first, they will show that the namespaces don’t exist (because they really don’t, according to Figure 1).
But after the successful provisioning and configuration of the desired virtual infrastructure, they should show that the ping command was successful, as we will demonstrate later.
Figure 2 and Figure 3 show an example of the output of the testing commands.
DataCenter-1:
watch sudo ip netns exec t1-s1 ping -c 3 10.10.1.2
Figure 2 for DataCenter-1
DataCenter-2:
watch sudo ip netns exec t1-s2 ping -c 3 10.10.1.1
Figure 3 for DataCenter-2
The playbooks and the Ansible module made for this democan be executed directly from CLI (see README.md) or used with AWX. We have made a workflow template in AWX, which executes playbooks in the correct order. You can see the graph of execution in Figure 4:
Figure 4: Graph of Playbook Execution
Tenant provisioning with SFC and vFW SF workflow execution
After successful execution of the workflow, we have a provisioned and configured network namespace in each DC VM, which is connected to the newly created bridge in each respective Open vSwitch. There’s also another namespace in DC-1 VM which is connected to the bridge while using two veth links.
One link for traffic to/from tenant’s namespace
One for traffic to/from the tunnel interface
The tunnel interface is also connected to the bridge and uses the VXLAN ID 123. The bridge in each Open vSwtich instance is configured by adding OpenFlow flows forwarding packets between ports of the bridge. The network namespace in the DC 1 VM called v-fw, is used for an SF, which implements a virtual firewall using Linux bridge (br0) and iptables.
After provisioning of the SF, both veth links are connected into the Linux bridge and iptables are empty so all packets (frames) can traverse the virtual firewall SF. The resulting system is displayed in Figure 5.
Figure 5 – Resulting structure of our system
Resulting system after successful provisioning
Now, if we would check the testing ping commands, we can see that the ICMP packets are able to reach the destination, see Figure 6. and Figure 7.
Figure 6 – Successful ping commands in each direction (DataCenter-1)
Figure 7 – Successful ping commands in each direction (DataCenter-2)
The Path of ICMP Packets
In Figure 8, there are details of OpenFlow flows configured during provisioning in each bridge in the Open vSwtich instances.
The ICMP packet is not the first packet in communication, initiated by the ping command. It is an ARP broadcast, which traverses the same path as ICMP packets.
Here’s a description of the path traversed by ICMP packets from t1-s1 to t1-s2:
ICMP request message starting from the namespace t1-s1, with the destination in t1-s2. It is forwarded from veth1 interface of t1-s1 and received in the interface t1-s1-veth1 of the bridge t1-br1
There is a configured flow, which forwards every single L2 frame (not only L3 packet) received at port t1-s1-veth1, to the port v-fw-veth2. This is connected into the v-fw namespace
The packet is received at veth2 of v-fw and is forwarded by br0 to veth3. Since there aren’t any iptables rules configured yet, the packet is forwarded through veth3 outside the v-fw SF
The packet is received at v-fw-veth3 port of t1-br1 and there is an applied rule for forwarding each packet (frame) received at v-fw-veth3, directly to the tun123 port
The port tun123 is a VXLAN tunnel interface, with VNI (VXLAN Network Identifier) set to 123. Each L2 frame traversing the tun123 port is encapsulated into VXLAN frame (outer Ethernet, IP, UDP and VXLAN headers are added before the original – inner – L2 frame)
Now the destination IP address of the packet becomes 192.168.10.20 (according to the configuration of the VXLAN tunnel interface) and is forwarded by the networking stack of the DC-1 VM’s host OS, through the enp0s8 interface to the underlying network
The underlying network forwards the packet to DC-2 VM, through the enp0s8 and the host OS networking stack. It finally reaches the tun123 interface of the bridge t1-br2
The VXLAN packet is decapsulated and the original ICMP packet is forwarded from tun123 to t1-s2-veth1, according to the OpenFlow flows in t1-br2
Now, it is received in t1-s2 at the interface of veth1 and processed by the networking stack in the namespace. The ICMP echo reply is sent through the same path back to the t1-s1 in the DC-1 VM
Figure 8: Detail of the OpenFlow flows configured in the bridges in Open vSwitch instances
Using the iptables as a Virtual Firewall
Now, we can use the Virtual Firewall SF and apply some iptables rules to the traffic, generated by the ping commands. Here is an example of the command, submitted at DC1 VM, which executes the iptables command in the v-fw namespace. The iptables command adds a rule to the FORWARD chain, which drops an ICMP echo (request) packets and the rule is applied at veth3 interface:
sudo ip netns exec v-fw iptables -A FORWARD -p icmp --icmp-type 8 -m state --state NEW,ESTABLISHED,RELATED -m physdev --physdev-in veth3 -j DROP
Result of this rule can be seen in Figure 9 and Figure 10. The ICMP traffic has now dropped. Not only in case of direction from DC2 to DC1, but also in the reverse direction (from DC1 to DC2), which also works.
Figure 9: The ping commands after the iptables role applied (DataCenter-1)
Figure 10: The ping commands after the iptables role applied (DataCenter-2)
Ansible playbooks & module
We’re going to take a closer look at the playbooks. These are used for the provisioning of the infrastructure above. We will follow the graph from Figure 4, where the workflow template execution is shown. The template only executes job templates, which are associated with exactly one playbook.
Each playbook made for this demo uses the same configuration structure, which has been designed to be easily extensible and re-usable for other scenarios, which use the same playbooks.
See the following block, showing the example configuration used for this demo. The same configuration in JSON format is stored in our repository, as cfg/cfg_example.json. Here are the main decisions, which will help us to achieve the desired re-usability:
The configuration contains a list of configurations for each DC, called cfg_list. The playbook performs a lookup of the specific configuration, according to items “id” or “tun_local_ip“, which must match with the DC’s hostname or IP address respectively
The single cfg_list item related to specific DC may include a configuration of SFC as “sf_cfg” item. If this configuration exists, then the SFC provisioning playbook (apb_set_chaining.yaml) will be executed for this DC (DC1 is an example in this demo)
For the DC which doesn’t have specific SFC configuration, simple provisioning (apb_set_flows.yaml) is used, which interconnects tenant’s namespace with the tunnel interface (DC2 is an example in this demo)
Here is a short description of each job template & related playbook together, with the source code of the playbook. These include more detailed comments regarding the steps (tasks and roles) executed by each play of the playbook:
1. SET_001_SDN_tenant_infra is the job template which executes playbook apb_set_tenant.yaml. This playbook creates and connects tenant’s namespaces, bridges, veth links and VXLAN tunnel. See Figure 11, for how does the system look like after the execution of this playbook.
Figure 11: The state of the infrastructure after the execution of SET_001_SDN_tenant_infra template
# Read the configuration of the current host and create tenant's namespace and veth.
# Connect one end of the veth to the namespace and configure IP address and set the
# interface UP.
# Configure also OVS to use SDN controller as OVSDB manager.
- hosts: all
serial: 1
roles:
- read_current_host_cfg
- set_tenant_infra
# Send request to the SDN controller which connects the SDN controller to the OVS.
# Use SDN controller to create tenant's bridge in the OVS and connect
# the veth also into the bridge.
# Create also tunnel interface using VXLAN encapsulation and connect
# it to the bridge. (Linux kernel of the host OS will take care of
# forwarding packets to/from the tunnel)
- hosts: all
connection: local
serial: 1
roles:
- set_tenant_infra_cfg
# Setup OpenFlow connection from the bridge in OVS to the SDN controller.
# It must be done here because when the bridge connects to OpenFlow controller it deletes
# all interfaces and flows configured previously
- hosts: all
serial: 1
roles:
- role: cfg_ovs_br_ctrl
when: current_host_cfg.of_ctrl is defined
2. SET_002_SF_chaining executes playbook apb_set_chaining.yaml, which is executed for hosts which have specified the “sf_cfg” item in their configuration so in this demo it is DC1 only. This playbook runs in parallel with the SET_002_tenant_flows template and it creates a namespace for SF and required two veth links and connections. The playbook also configures the corresponding OpenFlow flows in the bridge.
See Figure 12, where you can see the difference after the successful execution.
Figure 12: The state of the infrastructure after the execution of SET_002_SF_chaining template
# Find the configuration for the current host and configure SFC infrastructure
# if the configuration contains item: sf_cfg
# The SFC infrastructure consists of two veth links and one namespace for the SF.
# Connect both links to the SF namespace by one side and to the tenant's bridge by
# the other side. Set links to UP state.
- hosts: all
roles:
- read_current_host_cfg
- role: set_sf_chaining_infra
vars:
con_defs:
- "{{ current_host_cfg.sf_cfg.con_left }}"
- "{{ current_host_cfg.sf_cfg.con_right }}"
when: current_host_cfg.sf_cfg is defined
# Use the SDN controller to configure OpenFlow flows which set up the forwarding
# of packets between ports in the tenant's bridge (veth links and the VXLAN tunnel).
- hosts: all
connection: local
roles:
- role: set_sf_chaining_cfg
when: current_host_cfg.sf_cfg is defined
3. SET_002_tenant_flows executes playbook apb_set_flows.yaml which is executed for hosts, which don’t have the “sf_cfg” item specified in their configuration, in this demo it is DC2. This playbook is executed parallel to SET_002_SF_chaining template and it just configures OpenFlow flows in the bridge, since everything has already been created and connected by SET_001_SDN_tenant_infra template. See Figure 13.
Figure 13: The state of the infrastructure after the execution of SET_002_tenant_flows template
# When the sf_cfg item of the current host's configuration is not defined then
# use the SDN controller and configure simple flows forwarding packets between
# veth link and the VXLAN tunnel interface.
- hosts: all
connection: local
roles:
- read_current_host_cfg
- role: set_tenant_flows
when: current_host_cfg.sf_cfg is not defined
4. SET_003_SF_bridge is the job template, executing apb_set_bridge.yaml playbook. This creates a Linux bridge in the SF namespace for hosts with the “sf_cfg” defined. Both veth links of the SF namespace are connected to the Linux bridge. See Figure 14.
Figure 14: The state of the infrastructure after the execution of SET_003_bridge template
# Create linux bridge in the SF namespace and connect veth links to the
# linux bridge and set the bridge UP.
- hosts: all
roles:
- read_current_host_cfg
- role: create_bridge_in_ns
vars:
net_ns_name: "{{ current_host_cfg.sf_cfg.sf_id }}"
int_list:
- "{{ current_host_cfg.sf_cfg.con_left.name }}"
- "{{ current_host_cfg.sf_cfg.con_right.name }}"
when: current_host_cfg.sf_cfg is defined
Playbooks used in this demo are not idempotent, so they can’t be executed successfully multiple times in a row. Instead, we have implemented two groups of playbooks.
One group sets all the stuff used in this demo. Another group deletes and un-configures everything and ignores possible errors of particular steps (tasks) so you can use it for cleaning of the setup, if necessary.
De-provisioning
We have also implemented three playbooks, which delete changes made by the provisioning playbooks. We have created a workflow in AWX running these playbooks in the correct order.
Figure 15: Tenant de-provisioning with SFC and vFW SF workflow execution
Multitenancy and isolation
In Figure 16, there’s an example where the second tenant is added. The tenant has two servers – one in each DC. The setup for the second tenant is simple, without SFC. As you can see the tenant has its own virtual bridge in each Open vSwitch instance.
IP addresses in the new tenant’s servers are identical with IP addresses in the first tenant servers. This is possible due to the traffic of each tenant being isolated, using extra virtual bridges and different VXLAN tunnels for each tenant or service.
The new tenant can be added, using the same group of playbooks and the same workflow template. The only thing which needs to be changed is the configuration used with the workflow template. See the example below in Figure 16.
Figure 16: After the second tenant is added
Configuration example for the second tenant provisioning:
In this demo, we have used an SDN controller based on lighty.io for the configuration of Open vSwitch instances over OVSDB and OpenFlow protocols. The usage of the SDN controller brings the following benefits:
1. Unified REST HTTP API: The data of orchestrated devices (in this case Open vSwitch instances) which allows building upper layer services using this API (e.g. dashboards, analytics, automation and more).
In Figure 17, a screenshot of the Web UI of the OpenFlow is shown, shoving data into four OpenFlow bridges, which are configured after the second tenant has been added. You can see also details of specific flow matching, in port with the action of the type Output port.
2. Caching: The controller allows for caching of the state and configuration of the orchestrated device. The cached configuration can be persistently stored and pushed into the device after re-start of the managed device.
3. Addition logic implementation:e.g. monitoring, resource management, authorization, and accounting or decision making according to an overview of the whole network.
4. Additional deployment: Controllers can be deployed as a geo-distributed clustered registry of multi-vendor networking devices, of the whole core DC network, backbone networks or Edge DC networks.
This way, you can access all the data you need from all of your networking devices, on the path from the core DC to the edge and RAN (Radio Access Network).
5. Underlay Networking: The SDN controllers, based on lighty.io, can be used not only for configuration, orchestration, and monitoring of virtualized networking infrastructure and overlay networking, but also for underlay networking.
Figure 17: Screenshot of the OFM WEB UI, of the SDN controllers OpenFlow data
What have we done today?
We have demonstrated the usage of Ansible, AWX and an SDN controller based on lighty.io, for automation of provisioning of services for multi-tenant data centers.
We have implemented Ansible playbooks and modules for orchestration of virtualized networking infrastructure and provisioning of tenant’s containers (simulated by namespaces). The playbooks and the module can be re-used for multiple use cases and scenarios an can be extended according to specific needs.
You could see how to utilize Open vSwitch and its OpenFlow capable virtual bridges for the creation of an isolated, virtual network infrastructure and Service Function Chaining (SFC). Open vSwitch bridges can be replaced by any OpenFlow capable switch (virtual or bare metal) in real deployments in core data centers or at the edge.
Also, networking devices without OpenFlow support can be used if they implement some “SDN ready” management interface, e.g.: NETCONF, RESTCONF or gNMI.
All of the components used in this demo, including the SDN controller, can be easily integrated into microservices architectures and deployed as Cloud Native applications (services).
Adding upper layer services (dashboards, monitoring, automation, business logic, etc.) you can continuously build solutions for your SDN networks, edge computing or 5G networks.
The main goal of this project is to create a Docker container, that can be connected to an existing network and provide route-reflector functionality. We are using OpenDaylight-BGP plugin for this demonstration.
What is a BGP route-reflector?
The Border Gateway Protocol (BGP) is a routing protocol, designed for TCP/IP internets. Since the Internal BGP (IBGP) peers must follow the rule:
“don’t forward routing information received from one IBGP peer to another IBGP peer”
To prevent loops, all BGP speakers within a single autonomous system must be fully meshed. This way, external routing information can be re-distributed to all other routers within that autonomous system. This operation often represents a serious scaling problem.
The design of a method known as “route reflection“ was introduced, to alleviate the need for “full mesh” peering.
This approach allows one IBGP to act as a route-reflector and all IBGP peers will send routing information only to that peer. This peer will, in turn, forward it to all other peers. A full-mesh topology is changed to a star topology.
Some background on Networking
Let’s take an example of the following topology:
BGP Router Reflector Topology – Example
Firstly, let’s break down what we see in the picture. We have 4 docker containers connected with two docker networks. Typically, networks with 2 nodes connected use /31 or /30 masks. However, since Docker also connects the host to the network (with .1 host address), these masks are not applicable in this case.
We will use Docker auto-generated networks in this example.
cEOS Nodes
cEOS (containerized EOS) is an operating system for network devices from Arista (similar to IOS from Cisco). cEOS with “common” CLI, distribution and a Docker container, provides an easy to use solution for this demo. An important thing for this example is, that cEOS creates a port for every ethX port (except eth0), which is bridged with it. It automatically names it etX. These newly created etX ports are accessible and configurable from cEOS Cli and on start are in switching mode (meaning they don’t have an IP address assigned). We will come back to these ports during the configuration part.
172.18.0.1 – host, assigned automatically on network creation
172.18.0.2 – cEOS1, first container started in the network, assigned automatically on start
172.18.0.3 – cEOS2, second container started in the network, assigned automatically on start
172.18.0.4 – lighty–bgp, third container started in the network, assigned automatically on start
172.18.0.5 – cEOS1, configured manually via CLI
172.18.0.6 – cEOS2, configured manually via CLI
net2 (172.19.0.0/16)
172.19.0.1 – host, assigned automatically on network creation
172.19.0.2 – cEOS1, first container started in the network, assigned automatically on start
172.19.0.3 – cEOS3, second container started in the network, assigned automatically on start
172.19.0.4 – cEOS1, configured manually via CLI
172.19.0.4 – cEOS3, configured manually via CLI
Additionally, we are using loopbacks to simulate connected networks, which will be the target of routing information exchange and serve us as a connectivity test tools:
cEOS1 – 192.168.1.0/24
cEOS2 – 192.168.2.0/24
cEOS3 – 192.168.3.0/24
Routing
Our goal is to be able to reach the loopback networks between themselves. For that, we need BGP to advertise loopback networks between nodes.
In this example, we are using two autonomous systems to have both types of peers (IBGP and EBGP).
AS 50 – cEOS1, cEOS2, lighty bgp
AS60 – cEOS3
To demonstrate route-reflector functionality cEOS1 and cEOS2 doens’t make a IBGP pair but create pair with lighty-bgp instead which act as a route-reflector. cEOS1 and cEOS3 creates EBGP pair.
Container with lighty-bgp MUST NOT be used as forwarding node, since it doesn’t know how to manipulate the routing table.
Prerequisites
lighty-BGP plugin
The plugin provides a “starting point” for ODL BGP bundles. We will use a Docker image, linked also in the next steps.
Right now, we have our environment ready. We can check available ports in the container:
~$ sudo docker exec ceos1 ip addr
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/24 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: fwd0: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1488 qdisc pfifo_fast state UNKNOWN group default qlen 1000
link/ether f2:f8:bb:5f:77:bd brd ff:ff:ff:ff:ff:ff
inet6 fe80::f0f8:bbff:fe5f:77bd/64 scope link
valid_lft forever preferred_lft forever
3: et1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 9214 qdisc pfifo_fast state UP group default qlen 1000
link/ether 02:42:ac:11:3e:b8 brd ff:ff:ff:ff:ff:ff
4: et2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 9214 qdisc pfifo_fast state UP group default qlen 1000
link/ether 02:42:ac:11:3e:b8 brd ff:ff:ff:ff:ff:ff
5: fabric: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 10000 qdisc pfifo_fast state UNKNOWN group default qlen 1000
link/ether 02:42:ac:11:3e:b8 brd ff:ff:ff:ff:ff:ff
inet6 fe80::42:acff:fe11:3eb8/64 scope link
valid_lft forever preferred_lft forever
6: eth0@if7: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default
link/ether 02:42:ac:11:00:02 brd ff:ff:ff:ff:ff:ff link-netnsid 0
inet 172.17.0.2/16 scope global eth0
valid_lft forever preferred_lft forever
inet6 fe80::42:acff:fe11:2/64 scope link
valid_lft forever preferred_lft forever
7: cpu: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UNKNOWN group default qlen 1000
link/ether 22:ff:2a:84:50:f2 brd ff:ff:ff:ff:ff:ff
inet6 fe80::20ff:2aff:fe84:50f2/64 scope link
valid_lft forever preferred_lft forever
8: eth1@if9: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default
link/ether 02:42:ac:12:00:02 brd ff:ff:ff:ff:ff:ff link-netnsid 0
inet 172.18.0.2/16 scope global eth1
valid_lft forever preferred_lft forever
inet6 fe80::42:acff:fe12:2/64 scope link
valid_lft forever preferred_lft forever
10: eth2@if11: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default
link/ether 02:42:ac:13:00:02 brd ff:ff:ff:ff:ff:ff link-netnsid 0
inet 172.19.0.2/16 scope global eth2
valid_lft forever preferred_lft forever
inet6 fe80::42:acff:fe13:2/64 scope link
valid_lft forever preferred_lft forever
Here, we can see both eth and et port we mentioned earlier. et ports don’t have an IP address, because we didn’t configure it yet.
In this state, only connections to directly connected networks are working.
Configure Arista nodes
Firstly, configure IP addresses to etX ports from the topology picture are created by EOS and only accessible from CLI. Therefore, we are using IP addresses from etX ports.
Now we have BGP configured and peering between cEOS1 and cEOS3 should be up. Rest of connections are idle.
~$ sudo docker exec -ti ceos1 Cli
ceos1>enable
ceos1#show ip bgp summary
BGP summary information for VRF default
Router identifier 172.19.0.4, local AS number 50
Neighbor Status Codes: m - Under maintenance
Neighbor V AS MsgRcvd MsgSent InQ OutQ Up/Down State PfxRcd PfxAcc
172.18.0.4 4 50 7 7 0 0 00:00:23 Connect
172.19.0.5 4 60 7 7 0 0 00:03:57 Estab 0 0
ceos1#
Also, routing tables contain only directly connected routes:
~$ sudo docker exec -ti ceos1 Cli
ceos1>enable
ceos1#show ip route
VRF: default
Codes: C - connected, S - static, K - kernel,
O - OSPF, IA - OSPF inter area, E1 - OSPF external type 1,
E2 - OSPF external type 2, N1 - OSPF NSSA external type 1,
N2 - OSPF NSSA external type2, B I - iBGP, B E - eBGP,
R - RIP, I L1 - IS-IS level 1, I L2 - IS-IS level 2,
O3 - OSPFv3, A B - BGP Aggregate, A O - OSPF Summary,
NG - Nexthop Group Static Route, V - VXLAN Control Service,
DH - DHCP client installed default route, M - Martian
Gateway of last resort is not set
C 172.18.0.0/16 is directly connected, Ethernet1
C 172.19.0.0/16 is directly connected, Ethernet2
ceos1#
5. Add some loopbacks to simulate networks and propagate them via BGP:
Since we still didn’t configure lighty-bgp, we only receive the exchanged information between cEOS1 and cEOS3. Any connection from cEOS2 is still not registered:
~$ sudo docker exec -ti ceos1 Cli
ceos1>enable
ceos1#show ip route
VRF: default
Codes: C - connected, S - static, K - kernel,
O - OSPF, IA - OSPF inter area, E1 - OSPF external type 1,
E2 - OSPF external type 2, N1 - OSPF NSSA external type 1,
N2 - OSPF NSSA external type2, B I - iBGP, B E - eBGP,
R - RIP, I L1 - IS-IS level 1, I L2 - IS-IS level 2,
O3 - OSPFv3, A B - BGP Aggregate, A O - OSPF Summary,
NG - Nexthop Group Static Route, V - VXLAN Control Service,
DH - DHCP client installed default route, M - Martian
Gateway of last resort is not set
C 172.18.0.0/16 is directly connected, Ethernet1
C 172.19.0.0/16 is directly connected, Ethernet2
C 192.168.1.0/24 is directly connected, Loopback0
B E 192.168.3.0/24 [200/0] via 172.19.0.5, Ethernet2
ceos1#
Since cEOS3 network is known to cEOS1, its connectivity should work:
~$ sudo docker exec -ti ceos1 Cli
ceos1>enable
ceos1#ping 192.168.3.1 source lo0
PING 192.168.3.1 (192.168.3.1) from 192.168.1.1 : 72(100) bytes of data.
80 bytes from 192.168.3.1: icmp_seq=1 ttl=64 time=18.1 ms
80 bytes from 192.168.3.1: icmp_seq=2 ttl=64 time=19.8 ms
80 bytes from 192.168.3.1: icmp_seq=3 ttl=64 time=67.5 ms
80 bytes from 192.168.3.1: icmp_seq=4 ttl=64 time=48.7 ms
80 bytes from 192.168.3.1: icmp_seq=5 ttl=64 time=30.8 ms
--- 192.168.3.1 ping statistics ---
5 packets transmitted, 5 received, 0% packet loss, time 85ms
rtt min/avg/max/mdev = 18.160/37.050/67.542/18.747 ms, pipe 3, ipg/ewma 21.436/27.970 ms
ceos1#
Be sure to use the ping command with “source lo0” part!
Without it, the source IP address will be taken from the outgoing port (172.19.0.2 in this case) and you could be misled, that cEOS3 knows about 192.168.2.0/24 network.
Just to verify that cEOS1 doesn’t know how to reach cEOS2 network:
~$ sudo docker exec -ti ceos1 Cli
ceos1>enable
ceos1#ping 192.168.2.1 source lo0
PING 192.168.2.1 (192.168.2.1) from 192.168.1.1 : 72(100) bytes of data.
From 192.168.1.1 icmp_seq=1 Destination Host Unreachable
From 192.168.1.1 icmp_seq=2 Destination Host Unreachable
From 192.168.1.1 icmp_seq=3 Destination Host Unreachable
From 192.168.1.1 icmp_seq=4 Destination Host Unreachable
--- 192.168.2.1 ping statistics ---
5 packets transmitted, 0 received, +4 errors, 100% packet loss, time 4015ms
pipe 4
ceos1#
Configure BGP
Here comes the crucial part. We will configure peers on lighty-BGP, which establishes a connection and performs routing information exchange. There is a lot of stuff to configure, so I am going to add comments to break it down a little here.
From lighty-BGP postman collection, use “BGP protocols” to configure BGP and neighbors.
Now, you can verify that all connections should be up & running:
~$ sudo docker exec -ti ceos1 Cli
ceos1>enable
ceos1#show ip bgp summary
BGP summary information for VRF default
Router identifier 172.19.0.4, local AS number 50
Neighbor Status Codes: m - Under maintenance
Neighbor V AS MsgRcvd MsgSent InQ OutQ Up/Down State PfxRcd PfxAcc
172.18.0.4 4 50 33 37 0 0 00:00:53 Estab 1 1
172.19.0.5 4 60 50 53 0 0 00:45:28 Estab 1 1
ceos1#show ip route
VRF: default
Codes: C - connected, S - static, K - kernel,
O - OSPF, IA - OSPF inter area, E1 - OSPF external type 1,
E2 - OSPF external type 2, N1 - OSPF NSSA external type 1,
N2 - OSPF NSSA external type2, B I - iBGP, B E - eBGP,
R - RIP, I L1 - IS-IS level 1, I L2 - IS-IS level 2,
O3 - OSPFv3, A B - BGP Aggregate, A O - OSPF Summary,
NG - Nexthop Group Static Route, V - VXLAN Control Service,
DH - DHCP client installed default route, M - Martian
Gateway of last resort is not set
C 172.18.0.0/16 is directly connected, Ethernet1
C 172.19.0.0/16 is directly connected, Ethernet2
C 192.168.1.0/24 is directly connected, Loopback0
B I 192.168.2.0/24 [200/0] via 172.18.0.3, Ethernet1
B E 192.168.3.0/24 [200/0] via 172.19.0.5, Ethernet2
ceos1#ping 192.168.2.1 source lo0
PING 192.168.2.1 (192.168.2.1) from 192.168.1.1 : 72(100) bytes of data.
80 bytes from 192.168.2.1: icmp_seq=1 ttl=64 time=9.67 ms
--- 192.168.2.1 ping statistics ---
5 packets transmitted, 1 received, 80% packet loss, time 47ms
rtt min/avg/max/mdev = 9.672/9.672/9.672/0.000 ms, ipg/ewma 11.772/9.672 ms
ceos1#
Furthermore, you can verify the advertised routes in BGP datastore with a second request in the collection. That is the GET “OPER rib” of BGP-rib entries.
Route reflection provides the network with a feature for BGP speakers, to directly peer with a route reflector. We have successfully managed to simulate a route reflector with the help of the ODL-BGP plugin, lighty.io & some additional configuration.
In the span of 3 days, keynotes and presentations were held with notable personalities and companies from various network companies & technological giants.
“The networking part, was a welcoming mixture of old acquaintances & new faces interested in our products, solutions and in the company in general.”
“It was crucial to present our ideas, concepts & goals by short messages or few slides. Since the approximate time of our booth visit was 2-3 minutes, I had to precisely focus and point out why we matter.” (who is saying it?) This was not an easy task since there were companies like Ericsson, Intel, Huawei or IBM at the conference.
Our Skydive/VPP Demo
“Before the actual conference, we were asked to come up with potential demo ideas, which would be presented at ONS. Our SkyDive – VPP Integrationdemo was accepted and opened the doors to a wide interest in PANTHEON.tech.” As Juraj recollects, after the keynote, waves of visitors swarmed the nearest booths, including ours and our Skydive – VPP Integration demo:
Skydive is an open-source, real-time network topology, and protocols analyzer. It aims to provide a comprehensive way of understanding what is happening in the network infrastructure.
We have prepared a demonstration topology containing running VPP instances. Any changes to the network topology are detected in real-time.
Skydive is a tool that can quickly show, what is currently happening in your network. VPP serves the purpose of fast packet processing, which is one of the main building blocks of a (virtual) network. If anybody wants a fast network – VPP is the way to go.
Connecting Skydive & VPP is almost a necessity, since diagnosing VPP issues is a lot more difficult without using Skydive. Skydive leads you towards the source of the issue, as opposed to the time-consuming studying of the VPP console.
The importance of this demo is based on the need to extract data from VPP. Since the platform does not easily provide the required output, this provides a birds-eye view on the network via Skydive.
“The Skydive demo was a huge hit. Since it was presented in full-screen and had its own booth, we gained a lot of attention due to this unique solution.” Attendees were also interested in our Visibility Package solution and what kind of support PANTHEON.tech could provide for their future network endeavors.
Improvements & ONS 2020
“Inbetween networking, presenting and attending keynotes, we have managed to do some short sightseeing and enjoyed the city of San Jose a little bit. But of course, work could not have waited as we have been excited to come back to the conference atmosphere each day.”
But how was ONS 2019 in comparison to last years conference? “In comparison to last year, the Open Networking Summit managed to expand & increase in quality. We are glad that we made many new acquaintances, which we will hopefully meet again next year!”
We would like to thank the Linux Foundation Networking for this opportunity. See you next year!
PANTHEON.tech’s developer Tibor Frank recently held a presentation at PyConSK19 in Bratislava. Here is his full-length presentation and some notes on top of it.
Motivation
Patterns, trends, and correlations that might remain undetected in text-based data can be exposed and recognized easier with data visualization.
Why do we need to visualize data? Because people like pictures and they hate piles of numbers. When we want or need to provide data to our audience, the best way how to communicate it is to display it. But we must display it in a form and structure our intended audience can consume. They must process the information in a fraction of second and in the correct way.
A real-world example
When I was building my house, a sales representative approached me and proposed, that he has the best thermal isolation for houses on the market.
He told me that it is 10% better than the second one and showed me this picture. Not a graph, a picture, as this is only a picture with one blue rectangle and two lines. From this point, I wasn’t interested in his product anymore. But I was curious about the price of this magic material. He told me that it is only 30% more expensive than the second one. Then I asked him to leave.
Of course, I was curious so I did some research later in the evening. I found the information about both materials and I visualized it with a few clicks in Excel.
What’s the difference between these two visualizations? The first one is good only as an illustration in marketing materials.
From a technician point of view, I am missing information about what the graph is trying to show me:
Title
Axes with titles
Numbers
Physical quantities
Legend
The same things which we were told to use at elementary school. It’s simple, isn’t it?
To be honest, this graph confirmed that his product is 10% better, but still, 30% more expensive.
Attributes of a good design
When we are talking about visualization we must also talk about design. In general, there are four attributes of a good design. It must be:
Beautiful – because people must find pleasure in it
Gratifying – to enjoy it
Logical – everything should be in the right place; it must be self-descriptive, no need for further explanation
Functional – the interactions between components must work and it must fit the bigger picture
Besides these attributes, we should choose the right point of view. Look at these two pictures. Which one do you like the best?
Do we want to show details? Or a bigger picture? Or both?
We need to decide before we start according to the nature of data we visualize, the information we want to communicate and the intended audience.
We must ask ourselves who will be the customer for our visualized data.
Management
Marketing
Customers
Skilled professionals
Anyone
We should keep it in mind while preparing the visuals.
What do we visualize?
Data. Lots of data. 30GB of data, twice a day. Our data is the result of performance tests. I am working on an FD.io project which performs Continuous System and Integration Testing (CSIT) of the Vector Packet Processor (VPP). As I said, we focus on performance. The tests measure the packet throughput and packet latency in plenty of configurations of the VPP. For more information, visit FD.io’s website.
So, what do we visualize?
1. Performance test results for the product release:
Packet throughput
Packet Latency
Speedup multi-core throughput – increase in performance if we increase the number of processor cores used for data processing
2.Performance over a defined time period:
Packet throughput trend
Where does the data come from?
FD.io CSIT hierarchy (https://docs.fd.io/)
Jenkins runs thousands of tests on our test-beds and provides the results as robot frameworks’ output.xml files. The files are processed and the data from them visualized. As a final step we use Sphinx to generate html pages which are then published on the web.
What we use
Nothing surprising, we use standard python tools:
Python 2.7 3.6
Numpy
Pandas
Plot.ly
Sphinx
I will not bother you with these tools, you might know them better than me.
Plots
We use Plot.ly in offline mode to generate various kinds of plots. Hundreds of dynamically generated plots are then put together by Sphinx to create the release Report or the Continuous Performance Trending.
I’ll start with the plots published in the Report. In general, we run all performance tests ten times to prevent any anomalies in the results. We calculate the mean value and standard deviation for all tests and then work with them.
Packet throughput – Statistical box plot
The elementary information about the performance is visualized by the statistical box plot. This kind of plot provides us all information about statistical data – minimum, first quartile, median, third quartile, maximum and outliers. This information is displayed in the hover box.
As you can see, the X-axis lists indices of individual test suites as listed in Graph Legend; and the Y-axis presents measured Packet throughput values [Mpps]. Both axes start with zero value so we know the scale. The tests in each plot are grouped and ordered by the chosen criteria. This grouping is written in the plot title (area, topology, processor architecture, NIC, frame size, number of cores, test type, measured property).
From this graph we can also see the variability of results – the results in the first graph are in all runs almost the same (there are lines instead of boxes), the results in the second one vary in a quite big range. It says that the reliability of these results are lower than in the first case and there might be an issue in the tested functionality, tests or infrastructure & more.
Packet Latency – Scatter plot with error bars
When we measure the packet latency, we get minimal, average and maximal values in both directions of data flows. The best way we found to visualize it, is the scatter plot with error bars.
The dot represents the average value and the error bars the minimum and maximum values.
The rest of the graph is similar to the previous one.
Speedup – Scatter plot with annotations
Speedup is the increase of the packet throughput if we increase the number of processor cores used for data processing. We measure the throughput using 1, 2 and 4 cores.
Again, we use the Scatter plot. The measured values are represented by dots connected by solid lines. In the ideal case, it would be a straight line. But it is not. So we added dashed lines to show how it would be in the ideal world. In real life, there are limitations not only in software but also in hardware. They are shown as dotted lines – Link, NIC, and PCIe bus limits. These limits cannot be overcome by the software.
3D Data
Some of our visualizations present three-dimensional data, in this example, the packet throughput is measured in a configuration with two changing parameters.
The easiest way to visualize it is to use excel and by a few clicks, we can create a graph like this one (above). It looks quite good but:
The orientation in the graph is not so easy. What if there were 20 samples in a row?
It is difficult to read the results
In some cases, which are very probable, some bars can be hidden behind another one
And Plot.ly does NOT support this kind of graph because, as they say, it is not needed. And they are right
So we had to look for a better solution. And we found the heat-map. It presents three-dimensional data in two-dimensional space. It is easy to process all information at one quick sight. We can quickly find any anomalies in this pattern as we expect the highest value to be in the top left corner and decreasing to the right and down.
Packet throughput trending – Scatter plot
The trending graphs show us the trend of packet throughput over the chosen time period which is 90 days in this case. The data points (again average value of 10 samples) are displayed as dots. The trend lines are calculated by JumpAvg algorithm developed by our colleague. It is based on the minimum description length (MDL) principle.
What is important in the visualization of a trend, are changes in the trend. We mark them by color circles: red for regression and green for progression. These changes in trend can be easily spotted by testers and/or developers so we immediately know the effect of merged changes on the product performance.
PANTHEON.tech has recently published an example application of an SDN controller, using RESTCONF Northbound module and OVSDB + OpenFlow Southbound modules.
In this blog we are going to describe, how to use the SDN controller with an Open vSwitch instance running in OpenStack.
Open vSwitch, OVSDB & OpenFlow
Open vSwitch is open source virtual switch which uses OVSDB (Open vSwitch Database) and OVSDB management protocol for management of virtual OpenFlow switches referred to as bridges.
We have already written a blog about OpenFlow protocol and its support bylighty.io. There’s also example SDN controller application called lighty-community-restconf-ofp-app. It utilizes RESTCONF northbound module and OpenFlow southbound module only. You can find it at our GitHub repository.
Connecting to Open vSwitch of OpenStack
In this blog, we will show you some example setup and sequence of requests using both OVSDB and OpenFlow protocols implemented as SB modules in lighty.io.
We have published an example SDN controller called lighty-community-restconf-ovsdb-app, which utilizes RESTCONF northbound module and OVSDB southbound module only. You can check its README.md file and Postman collection for more details.
As we have already mentioned, Open vSwitch used in the testing setup is running in OpenStack. Here is a picture and description of the setup:
The SDN controller is running on a machine with IP address 10.14.0.160 with RESTCONF NB plugin & opening Port 8888.
Postman or curl requests are submitted from the same machine where SDN controller is running, so URLs use localhost address (127.0.0.1)
Open vSwitch instance is running on a machine with IP address 10.14.0.103 (the same address used in ovs-vsctl command explained above) The tested instance has been set up by DevStack scripts but it can be any Open vSwitch instance running in OpenStack Network node, compute node or outside of OpenStack.
TCP port used for OVSDB server(s) is 6640
TCP port used by OpenFlow server(s) is 6633
Example workflow
Subsequent requests can be found in the repository at GitHub, in the form of Postman collection. In the README.md & in this blog, we are using a curl command to send the RESTCONF requests. We are also using the Python module json.tool for printing of JSON responses.
1. Configure OVSDB manager of Open vSwitch
The following piece of the ovs–vsctl show command output shows the initial configuration of the Open vSwitch and its state, where we can see that the Neutron service is connected as OVSDB manager (Manager “ptcp:6640:127.0.0.1”). The Neutron service is also configured as OpenFlow controller for the bridge br-tun (Controller “tcp:127.0.0.1:6633”) and br-tun is connected to the controller.
sudo ovs-vsctl show
729321e6-991d-4ae5-a4f9-96b1e2919596
Manager "ptcp:6640:127.0.0.1"
is_connected: true
Bridge br-tun
Controller "tcp:127.0.0.1:6633"
is_connected: true
fail_mode: secure
Port br-tun
Interface br-tun
type: internal
Port patch-int
Interface patch-int
type: patch
options: {peer=patch-tun}
Using this ovs-vsctl command we set up Open vSwitch to listen to second OVSDB manager connection at TCP port 6640 and an interface with IP address 10.14.0.103. The command keeps the configuration for Neutron service as OVSDB manager (ptcp:6640:127.0.0.1).
The output of “ovs-vsctl show” command must be changed, as a result of the command above. There should be two managers configured, but only one of them is connected. The connected one is Neutron service and we have to start and configure the SDN controller, in order to initiate OVSDB connection from the controller’s side.
You can check whether the session has been established using the “ovs-vsctl” show command. Both OVSDB managers should be connected now. You can also use the next RESTCONF request.
3. Retrieve OVSDB network topology data (all nodes)
Now, we are going to ask lighty.io (meaning the SDN controller) about the state of OVS. In this step, we are going to access the SDN controller through a RESTCONF request. The controller will then create a request via the OVSDB protocol and OVS will create the same request, as shown in OVS-VSCTL show.
This RPC request returns the same data as an output of the ovs-vsctl show command. But the show command returns text output. In case of RPC request, the output is formatted as JSON or XML (depending on the Accept header) what is more appropriate for API between software layers of SDN solutions (i.e.: RPCs returning JSON or XML formatted output of commands are SDN ready).
NOTE: In this state, the OVSDB connection between SDN controller and Open vSwitch is established. There’s also another connection which is used by Neutron service. You can check this in the output of ovs-vsctl show:
The only OpenFlow connection(s) in this state are used by Neutron service, you can see it in the output of ovs-vsctl show:
Bridge br-int
Controller "tcp:127.0.0.1:6633"
is_connected: true
Bridge br-ex
Controller "tcp:127.0.0.1:6633"
is_connected: true
... and the same for other bridges
… and also in the output of RESTCONF request:
... all bridges should have:
"ovsdb:controller-entry": [
{
"target": "tcp:127.0.0.1:6633",
"controller-uuid": "de378546-d727-4631-8d46-fa57d78737d9",
"is-connected": true
}
],
Here is an example of complete ovs-vsctl show command output:
sudo ovs-vsctl show
729321e6-991d-4ae5-a4f9-96b1e2919596
Manager "ptcp:6640:127.0.0.1"
is_connected: true
Manager "ptcp:6640:10.14.0.103"
is_connected: true
Bridge br-tun
Controller "tcp:127.0.0.1:6633"
is_connected: true
fail_mode: secure
Port br-tun
Interface br-tun
type: internal
Port patch-int
Interface patch-int
type: patch
options: {peer=patch-tun}
Bridge br-int
Controller "tcp:127.0.0.1:6633"
is_connected: true
fail_mode: secure
Port "tap2f509846-a3"
tag: 4
Interface "tap2f509846-a3"
type: internal
Port "qr-40a33ce6-dd"
tag: 6
Interface "qr-40a33ce6-dd"
type: internal
Port "tape9302402-e4"
tag: 1
Interface "tape9302402-e4"
type: internal
Port "tap63c483cb-87"
tag: 6
Interface "tap63c483cb-87"
type: internal
Port "tap960bd59d-2e"
tag: 5
Interface "tap960bd59d-2e"
type: internal
Port "tap74a59f96-94"
tag: 3
Interface "tap74a59f96-94"
type: internal
Port "qg-9285bad8-81"
tag: 2
Interface "qg-9285bad8-81"
type: internal
Port "tap3792b4af-27"
tag: 7
Interface "tap3792b4af-27"
type: internal
Port int-br-infra
Interface int-br-infra
type: patch
options: {peer=phy-br-infra}
Port "qr-9da1a177-1a"
tag: 7
Interface "qr-9da1a177-1a"
type: internal
Port "qg-7f8467e0-a4"
tag: 2
Interface "qg-7f8467e0-a4"
type: internal
Port "qr-7da2c452-59"
tag: 1
Interface "qr-7da2c452-59"
type: internal
Port "qg-5a4bd0e5-a0"
tag: 2
Interface "qg-5a4bd0e5-a0"
type: internal
Port patch-tun
Interface patch-tun
type: patch
options: {peer=patch-int}
Port int-br-ex
Interface int-br-ex
type: patch
options: {peer=phy-br-ex}
Port "qr-91d9970c-ef"
tag: 1
Interface "qr-91d9970c-ef"
type: internal
Port br-int
Interface br-int
type: internal
Bridge br-ex
Controller "tcp:127.0.0.1:6633"
is_connected: true
fail_mode: secure
Port br-ex
Interface br-ex
type: internal
Port phy-br-ex
Interface phy-br-ex
type: patch
options: {peer=int-br-ex}
Bridge br-infra
Controller "tcp:127.0.0.1:6633"
is_connected: true
fail_mode: secure
Port br-infra
Interface br-infra
type: internal
Port phy-br-infra
Interface phy-br-infra
type: patch
options: {peer=int-br-infra}
ovs_version: "2.9.2"
The GET request above only retrieves OVSDB data of OpenFlow connection between Open vSwitch and SDN controller. The output only contains one entry (if the OpenFlow connection is established then the item “is-connected” is set to true):
For this setup, you can also use the OFM application, which provides GUI for management of OpenFlow switches. You can connect OFM to the controller and retrieve OpenFlow tables of a specific switch – plus the flows will be graphically displayed. You can also modify existing flows, or add new using OFM. See our blog about OpenFlow integration.
Conclusion
In this blog, we have described the use of an SDN controller with OVSDB and OpenFlow support. It can be used to manage Open vSwitch virtual switches. We have used Open vSwitch running in an OpenStack environment and we described the sequence of requests needed to connect SDN controller to OVSDB and OpenFlow interfaces of Open vSwitch.
This approach can be used to manage Open vSwitch instances, running in OpenStack Network nodes and Compute nodes without breaking the connection between Neutron service and the Open vSwitch instances. But the SDN controller example and described requests can be used with any virtual or physical network device supporting OpenFlow or OVSDB or both protocols.
The usage of RESTCONF SB plugin in the SDN controller means, that any application can implement RESTCONF (HTTP/REST/API) client and communicate with the controller, as we have demonstrated by Postman application and OpenFlow manager (OFM) in the previous blog.
lighty.io 9.2.x provides examples of OVSDB & OpenFlow SDN controllers for integration with your SDN solution. Those examples will guide you through lighty.io controller core initialization, with OVSDB and/or OpenFlow southbound plugins attached. You can use those management protocols with a really small memory footprint and simple runtime packaging.
Today, we will show you how to run and integrate the OpenFlow plugin in lighty.
What is OpenFlow?
OpenFlow (OF) is a communications protocol, that gives access to the forwarding plane of a network switch or router over the network. OpenFlow can be applied for:
Quality of Service measurement by traffic filtering
Network monitoring (i.e., using the controller as a monitoring device)
In a virtual networking context, OF can be used to program virtual switches with tenant level segregation tags (for example VLANs). In the context of NFV, OF can be used to re-direct traffic to a chain of services. It is managed by the Open Networking Foundation.
Why do we need OpenFlow?
Routers and switches can achieve various (limited) levels of user programmability. However, engineers and managers need more than the limited functionality of this hardware. OpenFlow achieves consistent traffic management and engineering exactly for these needs. This is achieved by controlling the functions independently of the hardware used.
PANTHEON.tech has managed to implement the OpenFlow plugin in lighty-core. Today, we will show you how you can run the plugin yourself.
Prerequisites
In order to build and install lighty-core artifacts locally, follow the procedure below:
The previous command will run the application with default configuration. In order to run it with a custom configuration, edit (or create new) JSON configuration file. Example of JSON configuration can be found in lighty-community-restconf-ofp-app-9.2.1-SNAPSHOT folder.
With the previous command to start the application, pass the path to the configuration file as an argument:
An important configuration, which decides what can be changed, is stored in sampleConfigSingleNode.json. For applying all changes, we need to start OFP with this configuration as a Java parameter.
ForwardingRulesManager
FLOWs can be added to OpenFlow Plugin (OFP) in two ways:
Sending FLOW to config data-store. ForwardingRulesManager (FRM) is listening to the config-data store. When it’s changed. the config data store FRM will sync changes on the connected device, once available.
Flow added this way is persistent.
Sending a RPC message directly to device. This option works without FRM. When is device restarted, then this the configuration will disappear.
In case you need to disable FRM, start OFP with an external configuration & set the enableForwardingRulesManager to false. Then, simply start OFP with this external configuration.
RESTCONF
RESTCONF configuration can be changed in the JSON config file sampleConfigSingleNode.json, mentioned above. It is possible to change the RESTCONF port, IP address or version of RESTCONF. Currently, the version of RESTCONF set to DRAFT_18, but it can be set to DRAFT_02.
For this explanation of OFP usage, RESTCONF is set to DRAFT_18. All RESTCONF calls used in this example can be imported from file OFP_postman_collection.json, in project resources to Postman.
We will quickly check if the controller is the owner of the connected device. If not, then the controller is not running or the device is not properly connected:
Proactive flow installation & traffic monitor via Packet-In messages
In order to create traffic, we need to setup topology behavior. There are three methods for flow table population (Reactive, Proactive, Hybrid). We encourage you to read more about their differences.
In our example, we use Proactive flow installation, which means that we proactively create flows before traffic started.
Start lighty OpenFlow example lighty-community-restconf-ofp-app
Create mininet with linear topology and 2 open vSwitches
Now we tested that connection between devices is not established:
mininet> pingall
*** Ping: testing ping reachability
h1 -> X
h2 -> X
*** Results: 100% dropped (0/2 received)
Next step is to create flows, that create a connection between switches. This will be managed by setting Matched and Action filed in Table 0. In this example, we connect two ports eth1 and eth2 in a switch together. So everything that comes from port eth1, is redirected to port eth2 and vice versa.
Next configuration will be sending monitoring packets in a network. This configuration has set the switch s1 to send all packets, which came to port eth2, to the controller. So the visualized result should look like this:
1. Add flow to switch s1 (named in OFP as ‘openflow:1’), which redirect all traffic that comes from port eth1 (in OFP named as ‘1’) to port eth2 (in OFP named as ‘2’).
2.Add flow to switch s1, which will connect port 2 and 1 in another direction. Set switch s1 to send all packet transmitted through port 2 to controller:
Wireshark is a popular network protocol analyzer. It lets you analyze everything that is happening in your network and is a necessity for network administrators and power-users alike.
Start Wireshark with the command:
sudo wireshark
After it starts, double click on ‘any’ filter. Then, filter packets with ‘openflow_v4.type == 10‘. Now, the Wireshark environment setup will only show Packet-In messages from OpenFlow protocol.
To create traffic in mininet network, we used mininet command:
h2 ping h1
If everything is setup correctly, then we can see Packet-In messages showing up.
Show Packet-In messages with PacketInListener
In the below section for Java developers, there is an option for setting Packet-In Listener. This configuration set to log every Packet-In message as a TRACE log to console. When this is done, run mininet command ‘h2 ping h1’ again.
If everything is set up correctly, then we can see Packet-In messages in logs.
Java DevelopersSome configuration can be done in Java Main class from OpenFlow Protocol example.
Packet-in listener
Packet handling is managed by adding a Packet Listener. In our example, we add the PacketInListener class, which will be logging packet-in messages. For a new packet listener class, it is important to have implemented the class “PacketProcessingListener”.
The first step is to create an instance of PacketInListener (1 – in the window below). Then we will add OpenflowSouthboundPluginBuilder to this part of the code (2 – in the window below).
//3. start openflow SBP
PacketProcessingListener packetInListener = new PacketInListener(); (1)
final OpenflowSouthboundPlugin plugin;
plugin = new OpenflowSouthboundPluginBuilder()
.from(configuration, lightyController.getServices())
.withPacketListener(packetInListener) (2)
.build();
ListenableFuture<Boolean> start = plugin.start();
OpenFlow Manager (OFM) App
OpenFlow Manager (OFM) is an application developed to run on top of ODL/Lighty to visualize OpenFlow (OF) topologies, program OF paths, gather OF stats and for managing flow tables. In order to install the OFM App, follow these steps:
1. Download OFM repositories from GitHub and checkout master branch
NGINX is used to serve as a proxy server towards OFM application and ODL/lighty RESTCONF interface. Before NGINX starts, it is important to the switch NGINX config file in /etc/nginx/sites-enabled/ with the default file in the root of this project.
In this default file, we have set up the NGINX port, port for RESTCONF and Grunt port. Please be sure that these ports are correct.
After replacing the config file, start NGINX with the command:
sudo apt install nginx
If you need to stop NGINX, type in the command:
sudo systemctl stop nginx
3. OFM configuration
Before running the OFM standalone application, it is important to configure:
The controller base URL
NGINX port
ODL username and ODL/lighty password
All this information should be written in env.module.js file located in the directory ofm src/common/config.
4. Grunt installation
To run OFM standalone app on local web server, you can use tool Grunt. For this tool is everything prepared in the OFM repository. Grunt is installable via npm, the Node.js package manager.After running grunt and NGINX you can access OFM standalone app via web browser on used NGINX port typing URL localhost:9000.
After running Grunt and NGINX, you can access OFM standalone app via a web browser on a used NGINX port by typing the URL localhost:9000.
OpenFlow Manager environment
With OFM, we can also start the Lighty-OpenFlow Southbound plugin example. From lighty-core repository, follow the example above. In this example, we will use mininet to simulate network topology, start with the command:
If everything is set up correctly, then you should see a basic view of the network topology:
Device management
To see detailed device information, select those devices that you want to inspect. Then click on the main menu bar, at the top of “Flow management” section. Now, you should see device information and added Flows.
In a Flow section, you can Add Flow by clicking on the pen on the left-top side of the table marked by an arrow. In the right side of table at each row, you can delete or update selected flow.
Adding Flows
Adding a flow can be done from the Flow management section by clicking on the pen, on the left-top side of Flow table. Here you can choose the switch, from where the flow should be sent. Then just click on the property that should be added in the flow, from the left menu.
After filling all required fields, you can view your flow as a JSON message, by clicking on the “show preview” button. For sending flows to a switch, click on “Send message” button.
Statistics
To show statistics in the network click on the “Statistics” section in the main menu bar. Then, choose from the drop-down menu what statistic you want to see and click on “Refresh data” button.
Conclusion
We have managed to integrate the whole OpenFlow plugin into lighty-core. This is the same way it is implemented in OpenDaylight, version Fluorine (SR1). It is, therefore, possible to use lighty-controller for managing network devices via the OpenFlow protocol.
If you would like to see how our commercial version might benefit your business, please visit lighty.io for more information, or contact us here.
I was thrilled to visit MWC from the beginning. Such a huge and renowned event always shows the latest tech not only in the mobile sector. This years themes and keywords could be summarized to three cores: 5G, IoT & AI.
First of all, I would like to point out how well the event was organized. I was greeted with my badge right at the airport, with directions towards the conference being provided by helpful volunteers. After settling in Barcelona, I set off to start my day early and arrive at the MWC at 8 AM.
I soon regretted being an early bird, since most booths were closed at this time and most presenters were just settling in. The Fira Gran Via, designed by Japanese architect Toyo Ito, was monumental and emphasized the futuristic approach of the conference. Saying the venue was monumental is an understatement – I was only able to visit 2/3 of all booths on the first day. In total,
I have made 89,109 steps throughout MWC 2019.
Themes @ MWC 2019
Some booths were both impressive and beautiful, either taking up several hundred square-meters of space. Some booths even had two floors, just to underline the massiveness of the event. The venue was packed with attendees since morning, but it was easy to talk to presenters and orientate in each pavilion.
With each day and conference, we can feel that 5G is coming closer to consumers and real-life deployment. What seemed like a wild, unreal idea a few years ago is now on the way of dictating the future of each new technology. I saw remote road assistance which was possible due to lightning-fast 5G utilization. Healthcare could become fully automated or remotely controlled. Again, this is due to 5G coverage.
I am glad, that PANTHEON.tech is making sure to stay on point of this revolution and keep up.
The future of our industry
There were prototypes of robots, which would make coffee shops with humans obsolete. It would take your order via voice recognition and prepare your order. Another robot has perfectly built paper-planes with inhumane precision. Some of these products seemed like a toy for playing around. But we have to remember that this is what makes greatness – testing, thinking out-of-the-box and creating a functional concept. It was wonderful to see, that startups had an opportunity to also present themselves. Not only to attendees, but to potential investors as well.
I held the future in my hands, in form of the Barefoot Networks’ Toffino 2 chip. I was able to see the first functional, foldable phone by Samsung. But most importantly, I was able to see how the future will be shaped in the coming years.
MWC is a must-go, powerful event with great networking opportunities. Trust me, you want to be there. In the future, I will definitely require a larger team to cover more ground at the next Mobile World Conference. Hopefully, PANTHEON.tech will see you there!
Today, we will go through the essentials of gRPC and REST and introduce their core concepts, while introducing one missing functionality into our VPP build. This part will also introduce the open-source GoVPP, Go language bindings for binary API – VPP management.
The Issue
Natively, VPP does not include a gRPC / RESTful interface. PANTHEON.tech has developed an internal solution, which utilizes a gRPC-gateway to VPP, using GoVPP. It is called VPP-RPC, through which you can now connect to VPP using a REST client.
First and foremost, here are the terms that you will come across in this guide:
gRPC (Remote Procedure Calls) is a remote procedure call (RPC) system initially developed by Google. It uses HTTP/2 for transport, protocol buffers as the interface description language, and provides features such as authentication, bidirectional streaming and flow control, blocking or non-blocking bindings, and cancellation and timeouts. It generates cross-platform client and server bindings for many programming-languages.
gRPC-gateway (GRPC-GW) is a plugin of protobuf. It reads the gRPC service definition and generates a reverse-proxy server which translates a RESTful JSON API into gRPC. This server is generated according to custom options in your gRPC definition.
VPP-Agent is aset of VPP-specific plugins that interact with Ligato, in order to access services within the same cloud. VPP Agent provides VPP functionality to client apps through a VPP model-driven API
VPP-RPC is our new RESTful VPP service. It utilizes gRPC & gRPC-gateway as 2 separate processes, in order to facilitate communication with VPP through GoVPP.
JSON message sequence
gRPC gateway exposes the REST service, for which there is no built-in support in VPP. By using gRPC-gateway and gRPC server services, the VPP API is available through gRPC and REST at the same time. Both services use generated models from VPP binary APIs, therefore exposing both APIs is easy enough to include both. It is up to the user to choose, which mechanism they will use.
When exchanging data between a browser and a server, the data can only be text. Any JavaScript object can be converted into a JSON and sent to the server. This allows us to process data as JavaScript objects, while avoiding complicated translations and parsing issues.
The sequence diagram below describes the path the original JSON message takes in our solution:
The Client sends a HTTP request to GRPC-GW
GRPC-GW transforms the JSON into protobuf message & sends it to the gRPC server
Each RPC has a go method handling its logic. For unary RPCs, this simply means copying the protobuf message into the corresponding VPP message structure and passing it to GoVPP binary API
GoVPP eventually passes the message to the underlying VPP binary API, where the desired functionality is executed
VPP API build process
The figure below describes the build process for a single VPP API. Lets see what needs to happen for a tap API:
Build process for a VPP API. @PANTHEON.tech
VPP APIs are defined in /usr/share/VPP/api/ which is accessible after installing VPP. The Go package tap is a generated via the VPP Agent binary API of the ‘tap’ VPP module. It is generated from this file: tap.api.json.
This file will drive the creation of all 3 building blocks:
GoVPP’s binapi-generator generates the GoVPP file tap.ba.go
vpp-rpc-protogen generates tap.proto, which contains the gRPC messages and services, including the URL for each RPC
protoc’s go plugin will compile the proto file and create a gRPC stub tap.pb.go, containing client & server interfaces that define RPC methods and protobuf message structs.
Vpp-rpc-implementor will generate the code that implements the TapServer interface – the actual RPC methods calling GoVPP APIs – in Tap.server.go file.
protoc’s gRPC-gateway plugin will compile the proto file and create the reverse proxy tap.pb.gw.go. We don’t have to touch this file further.
Running the examples
To run all the above, we need to make sure all these processes are running:
VPP service
gRPC server (needs root privileges)
sudo vpp-rpc-server
gRPC gateway
vpp-rpc-gateway
Running a simple request using Curl
If we want to invoke the API we have created, we can use Curl. Vpe will require an URL (vpe/showversion/request), which will map the above mentioned API to VPP’s binary API. We will now use Curl to POST a request to a default address of localhost:8080:
{
"Retval": 0,
"Program": "vpe",
"Version": "18.07-rc0~128-g6f1c48d",
"BuildDate": "Thu May 3 14:10:54 CEST 2018",
"BuildDirectory": "/home/user/vpp"
}
Postman collection
We provide a Postman collection within our service, which serves as a starting point for users with our solution. The collection created in the vpp-rpc repository, tests/vpp-rpc.postman_collection.json path, contains various requests and subsequent tests to the Tap module.
Performance analysis in Curl
Curl can give us detailed timing analysis of a request’s performance. If we run the previous request 100 times, the summary times (in milliseconds) we get usually are:
mean=4.82364000000000000
min=1.047
max=23.070
average rr per_sec=207.31232015656226418223
average rr per_min=12438.73920939373585093414
average rr per_hour=746324.35256362415105604895
Judging from the graph below, we see that most of the requests take well below the average mark. Profiling our solution, we’ve found the reason for the anomalies (above 10ms) to be caused by GoVPP itself when waiting on the reply from VPP. This behavior is well documented on GoVPP wiki. We can conclude our solution closely mirrors the performance of the synchronous GoVPP APIs.
Here is the unary RPC total time in ms:
In conclusion, we have introduced ourselves to the concepts of gRPC and have run our VPP API + GoVPP build, with a REST service feature. Furthermore, we have shown you our in-house solution VPP-RPC, which facilitates the connection between the API and GoVPP.
Welcome back to our guide on Vector Packet Processing. In today’s post number three from our VPP series, we will take a look at Ligato and its VPP Agent.
A Virtual Network Function is a software implementation of a function. It runs on single or multiple Virtual Machines or Containers, on top of a hardware networking infrastructure. Individual functions of this network may be implemented or combined together, in order to create a complete networking communication service. A VNF can be used as a standalone entity or part of an SDN architecture.
Its life-cycle is controlled by orchestration systems, such as the increasingly popular Kubernetes. Cloud-native VNFs and their control/management plane can expose REST or gRPC APIs to external clients, communicate over a message bus, or provide a cloud-friendly environment for deployment and usage. It can also support high-performance data planes, such as VPP.
What is Ligato?
It is theopen-source cloud platform for building and wiring VNFs. Ligato provides infrastructure and libraries, code samples, and CI/CD processes to accelerate and improve the overall developer experience. It paves the way towards faster code reuse, reducing costs, and increasing application agility & maintainability. Being native to the cloud, Ligato has a minimal footprint, plus can be easily integrated, customized, and extended, deployed using Kubernetes. The three main components of Ligato are:
CN Infra – a Golang platform for developing cloud-native microservices. It can be used to develop any microservice, even though it was primarily designed for Virtual Network Function management/control plane agents.
SFC Controller – an orchestration module for data-plane connectivity within cloud-native containers. These containers may be VPP-Agent enabled or communicate via veth interfaces.
The platform is modular-based – new plugins provide new functionality. These plugins can be set up in layers, where each layer can form a new platform with different services at a higher layer plane. This approach mainly aims to create a management/control plane for VPP, with the addition of the VPP Agent.
What is the VPP Agent?
The VPP Agentis a set of VPP-specific plugins that interact with Ligato, in order to access services within the same cloud. VPP Agent provides VPP functionality to client apps through a VPP model-driven API. External and internal clients can access this API, if they are running on the same CN-Infra platform, within the same Linux process.
In January 2019, PANTHEON.tech has become a member of the Telecom Infra Project community – a collaborative telecom community.
The Telecom Infra Project is a network of companies which aim to share, create and collaborate on innovative technologies in the field of telecommunication. Its members comprise a variety of operators, technology providers, developers, startups and other institutions, outside of telecommunication services. It was launched in February 2016, with the aim of accelerating the pace of innovation in the telecom industry.
How it works
The Telecom Infra Project has a structure, in which its members can actively contribute and share their expertise in the wide range of telecom technologies:
Project groups design and build technologies. They are divided into three network areas, that altogether create an end-to-end network: Access – Backhaul – Core and Management.
Community Labs test and validate the technologies from Project Groups in field and production trials. There are 6 active TIP Community Labs from all around the world, which share their testing results and respond to the members outputs.
Ecosystem Acceleration Centers aim to build a dedicated space with venture capital funding and experienced advisors, in order to help upcoming and promising telecom startups bring their ideas to the market and consumers.
PANTHEON.tech is proud to be part of the driving force in telecommunication innovation.We believe that we will prove ourselves worthy of this membership with our expertise in SDN, NFV or open-source solutions.
We are looking forward to cooperating with other TIP members on improving and creating technologies.
Welcome to the second part of our VPP Introduction series, where we will talk about details of the Honeycomb project. Please visit our previous post on VPP Plugins & Binary API, which is used in Honeycomb to manage the VPP agent.
What is Honeycomb?
Honeycomb is a generic, data plane management agent and provides a framework for building specialized agents. It exposes NETCONF, RESTCONF and BGP as northbound interfaces.
Honeycomb runs several, highly functional sets of APIs, based in ODL, which are used to program the VPP platform. It leverages ODL’s existing tools and integrates several of its existing components (YANG Tools, MD-SAL, NETCONF/RESTCONF…). In other words – it is a light on resources, bare bone version of OpenDaylight.
For the purpose of integrating VPP with Honeycomb, we will further refer to the project hc2vpp, which was directly developed for VPP usage.
What is hc2vpp?
This VPP specific build is called hc2vpp, which provides an interface (somewhere between a GUI and a CLI) for VPP. It runs on the same host as the VPP instance and allows to manage it off-the-box. This project is lead by Pantheons own Michal Čmarada.
Honeycomb was created due to a need for configuring VPP via NETCONF/RESTCONF. During the time it was created, NETCONF/RESTCONF was provided by ODL. Therefore, Honeycomb is based on certain ODL tools (data-store, YANG Tools, others). ODL as such uses an enormous variety of tools. Honeycomb was created as a separate project, in order to create a smaller footprint. After its implementation, it exists as a separate server and starts these implementations from ODL.
Later on, it was decided that Honeycomb should be split into a core instance, and hc2vpp would handle VPP related parts. The split also occurred, in order to provide the possibility of creating a proprietary device control agent. hc2vpp (Honeycomb to VPP) is a configuration agent, so that configurations can be sent via NETCONF/RESTCONF. It translates the configuration to low level APIs (called Binary APIs).
Honeycomb and hc2vpp can be installed in the same way as VPP, by downloading the repositories from GitHub. You can either:
Recently, PANTHEON.tech has decided to contribute to FD.io’s Sweetcomb project source-code. This was mainly due to the fact, that our new project OC4VPP would compliment the idea and possibilities of the project, while improving its functionality.
What was the OC4VPP project?
Network administrators have the possibility to use protocols, such as gNMI or NETCONF, in order to communicate with sysrepo.
OC4VPP was a sysrepoplugin, with which we were able to setup and orchestrate the VPP framework. This plugin was part of our in-house solution that we were working on.
Sweetcomb and OC4VPP both use VAPI, in order to communicate with the VPP API. Here at PANTHEON.tech, our developers managed to include more YANG models into OC4VPP. But we realized soon, that Sweetcomb was in advanced development and provided some of the functionality, we wanted to work on.
How will Sweetcomb benefit from OC4VPP?
Sweetcomb is a management agent, used to expose YANG modules, with the help of RESTCONF and NETCONF, in order to immediately allow management of the VPP instance. It translates all communication between the Northbound interface and the VPP API.
We believe, that Sweetcomb will directly benefit from PANTHEON.tech’s solution, in form of the source-code of OC4VPP. This will provide the project with more YANG models to expand its functionality.
Due to Sweetcomb being a new project and mainly proof of concept, it currently supports only these 5 IETF-YANG models:
As a regular open-source contributor and supporter, we are glad that we were able to make this important decision and showcase crucial principles of open-source development:
Communication – Participation – Collaboration
You can find the source-code for Sweetcomb in the official GitHub.
In the first part of our new series, we will be building our first VPP platform plug-in, using basic examples. We will start with a first-dive into plugin creation and finish with introducing VAPI into this configuration.
The principle of VPP is, that you can plug in a new graph node, adapt it to your network purposes and run it right off the bat. Including a new plugin does not mean, you need to change your core-code with each new addition. Plugins can be either included in the processing graph, or they can be built outside the source tree and become an individual component in your build.
Furthermore, this separation of plugins makes crashes a matter of a simple process restart, which does not require your whole build to be restarted because of one plugin failure.
1. Preparing your new VPP plugin
The easiest way how to create a new plugin that integrates with VPP is to reuse the sample code at “src/examples/sample-plugin”. The sample code implements a trivial “macswap” algorithm that demonstrates the plugins run-time integration with the VPP graph hierarchy, API and CLI.
To create a new plugin based on the sample plugin, copy and rename the sample plugin directory
cp -r src/examples/sample-plugin/sample src/plugins/newplugin
#replace 'sample' with 'newplugin'. as always, take extra care with sed!
cd src/plugins/newplugin
fgrep -il "SAMPLE" * | xargs sed -i.bak 's/SAMPLE/NEWPLUGIN/g'
fgrep -il "sample" * | xargs sed -i.bak 's/sample/newplugin/g'
rm *.bak*
rename 's/sample/newplugin/g' *
There are the are following files:
node.c – implements functionality of this graph node (swap source and destination address) -update according to your requirements.
newplugin.api – defines plugin’s API, see below
newplugin.c, newplugin_test.c – implements plugin functionality, API handlers, etc.
Update CMakeLists.txt in newplugin directory to reflect your requirements:
API messages are defined in *.api files – see src/vnet/devices/af_packet.api, src/vnet/ip/ip.api, etc. These API files are used to generate corresponding message handlers. There are two types of API messages – non-blocking and blocking. These messages are used to communicate with the VPP Engine to configure and modify data path processing.
Non-blocking messages use one request and one reply message. Message replies can be auto-generated, or defined manually. Each request contains two mandatory fields – “client-index” and “context“, and each reply message contains mandatory fields – “context” and “retval“.
Blocking messages use one request and series of replies defined in *.api file. Each request contains two mandatory fields – “client-index” and “context“, and each reply message contains mandatory field – “context“.
Blocking message is defined using two structs – *-dump and *_details
Once you define a message in an API file, you have to define and implement the corresponding handlers for given request/reply message. These handlers are defined in one of component/plugin file and they use predefined naming – vl_api_…_t_handler – for each API message.
Here is an example for existing API messages (you can check it in src/vnet/ip component):
Request and reply handlers are usually defined in api_format.c (or in plugin). Request uses a predefined naming – api_… for each API message and you have to also define help for each API message :
static int api_ip_neighbor_add_del (vat_main_t * vam)
{
...
/* Construct the API message */
M (IP_NEIGHBOR_ADD_DEL, mp);
/* send it... */
S (mp);
/* Wait for a reply, return good/bad news */
W (ret);
return ret;
}
static int api_ip_fib_dump (vat_main_t * vam)
{
...
M (IP_FIB_DUMP, mp);
S (mp);
/* Use a control ping for synchronization */
MPING (CONTROL_PING, mp_ping);
S (mp_ping);
W (ret);
return ret;
}
#define foreach_vpe_api_msg \
...
_(ip_neighbor_add_del, \
"(<intfc> | sw_if_index <id>) dst <ip46-address> " \
"[mac <mac-addr>] [vrf <vrf-id>] [is_static] [del]") \
...
_(ip_fib_dump, "") \
...
Replies can be auto-generated or manually defined.
auto-generated reply using define foreach_standard_reply_retval_handler, with predefined naming
manually defined reply with details
How to call the binary API
In order to call the binary API, we will introduce VAPI to our configuration.
VAPI is the high-level C/C++ binary API. Please refer to src/vpp-api/vapi/vapi_doc.md for details.
VAPI’s multitude of advantages include:
All headers in a single place – /usr/include/vapi => simplifies code generation
Hidden internals – one no longer has to care about message IDs, byte-order conversion
Easier binapi calls – passing user provided context between callbacks
We can use the following C++ code to call our new plugins’s binary API.
#include <cstdlib>
#include <iostream>
#include <cassert>
//necessary includes & macros
#include <vapi/vapi.hpp>
#include <vapi/vpe.api.vapi.hpp>
DEFINE_VAPI_MSG_IDS_VPE_API_JSON
//include the desired modules / plugins
#include <vapi/newplugin.api.vapi.hpp>
DEFINE_VAPI_MSG_IDS_NEWPLUGIN_API_JSON
using namespace vapi;
using namespace std;
//parameters for connecting
static const char *app_name = "test_client";
static const char *api_prefix = nullptr;
static const int max_outstanding_requests = 32;
static const int response_queue_size = 32;
#define WAIT_FOR_RESPONSE(param, ret) \
do \
{ \
ret = con.wait_for_response (param); \
} \
while (ret == VAPI_EAGAIN)
//global connection object
Connection con;
void die(int exit_code)
{
//disconnect & cleanup
vapi_error_e rv = con.disconnect();
if (VAPI_OK != rv) {
fprintf(stderr, "error: (rc:%d)", rv);
}
exit(exit_code);
}
int main()
{
//connect to VPP
vapi_error_e rv = con.connect(app_name, api_prefix, max_outstanding_requests, response_queue_size);
if (VAPI_OK != rv) {
cerr << "error: connecting to vlib";
return rv;
}
try
{
Newplugin_macswap_enable_disable cl(con);
auto &mp = cl.get_request().get_payload();
mp.enable_disable = true;
mp.sw_if_index = 5;
auto rv = cl.execute ();
if (VAPI_OK != rv) {
throw exception{};
}
WAIT_FOR_RESPONSE (cl, rv);
if (VAPI_OK != rv) {
throw exception{};
}
//verify the reply
auto &rp = cl.get_response ().get_payload ();
if (rp.retval != 0) {
throw exception{};
}
}
catch (...)
{
cerr << "Newplugin_macswap_enable_disable ERROR" << endl;
die(1);
}
die(0);
}
Additional C/C++ Examples
Furthermore, you are encouraged to try the minimal VAPI example provided in vapi_minimal.zip below.
Download VAPI_Minimal.zip
Download VAPI_Minimal.zip
Send download link to:
This example creates a loopback interface, assigns it an IPv4 address and then prints the address.
Follow these steps:
Install VPP
Extract the archive, build & run examples
unzip vapi_minimal.zip
mkdir build; cd build
cmake ..
make
#c example
sudo ./vapi_minimal
#c++ example
sudo ./vapi_minimal_cpp
In conclusion, we have:
successfully built and ran our first VPP plugin
created and called an API message in VPP
Our next post will introduce and highlight the key reasons, why you should consider Honeycomb/hc2vpp in your VPP build.
I was sent to Lisbon by PANTHEON.tech, in order to attend the annual 2020 Vision Executive Summit. Here are my experiences and insights into this event.
The 2020 Vision Executive Summit, presented by Light Reading, was focused mainly on the pending revolution of 5G networks, automation, Edge Computing, IoT, security, etc. It hosts a variety of vendors and service providers, who provide insights into the telecom industry’s current trends and emerging topics.
Themes of the summit
In case of 5G, we have seen a huge opportunity in discussing PANTHEON.tech’s future involvement and plans in this revolution. The challenges surrounding 5G were discussed by industry leaders with hands-on experience. This was beneficial, since we were confronted with the harsh reality of 5G. Due to it being a technology in-progress, many questions are still open. What will be the use-cases? What should we prepare for and when?
Nobody really knows how it may turn out, when it will become widely available for consumers, or if the world is even prepared for it. But it was a great opportunity to meet the people, whose bread and butter consists of building the future 5G network. It was an invaluable experience, to see a realistic view from industry-insiders and their perception of the future. It was a collective of equally-minded individuals and companies in the fields relevant to PANTHEON.tech’s vision.
Another heavily discussed topic was security. While it is no secret that technology is successfully becoming an important part of our lives. Companies have to heavily rely on a defense against potential security threats and cyber attacks. Panels were held regarding the importance of security measures in expanding networks and the need for flexible and agile security solutions.
Subsequently, Edge Computing, which brings the distribution of data closer to the consumer, was also mentioned and discussed, in regards to its vulnerabilities and future. In this case, it was said with certainty that if you are the type of parent that plans your child’s future for them, make them study cyber security. The investment will return sooner than you could imagine.
Our experience at the summit
Our vision in attending this summit was to find out, if this summit is the right fit for us (spoiler alert – it was) check on the newest trends in our field and in which direction are they developing. The discussions were open and involved the real thoughts and views, without the PR and marketing stuff.
Lisbon is an interesting city, since it is more hidden from the eye of a classic tourist. It reminded me, in a way, of San Francisco. This was mainly due to trams riding uphill and the many uphill roads one has to take, in order to get somewhere. It was surprising though, that the city is making it a point to keep the original architecture of the city in tact and without major reconstructions.
As for the venue itself, the Intercontinental Hotel in Lisbon was nothing short of wonderful. Another highlight was the gala dinner. It was the perfect opportunity for casual networking, in the pompous and spectacular setting of Palacio de Xebregas. I have also experienced my first tuk-tuk ride, where I had to consider whether my life was worth the visit.
In conclusion – it was. I am looking forward to the new business-partners and connections PANTHEON.tech has made at the 2020 Vision Executive Summit.
In the last week of November 2018, Bitergia, a software development analytics company, published a report on the past and current status of the OpenDaylight project, which plays a significant role in PANTHEON.tech’s offerings and solutions.
PANTHEON.tech’s CTO Robert Varga, is leading the list of per-user-contributions to the source code of OpenDaylight, with over 980 commits to the source code in Q3 of 2018. This achievement further establishes PANTHEON.tech’s position as one of the largest contributors to the OpenDaylight project.
As for the list of companies which contribute to the source code of OpenDaylight, PANTHEON.tech is the 2nd largest contributor for Q3/2018, with 1034 commits. We were just 34 commits shy of the top contributor position, which belongs to Red Hat.
Due to ODL’s open-source nature, anyone can contribute to the project and improve it in the long-run. Any change that gets added to the source code is defined as a commit. These types of changes need an approval and can not be any type of automated activity – including bot-actions or merges. This means, that each single commit is a unique change, added to the source code.
PANTHEON.tech will continue its commitment to improving OpenDaylight and we are looking forward to being a part of the future of this project.
What is OpenDaylight?
ODL is a collaborative open source project aimed to speed up the adoption of SDN and create a solid foundation for Network Functions Virtualization (NFV).
PANTHEON.tech’s nurture for ODL goes back when it was forming. In a sense, PANTHEON.tech has led the way is and how an SDN controller is and should be. This requires dedication, which was proven over the years with the extensive amount of contribution thanks to its expert developers.
Click here if you are interested in our solutions, which are based on, or integrate ODL’s framework.
PANTHEON.tech visited Shanghai last week to attend the third annual Huawei Connect. Martin Varga shares some insights from the event.
Activate Intelligence
This year’s theme was Activate Intelligence. Huawei outlined its broad strategy to bring artificial intelligence (AI) to the masses in applications in manufacturing, autonomous driving, smart cities, IoT and other areas. AI will enable billions of new devices to be connected and transfer big data over the network.
The conference was held in Shanghai, China, at the Shanghai World Expo Exhibition Center. Huawei has put a lot of resources and effort into organizing the event which has shown its direct impact on over 26,000 in the attendance. The conference was organized perfectly, to the last detail (exhibition areas, keynotes and conference area, chill-out zones, etc.).
We have witnessed the demonstrations of various smart technologies, ranging from smart city applications, smart education, smart transportation. Smart everything.
One of the most impressive technology demonstrations was an AI that was able to translate Chinese to English and vice versa, as good as a human translator could. Microsoft in cooperation with Huawei states:
“Internal tests have shown, depending on the language, up to a 23 percent better offline translation quality over competing best-in-class offline packs.”
Huawei is also building an AI ecosystem of partners, that is targeted to exceed 1 million developers over the next three years with US$140m.
Networking
We have had some interesting meetings with Huawei’s representatives. It was very pleasant to learn about Huawei’s visions for the near future. We are also glad to share the same vision for an exciting future. Huawei invests heavily into researching new technologies such as AI or IoT, in order to define practical use-cases that can be deployed into their product’s portfolio.
PANTHEON.tech, as a software development company, is strongly focused on computer networking which is related to the Huawei’s vision to integrate AI into managing network operations.
Mr. Yang Jin Director, Network Data Analytics Research Huawei Technologies Co., stated:
“Artificial Intelligence and Machine Learning will abstract data to make next-generation communication breakthroughs come to life.”
Feel free to contact PANTHEON.tech if you have interest in any of the AI, AR/VR, IoT, Intent Driven Network, SDN, NFV, Big Data, and related areas. We can talk about challenges and how we can solve them together.
lighty.io is an SDK that provides components for the development of SDN controllers and applications based on well-established standards in the networking industry. It takes advantage of PANTHEON.tech’s extensive experience from the involvement in the OpenDaylight platform and simplifies and speeds up the development, integration, and delivery of SDN solutions.
lighty.io also enables SDN programmers to use ODL services in a plain JavaSE environment. lighty.io enables a major OpenDaylight distribution vendor to build and deploy their applications faster.
FRINX UniConfig
FRINX UniConfig provides a common network API across physical and virtual devices from different vendors. It leverages an open source device library, which offers connectivity to a multitude of networking devices and VNFs.
The API provides the ability to store intent and operational data from services and devices, enables to commit intent to the network, syncs from the network so that the latest device state is reflected in the controller, compares intended state and operational state and provides device and network wide transactions. All changes are applied in a way that only those parts of the configuration that have changed are updated on the devices.
The UniConfig framework consists of distinct layers, where each layer provides a higher level of abstraction. APIs of the lowest layer provides the ability to send and receive unstructured data to and from devices. The unified layer provides translation capabilities to and from OpenConfig. The UniConfig layer provides access to the intent and the actual state of each device plus the capability to perform transactions and rollback of configurations.
NETCONF devices can be configured via their native YANG models or via OpenConfig. Finally, FRINX UniConfig also provides service modules based on IETF YANG models for the configuration of L2VPNs, L3VPNs and enables the collection of LLDP topology information in heterogeneous networks.
The UniConfig Framework is based on open source projects like OpenDaylight and Honeycomb. It publishes all translation units under the Apache v2 license. Customers and integration partners can freely contribute, modify and create additional device models, which work with the UniConfig Framework.
How did PANTHEON’s lighty.io help?
PANTHEON.tech’s lighty.io helped to make UniConfig run and build faster.
Porting UniConfig to lighty.io required no changes to the application code and has brought many measurable improvements. UniConfig now starts faster, has a smaller memory footprint, and most importantly – significantly reduces build time.
FRINX offers solutions and services for open source network control and automation. The team is made up of passionate developers and industry professionals who want to change the way networking software is created, deployed and operated. FRINX offers network automation products and distributions of OpenDaylight and FD.io in conjunction with support services. They are proud to count service providers and enterprise companies from the Fortune Global 500 list among its customers.
About PANTHEON.tech
PANTHEON.tech is a software research & development company focused on network technologies and prototype software. Yet, we do not perceive networks as endless cables behind switches and routers. For us, it is all software-defined. Clean and neat. Able to dynamically expand and adapt according to the customer’s needs.
We thrive in a world of network functions virtualization and arising need for orchestration. Focusing on SDN, NFV, Automotive and Smart Cities. Experts in OpenDaylight, FD.IO VPP, PNDA, Sysrepo, Honeycomb, Ligato and much more.
PANTHEON.tech’s running team participated in the From Tatry To Danube Run (OTKD) 2018.
The relay run named From Tatry To Danube (OTKD) is 345 kilometers long run and may comprise a maximum of 12 runners per team. This year, 214 teams had taken part. PANTHEON.tech running team took part in this adventure with our 12 runners who had to cover 345 kilometers in less than 36 hours. We are proud that our colleagues were successful. The running team finished the run in the overall 33 hours 34 minutes.
The run took place from Saturday, August 18 to Sunday, August 19. The runners started on Saturday morning in Demenovská valley and ran non-stop. Day and night, in harsh weather and terrain, to reach the finish in Bratislava on the bank of Danube river. Each of the runners covered approximately 30 kilometers in average.
PANTHEON.tech believes, a healthy mind can only cherish on a healthy body is happy to support its employees in participating in such activities. See you at OTKD 2019!
Complete automation and full forwarding plane programmability
Private data centers are a hot topic for companies and enterprises that are not willing to push all the data into public clouds. Kaloom Software Defined Fabric™ (Kaloom SDF) is the world’s first fully programmable, automated, software-based data center fabric capable of running VNFs efficiently at scale. This is the first data center networking fabric on the market that provides complete automation and full forwarding plane programmability.
Kaloom approached PANTHEON.tech last year, knowing Pantheon’s intensive and long involvement in SDN, particularly in OpenDaylight project. OpenDaylight (ODL) is a modular open platform for orchestrating and automating networks of any size and scale. The OpenDaylight platform arose out of the SDN movement, in which PANTHEON.tech has expertise and experience. Hence, it was a logical step to utilize this expertise in this project and leverage what has already been done.
Traditional ODL based controller design was not suitable for this job because of the bulkiness of the Karaf based deployments. Kaloom requested amodern web UI, that the vanilla ODL platform does not provide. lighty.io as a component library provides an opportunity to run ODL services such as MD-SAL, NETCONF and YANG Tools in any modern web server stack, and integration with other components like MongoDB.
Architecture
The following architecture is starting to be like a blueprint for SDN applications today. We utilize the best of both worlds:
MD-SAL, NETCONF and YANG Tools from ODL
Updated modern web stack Jetty/Jersey and
MongoDB as a persistent data store.
This is how Kaloom Fabric Manager (KFM) project has started. After several months of customizing development, we have deployed a tailored web application that provides management UI for Kaloom SDF. We have changed and tailored our Visibility Package application to suit Kaloom’s requirements and specifics. This specialized version uses the name of KFM. The architecture diagram above shows details/internals of the KFM and how we interconnect with Kaloom’s proprietary Fabric Manager/Virtual Fabric Manager controller devices.
The solution for physical data centers
lighty.io based back-end of the KFM with NETCONF plugin provides REST services to the Angular UI, which is using our Network Topology Visualization Component for the better topology view visualization and user experience. Using these REST endpoints, it is easy to send specific NETCONF RPC to the Kaloom SDF controllers.
While working on this next-gen Data Center Infrastructure Management software, we have realized that integrating all moving parts of the system is a crucial step for final delivery. Since different teams were working on different parts, it was crucial we could isolate the lighty.io part of the system and adapt it to the Kaloom SDF as much as possible. We have used our field-tested NETCONF device simulator from our lighty.io package to deliver the software which was tested thoroughly to provide stability of the KFM UI.
Kaloom SDF provides a solution for physical data centers administrated by Data Center Infrastructure Provider (DCIP) users. A physical data center can be easily sliced to virtual data centers offered to customers, called virtual Data Center Operator (vDCO) users. The DCIP user can monitor and configure the physical fabrics – PODs of the data center. KFM WEB UI shows the fabrics in topology view and allows updating the attributes of fabric and fabric nodes.
Topology View of Fabric Manager
Advantages for DCIP
The main task of DCIP users is to slice the fabrics to virtual data centers and virtual fabrics. This process involves choosing servers through associated termination points and associating them with the newly created virtual fabric manager controller. Server resources are used through the virtual fabric manager by vDCO users.
vDCO users can use the server resources and connect them via network management of their virtual data center. vDCO can attach server ports to the switches with proper encapsulation settings. After the switch is ready, vDCO can create a router and attach switches to it. The router offers different configuration possibilities to follow vDCO user’s needs: L3 interface configuration, static routing, BGP routing, VXLANs, and many more. KFM offers also topology view of the virtual data center network, so you can check relations between servers, switches, and routers.
Topology View of Fabric Manager
For more details about the KFM UI in action, please see the demo video with NETCONF simulator of Kaloom SDF bellow, or visit Kaloom or Kaloom Academy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
[Release] VPPTop
/in News, VPP /by PANTHEON.techHere at PANTHEON.tech, we really enjoy perfecting the user experience around VPP and creating projects based around this framework. That is why we have developed a handy tool, which lets you analyze several crucial data points while using VPP. We call it VPPTop.
Requirements
In order to run VPPTop, you will need to install these dependencies first:
How to install & run
1. Follow the above requirements, in order to have all dependencies for this software installed
2. Make sure VPP is running beforehand
3. Install VPPTop via Terminal to $GOPATH/bin:
4. Run the tool from Terminal:
What is VPPTop?
VPPTop is an application for sysadmins and testers, implemented in Go. The goal of VPPTop is to provide VPP statistics which are updated in real-time, in one terminal window.
Before the release of our tool, admins could only rely on the usage of a CLI, to first request the data flow and then receive information, which are not up-to-date, nor in real-time.
Now, you can use our VPPTop tool, to find up-to-date information on your framework!
Version 1.11 supports statistics for:
Version 1.11 supports these functionalities:
Why should you start to use Vector Package Processing?
The main advantages are:
The main advantage of VPP is, that you can plug in a new graph node, adapt it to your networks purposes and run it right away. Including a new plugin does not mean, you need to change your core-code with each new addition. Plugins can be either included in the processing graph, or they can be built outside the source tree and become an individual component in your build.
Furthermore, this separation of plugins makes crashes a matter of a simple process restart, which does not require your whole build to be restarted because of one plugin failure.
You can read more in our PANTHEON.tech series on VPP.
You can contact us at https://pantheon.tech/
Explore our Pantheon GitHub.
Watch our YouTube Channel.
[How-To] Use AWX and Ansible for Automation & SFC in a multi-tenant Edge & DC environment
/in Blog /by PANTHEON.techAnsible is a powerful automation tool, widely used by administrators for the automation of configuration and management of servers.
It started being adopted by network engineers as a tool for automation of configuration and management of networking devices (bare metal or virtual). Steps of the specific automated process are implemented as tasks, defined in YAML format. Tasks can be grouped into roles with other tasks and are executed as so-called plays, defined in another YAML file called playbook.
Playbooks also associate definitions of variables and list of hosts, where the roles and tasks will be performed. All of the mentioned (tasks, roles, playbooks, variables, hosts) can be specified as YAML files with a well-defined directory structure.
This makes Ansible suitable to be used as a base of Infrastructure as Code (IaC) approach to configuration management and orchestration in the telco industry, data centers (orchestration of virtualization and networking) & many more.
Figure A: An Ansible Playbook example structure
Ansible playbook structure
AWX provides UI and REST API on top of Ansible and also adds the management of inventories (lists of hosts and groups of hosts), credentials (SSH & more) integration with CVS (Code Versioning Systems, e.g.: Git).
In AWX, you can define job templates, which associates playbooks with repositories, credentials, configuration, etc. and you can execute them. The job templates can be used to build graphs, defining the order of execution of multiple job templates (sequentially or in parallel). Such graphs are called workflows and they can use job templates & other workflows as graph nodes.
Figure B: AWX WorkFlow and Job Templates
AWX WorkFlow and Job Templates
In our previous blogs, we have demonstrated the usage of SDN controller based on lighty.io as a controller of OVSDB capable devices and OpenFlow switches.
In this article, we’re going to describe some example Ansible playbooks and Ansible modules, using an SDN controller based on lighty.io. We will also be orchestrating Open vSwitch instances as a networking infrastructure of core data centers and edge data centers. This way, we are able to build solutions, utilizing Service Functions (SFs) and Service Function Chaining (SFC), which are dedicated to a specific tenant or particular service.
Figure 1: Data Center Simulation Setup
Data Center Simulation Setup
In the above Figure 1, we can see a topology of the testing setup, where 3 virtual machines are running in a Virtual Box and connected into an L2 switch, representing the underlay network.
Each VM has an IP address, configured from the same subnet. The two VMs simulate data centers or servers respectively. In each DC VM, there is an Open vSwitch installed and running without any configuration (using the default configuration, which will be overridden by our SDN controller), together with ovs-vsctl and ovs-ofctl utilities.
In the management VM, Ansible and AWX are installed & running. Also, an SDN controller based on lighty.io. using OVSDB and OpenFlow Southbound plugins and a RESTCONF northbound plugin is in the same VM.
This way, it is possible to use the SDN controller to manage and configure Open vSwitch instances over the HTTP REST API – according to RESTCONF specification and YANG models of OVSDB and OpenFlow plugins. See the implementation of Ansible roles and Ansible module for more details regarding specific RESTCONF requests usage.
In addition to the RESTCONF requests, Ansible uses also CLI commands over SSH to create namespaces, veth links and to connect them with a bridge instance created in respective Open vSwitch instance. OpeFlow flows are used as for configuration of rules forwarding packets from one port of virtual bride to another (and vice versa). All flow configurations are being sent as RESTCONF requests to the SDN controller which forwards them to the specific bridge of specific Open vSwitch instance.
Starting our Datacenters
We will also use a simple testing command for each DC VM. The command sends 3 ICMP echo requests from the tenant’s namespace, to the other tenant’s namespace in another DC VM. The requests are being sent in an infinite loop (using the watch command). Therefore, at first, they will show that the namespaces don’t exist (because they really don’t, according to Figure 1).
But after the successful provisioning and configuration of the desired virtual infrastructure, they should show that the ping command was successful, as we will demonstrate later.
Figure 2 and Figure 3 show an example of the output of the testing commands.
DataCenter-1:
Figure 2 for DataCenter-1
DataCenter-2:
Figure 3 for DataCenter-2
The playbooks and the Ansible module made for this demo can be executed directly from CLI (see README.md) or used with AWX. We have made a workflow template in AWX, which executes playbooks in the correct order. You can see the graph of execution in Figure 4:
Figure 4: Graph of Playbook Execution
Tenant provisioning with SFC and vFW SF workflow execution
After successful execution of the workflow, we have a provisioned and configured network namespace in each DC VM, which is connected to the newly created bridge in each respective Open vSwitch. There’s also another namespace in DC-1 VM which is connected to the bridge while using two veth links.
The tunnel interface is also connected to the bridge and uses the VXLAN ID 123. The bridge in each Open vSwtich instance is configured by adding OpenFlow flows forwarding packets between ports of the bridge. The network namespace in the DC 1 VM called v-fw, is used for an SF, which implements a virtual firewall using Linux bridge (br0) and iptables.
After provisioning of the SF, both veth links are connected into the Linux bridge and iptables are empty so all packets (frames) can traverse the virtual firewall SF. The resulting system is displayed in Figure 5.
Figure 5 – Resulting structure of our system
Resulting system after successful provisioning
Now, if we would check the testing ping commands, we can see that the ICMP packets are able to reach the destination, see Figure 6. and Figure 7.
Figure 6 – Successful ping commands in each direction (DataCenter-1)
Figure 7 – Successful ping commands in each direction (DataCenter-2)
The Path of ICMP Packets
In Figure 8, there are details of OpenFlow flows configured during provisioning in each bridge in the Open vSwtich instances.
Here’s a description of the path traversed by ICMP packets from t1-s1 to t1-s2:
Figure 8: Detail of the OpenFlow flows configured in the bridges in Open vSwitch instances
Using the iptables as a Virtual Firewall
Now, we can use the Virtual Firewall SF and apply some iptables rules to the traffic, generated by the ping commands. Here is an example of the command, submitted at DC1 VM, which executes the iptables command in the v-fw namespace. The iptables command adds a rule to the FORWARD chain, which drops an ICMP echo (request) packets and the rule is applied at veth3 interface:
Result of this rule can be seen in Figure 9 and Figure 10. The ICMP traffic has now dropped. Not only in case of direction from DC2 to DC1, but also in the reverse direction (from DC1 to DC2), which also works.
Figure 9: The ping commands after the iptables role applied (DataCenter-1)
Figure 10: The ping commands after the iptables role applied (DataCenter-2)
Ansible playbooks & module
We’re going to take a closer look at the playbooks. These are used for the provisioning of the infrastructure above. We will follow the graph from Figure 4, where the workflow template execution is shown. The template only executes job templates, which are associated with exactly one playbook.
Each playbook made for this demo uses the same configuration structure, which has been designed to be easily extensible and re-usable for other scenarios, which use the same playbooks.
See the following block, showing the example configuration used for this demo. The same configuration in JSON format is stored in our repository, as cfg/cfg_example.json. Here are the main decisions, which will help us to achieve the desired re-usability:
Job Template Descriptions
Here is a short description of each job template & related playbook together, with the source code of the playbook. These include more detailed comments regarding the steps (tasks and roles) executed by each play of the playbook:
1. SET_001_SDN_tenant_infra is the job template which executes playbook apb_set_tenant.yaml. This playbook creates and connects tenant’s namespaces, bridges, veth links and VXLAN tunnel. See Figure 11, for how does the system look like after the execution of this playbook.
Figure 11: The state of the infrastructure after the execution of SET_001_SDN_tenant_infra template
2. SET_002_SF_chaining executes playbook apb_set_chaining.yaml, which is executed for hosts which have specified the “sf_cfg” item in their configuration so in this demo it is DC1 only. This playbook runs in parallel with the SET_002_tenant_flows template and it creates a namespace for SF and required two veth links and connections. The playbook also configures the corresponding OpenFlow flows in the bridge.
See Figure 12, where you can see the difference after the successful execution.
Figure 12: The state of the infrastructure after the execution of SET_002_SF_chaining template
3. SET_002_tenant_flows executes playbook apb_set_flows.yaml which is executed for hosts, which don’t have the “sf_cfg” item specified in their configuration, in this demo it is DC2. This playbook is executed parallel to SET_002_SF_chaining template and it just configures OpenFlow flows in the bridge, since everything has already been created and connected by SET_001_SDN_tenant_infra template. See Figure 13.
Figure 13: The state of the infrastructure after the execution of SET_002_tenant_flows template
4. SET_003_SF_bridge is the job template, executing apb_set_bridge.yaml playbook. This creates a Linux bridge in the SF namespace for hosts with the “sf_cfg” defined. Both veth links of the SF namespace are connected to the Linux bridge. See Figure 14.
Figure 14: The state of the infrastructure after the execution of SET_003_bridge template
Playbooks used in this demo are not idempotent, so they can’t be executed successfully multiple times in a row. Instead, we have implemented two groups of playbooks.
One group sets all the stuff used in this demo. Another group deletes and un-configures everything and ignores possible errors of particular steps (tasks) so you can use it for cleaning of the setup, if necessary.
De-provisioning
We have also implemented three playbooks, which delete changes made by the provisioning playbooks. We have created a workflow in AWX running these playbooks in the correct order.
Figure 15: Tenant de-provisioning with SFC and vFW SF workflow execution
Multitenancy and isolation
In Figure 16, there’s an example where the second tenant is added. The tenant has two servers – one in each DC. The setup for the second tenant is simple, without SFC. As you can see the tenant has its own virtual bridge in each Open vSwitch instance.
IP addresses in the new tenant’s servers are identical with IP addresses in the first tenant servers. This is possible due to the traffic of each tenant being isolated, using extra virtual bridges and different VXLAN tunnels for each tenant or service.
The new tenant can be added, using the same group of playbooks and the same workflow template. The only thing which needs to be changed is the configuration used with the workflow template. See the example below in Figure 16.
Figure 16: After the second tenant is added
Configuration example for the second tenant provisioning:
Role of the SDN controller
In this demo, we have used an SDN controller based on lighty.io for the configuration of Open vSwitch instances over OVSDB and OpenFlow protocols. The usage of the SDN controller brings the following benefits:
1. Unified REST HTTP API: The data of orchestrated devices (in this case Open vSwitch instances) which allows building upper layer services using this API (e.g. dashboards, analytics, automation and more).
In Figure 17, a screenshot of the Web UI of the OpenFlow is shown, shoving data into four OpenFlow bridges, which are configured after the second tenant has been added. You can see also details of specific flow matching, in port with the action of the type Output port.
2. Caching: The controller allows for caching of the state and configuration of the orchestrated device. The cached configuration can be persistently stored and pushed into the device after re-start of the managed device.
3. Addition logic implementation:e.g. monitoring, resource management, authorization, and accounting or decision making according to an overview of the whole network.
4. Additional deployment: Controllers can be deployed as a geo-distributed clustered registry of multi-vendor networking devices, of the whole core DC network, backbone networks or Edge DC networks.
This way, you can access all the data you need from all of your networking devices, on the path from the core DC to the edge and RAN (Radio Access Network).
5. Underlay Networking: The SDN controllers, based on lighty.io, can be used not only for configuration, orchestration, and monitoring of virtualized networking infrastructure and overlay networking, but also for underlay networking.
Figure 17: Screenshot of the OFM WEB UI, of the SDN controllers OpenFlow data
What have we done today?
We have demonstrated the usage of Ansible, AWX and an SDN controller based on lighty.io, for automation of provisioning of services for multi-tenant data centers.
We have implemented Ansible playbooks and modules for orchestration of virtualized networking infrastructure and provisioning of tenant’s containers (simulated by namespaces). The playbooks and the module can be re-used for multiple use cases and scenarios an can be extended according to specific needs.
You could see how to utilize Open vSwitch and its OpenFlow capable virtual bridges for the creation of an isolated, virtual network infrastructure and Service Function Chaining (SFC). Open vSwitch bridges can be replaced by any OpenFlow capable switch (virtual or bare metal) in real deployments in core data centers or at the edge.
Also, networking devices without OpenFlow support can be used if they implement some “SDN ready” management interface, e.g.: NETCONF, RESTCONF or gNMI.
All of the components used in this demo, including the SDN controller, can be easily integrated into microservices architectures and deployed as Cloud Native applications (services).
Adding upper layer services (dashboards, monitoring, automation, business logic, etc.) you can continuously build solutions for your SDN networks, edge computing or 5G networks.
If you’re interested in a commercial solution, feel free to contact us.
Tomáš Jančiga
You can contact us at https://pantheon.tech/
Explore our Pantheon GitHub.
Watch our YouTube Channel.
[lighty.io] BGP Route Reflector
/in Blog /by PANTHEON.techThe main goal of this project is to create a Docker container, that can be connected to an existing network and provide route-reflector functionality. We are using OpenDaylight-BGP plugin for this demonstration.
What is a BGP route-reflector?
The Border Gateway Protocol (BGP) is a routing protocol, designed for TCP/IP internets. Since the Internal BGP (IBGP) peers must follow the rule:
To prevent loops, all BGP speakers within a single autonomous system must be fully meshed. This way, external routing information can be re-distributed to all other routers within that autonomous system. This operation often represents a serious scaling problem.
The design of a method known as “route reflection“ was introduced, to alleviate the need for “full mesh” peering.
This approach allows one IBGP to act as a route-reflector and all IBGP peers will send routing information only to that peer. This peer will, in turn, forward it to all other peers. A full-mesh topology is changed to a star topology.
Some background on Networking
Let’s take an example of the following topology:
BGP Router Reflector Topology – Example
Firstly, let’s break down what we see in the picture. We have 4 docker containers connected with two docker networks. Typically, networks with 2 nodes connected use /31 or /30 masks. However, since Docker also connects the host to the network (with .1 host address), these masks are not applicable in this case.
We will use Docker auto-generated networks in this example.
cEOS Nodes
cEOS (containerized EOS) is an operating system for network devices from Arista (similar to IOS from Cisco). cEOS with “common” CLI, distribution and a Docker container, provides an easy to use solution for this demo. An important thing for this example is, that cEOS creates a port for every ethX port (except eth0), which is bridged with it. It automatically names it etX. These newly created etX ports are accessible and configurable from cEOS Cli and on start are in switching mode (meaning they don’t have an IP address assigned). We will come back to these ports during the configuration part.
Addresses for this example are as follows:
net1 (172.18.0.0/16)
net2 (172.19.0.0/16)
Additionally, we are using loopbacks to simulate connected networks, which will be the target of routing information exchange and serve us as a connectivity test tools:
Routing
In this example, we are using two autonomous systems to have both types of peers (IBGP and EBGP).
To demonstrate route-reflector functionality cEOS1 and cEOS2 doens’t make a IBGP pair but create pair with lighty-bgp instead which act as a route-reflector. cEOS1 and cEOS3 creates EBGP pair.
Prerequisites
lighty-BGP plugin
The plugin provides a “starting point” for ODL BGP bundles. We will use a Docker image, linked also in the next steps.
Learn more about lighty.io.
ODL BGP
BGPCEP module in ODL is capable to act as a BGP peer.
It provides the following features:
Unsupported operations:
Configuration
0. Before continuing, make sure that you have Docker and Postman installed.
1. Download the lighty BGP Docker image. PANTHEON.tech has its own docker repository, where you can access the image.
2. Download the Docker image of arista cEOS (I was using version 4.20.5F) and install it as ceosimage:4.20.5F:
Prepare the Docker environment for our demo:
a) Create Docker networks:
b) Create containers:
c) Connect containers with networks:
d) Start containers (prevent arp flux):
Right now, we have our environment ready. We can check available ports in the container:
Here, we can see both eth and et port we mentioned earlier. et ports don’t have an IP address, because we didn’t configure it yet.
In this state, only connections to directly connected networks are working.
Configure Arista nodes
Firstly, configure IP addresses to etX ports from the topology picture are created by EOS and only accessible from CLI. Therefore, we are using IP addresses from etX ports.
Then, configure BGP and BGP neighbors. Furthermore, configure EBGP neighbors (different AS) between:
The following command doesn’t work as copy-paste. The first command must be executed separately and the rest may be pasted:
Now we have BGP configured and peering between cEOS1 and cEOS3 should be up. Rest of connections are idle.
Also, routing tables contain only directly connected routes:
5. Add some loopbacks to simulate networks and propagate them via BGP:
Since we still didn’t configure lighty-bgp, we only receive the exchanged information between cEOS1 and cEOS3. Any connection from cEOS2 is still not registered:
Since cEOS3 network is known to cEOS1, its connectivity should work:
Be sure to use the ping command with “source lo0” part!
Without it, the source IP address will be taken from the outgoing port (172.19.0.2 in this case) and you could be misled, that cEOS3 knows about 192.168.2.0/24 network.
Just to verify that cEOS1 doesn’t know how to reach cEOS2 network:
Configure BGP
Here comes the crucial part. We will configure peers on lighty-BGP, which establishes a connection and performs routing information exchange. There is a lot of stuff to configure, so I am going to add comments to break it down a little here.
From lighty-BGP postman collection, use “BGP protocols” to configure BGP and neighbors.
Now, you can verify that all connections should be up & running:
Furthermore, you can verify the advertised routes in BGP datastore with a second request in the collection. That is the GET “OPER rib” of BGP-rib entries.
7. Now, try to ping from ceos2|3 to ceos2|3
Conclusion
Route reflection provides the network with a feature for BGP speakers, to directly peer with a route reflector. We have successfully managed to simulate a route reflector with the help of the ODL-BGP plugin, lighty.io & some additional configuration.
If you’re interested in a commercial solution, feel free to contact us.
Matej Perina
You can contact us at https://pantheon.tech/
Explore our Pantheon GitHub.
Watch our YouTube Channel.
PANTHEON.tech @ ONS 2019
/in Blog /by PANTHEON.techOur PANTHEON.tech all-star team, comprised of Juraj Veverka, Martin Varga, Róbert Varga & Štefan Kobza visited the Open Networking Summit North America 2019 (ONS), in the sunny town of San Jose, California.
In the span of 3 days, keynotes and presentations were held with notable personalities and companies from various network companies & technological giants.
“It was crucial to present our ideas, concepts & goals by short messages or few slides. Since the approximate time of our booth visit was 2-3 minutes, I had to precisely focus and point out why we matter.” (who is saying it?) This was not an easy task since there were companies like Ericsson, Intel, Huawei or IBM at the conference.
Our Skydive/VPP Demo
“Before the actual conference, we were asked to come up with potential demo ideas, which would be presented at ONS. Our SkyDive – VPP Integration demo was accepted and opened the doors to a wide interest in PANTHEON.tech.” As Juraj recollects, after the keynote, waves of visitors swarmed the nearest booths, including ours and our Skydive – VPP Integration demo:
Skydive is an open-source, real-time network topology, and protocols analyzer. It aims to provide a comprehensive way of understanding what is happening in the network infrastructure.
We have prepared a demonstration topology containing running VPP instances. Any changes to the network topology are detected in real-time.
Skydive is a tool that can quickly show, what is currently happening in your network. VPP serves the purpose of fast packet processing, which is one of the main building blocks of a (virtual) network. If anybody wants a fast network – VPP is the way to go.
Connecting Skydive & VPP is almost a necessity, since diagnosing VPP issues is a lot more difficult without using Skydive. Skydive leads you towards the source of the issue, as opposed to the time-consuming studying of the VPP console.
The importance of this demo is based on the need to extract data from VPP. Since the platform does not easily provide the required output, this provides a birds-eye view on the network via Skydive.
“The Skydive demo was a huge hit. Since it was presented in full-screen and had its own booth, we gained a lot of attention due to this unique solution.” Attendees were also interested in our Visibility Package solution and what kind of support PANTHEON.tech could provide for their future network endeavors.
Improvements & ONS 2020
“Inbetween networking, presenting and attending keynotes, we have managed to do some short sightseeing and enjoyed the city of San Jose a little bit. But of course, work could not have waited as we have been excited to come back to the conference atmosphere each day.”
But how was ONS 2019 in comparison to last years conference? “In comparison to last year, the Open Networking Summit managed to expand & increase in quality. We are glad that we made many new acquaintances, which we will hopefully meet again next year!”
We would like to thank the Linux Foundation Networking for this opportunity. See you next year!
[PyConSK19] Automated visualization and presentation of test results
/in Blog /by PANTHEON.techPANTHEON.tech’s developer Tibor Frank recently held a presentation at PyConSK19 in Bratislava. Here is his full-length presentation and some notes on top of it.
Motivation
Patterns, trends, and correlations that might remain undetected in text-based data can be exposed and recognized easier with data visualization.
Why do we need to visualize data? Because people like pictures and they hate piles of numbers. When we want or need to provide data to our audience, the best way how to communicate it is to display it. But we must display it in a form and structure our intended audience can consume. They must process the information in a fraction of second and in the correct way.
A real-world example
When I was building my house, a sales representative approached me and proposed, that he has the best thermal isolation for houses on the market.
He told me that it is 10% better than the second one and showed me this picture. Not a graph, a picture, as this is only a picture with one blue rectangle and two lines. From this point, I wasn’t interested in his product anymore. But I was curious about the price of this magic material. He told me that it is only 30% more expensive than the second one. Then I asked him to leave.
Of course, I was curious so I did some research later in the evening. I found the information about both materials and I visualized it with a few clicks in Excel.
What’s the difference between these two visualizations? The first one is good only as an illustration in marketing materials.
From a technician point of view, I am missing information about what the graph is trying to show me:
The same things which we were told to use at elementary school. It’s simple, isn’t it?
To be honest, this graph confirmed that his product is 10% better, but still, 30% more expensive.
Attributes of a good design
When we are talking about visualization we must also talk about design. In general, there are four attributes of a good design. It must be:
Besides these attributes, we should choose the right point of view. Look at these two pictures. Which one do you like the best?
Do we want to show details? Or a bigger picture? Or both?
We need to decide before we start according to the nature of data we visualize, the information we want to communicate and the intended audience.
We must ask ourselves who will be the customer for our visualized data.
We should keep it in mind while preparing the visuals.
What do we visualize?
Data. Lots of data. 30GB of data, twice a day. Our data is the result of performance tests. I am working on an FD.io project which performs Continuous System and Integration Testing (CSIT) of the Vector Packet Processor (VPP). As I said, we focus on performance. The tests measure the packet throughput and packet latency in plenty of configurations of the VPP. For more information, visit FD.io’s website.
1. Performance test results for the product release:
2.Performance over a defined time period:
Where does the data come from?
FD.io CSIT hierarchy (https://docs.fd.io/)
Jenkins runs thousands of tests on our test-beds and provides the results as robot frameworks’ output.xml files. The files are processed and the data from them visualized. As a final step we use Sphinx to generate html pages which are then published on the web.
What we use
Nothing surprising, we use standard python tools:
I will not bother you with these tools, you might know them better than me.
Plots
We use Plot.ly in offline mode to generate various kinds of plots. Hundreds of dynamically generated plots are then put together by Sphinx to create the release Report or the Continuous Performance Trending.
I’ll start with the plots published in the Report. In general, we run all performance tests ten times to prevent any anomalies in the results. We calculate the mean value and standard deviation for all tests and then work with them.
Packet throughput – Statistical box plot
The elementary information about the performance is visualized by the statistical box plot. This kind of plot provides us all information about statistical data – minimum, first quartile, median, third quartile, maximum and outliers. This information is displayed in the hover box.
As you can see, the X-axis lists indices of individual test suites as listed in Graph Legend; and the Y-axis presents measured Packet throughput values [Mpps]. Both axes start with zero value so we know the scale. The tests in each plot are grouped and ordered by the chosen criteria. This grouping is written in the plot title (area, topology, processor architecture, NIC, frame size, number of cores, test type, measured property).
From this graph we can also see the variability of results – the results in the first graph are in all runs almost the same (there are lines instead of boxes), the results in the second one vary in a quite big range. It says that the reliability of these results are lower than in the first case and there might be an issue in the tested functionality, tests or infrastructure & more.
Packet Latency – Scatter plot with error bars
When we measure the packet latency, we get minimal, average and maximal values in both directions of data flows. The best way we found to visualize it, is the scatter plot with error bars.
The dot represents the average value and the error bars the minimum and maximum values.
The rest of the graph is similar to the previous one.
Speedup – Scatter plot with annotations
Speedup is the increase of the packet throughput if we increase the number of processor cores used for data processing. We measure the throughput using 1, 2 and 4 cores.
Again, we use the Scatter plot. The measured values are represented by dots connected by solid lines. In the ideal case, it would be a straight line. But it is not. So we added dashed lines to show how it would be in the ideal world. In real life, there are limitations not only in software but also in hardware. They are shown as dotted lines – Link, NIC, and PCIe bus limits. These limits cannot be overcome by the software.
3D Data
Some of our visualizations present three-dimensional data, in this example, the packet throughput is measured in a configuration with two changing parameters.
The easiest way to visualize it is to use excel and by a few clicks, we can create a graph like this one (above). It looks quite good but:
So we had to look for a better solution. And we found the heat-map. It presents three-dimensional data in two-dimensional space. It is easy to process all information at one quick sight. We can quickly find any anomalies in this pattern as we expect the highest value to be in the top left corner and decreasing to the right and down.
Packet throughput trending – Scatter plot
The trending graphs show us the trend of packet throughput over the chosen time period which is 90 days in this case. The data points (again average value of 10 samples) are displayed as dots. The trend lines are calculated by JumpAvg algorithm developed by our colleague. It is based on the minimum description length (MDL) principle.
What is important in the visualization of a trend, are changes in the trend. We mark them by color circles: red for regression and green for progression. These changes in trend can be easily spotted by testers and/or developers so we immediately know the effect of merged changes on the product performance.
Tibor Frank
[lighty.io] OVSDB & OpenFlow Controller
/in Blog /by PANTHEON.techPANTHEON.tech has recently published an example application of an SDN controller, using RESTCONF Northbound module and OVSDB + OpenFlow Southbound modules.
In this blog we are going to describe, how to use the SDN controller with an Open vSwitch instance running in OpenStack.
Open vSwitch, OVSDB & OpenFlow
Open vSwitch is open source virtual switch which uses OVSDB (Open vSwitch Database) and OVSDB management protocol for management of virtual OpenFlow switches referred to as bridges.
The bridges are configurable by OpenFlow protocol according to OpenFlow switch specification.
We have already written a blog about OpenFlow protocol and its support by lighty.io. There’s also example SDN controller application called lighty-community-restconf-ofp-app. It utilizes RESTCONF northbound module and OpenFlow southbound module only. You can find it at our GitHub repository.
Connecting to Open vSwitch of OpenStack
In this blog, we will show you some example setup and sequence of requests using both OVSDB and OpenFlow protocols implemented as SB modules in lighty.io.
We have published an example SDN controller called lighty-community-restconf-ovsdb-app, which utilizes RESTCONF northbound module and OVSDB southbound module only. You can check its README.md file and Postman collection for more details.
As we have already mentioned, Open vSwitch used in the testing setup is running in OpenStack. Here is a picture and description of the setup:
The SDN controller is running on a machine with IP address 10.14.0.160 with RESTCONF NB plugin & opening Port 8888.
Example workflow
Subsequent requests can be found in the repository at GitHub, in the form of Postman collection. In the README.md & in this blog, we are using a curl command to send the RESTCONF requests. We are also using the Python module json.tool for printing of JSON responses.
1. Configure OVSDB manager of Open vSwitch
The following piece of the ovs–vsctl show command output shows the initial configuration of the Open vSwitch and its state, where we can see that the Neutron service is connected as OVSDB manager (Manager “ptcp:6640:127.0.0.1”). The Neutron service is also configured as OpenFlow controller for the bridge br-tun (Controller “tcp:127.0.0.1:6633”) and br-tun is connected to the controller.
Using this ovs-vsctl command we set up Open vSwitch to listen to second OVSDB manager connection at TCP port 6640 and an interface with IP address 10.14.0.103. The command keeps the configuration for Neutron service as OVSDB manager (ptcp:6640:127.0.0.1).
The output of “ovs-vsctl show” command must be changed, as a result of the command above. There should be two managers configured, but only one of them is connected. The connected one is Neutron service and we have to start and configure the SDN controller, in order to initiate OVSDB connection from the controller’s side.
2. Setup OVSDB connection
This RESTCONF request results in OVSDB session initiation to the pre-configured OVSDB server in the Open vSwitch.
You can check whether the session has been established using the “ovs-vsctl” show command. Both OVSDB managers should be connected now. You can also use the next RESTCONF request.
3. Retrieve OVSDB network topology data (all nodes)
Now, we are going to ask lighty.io (meaning the SDN controller) about the state of OVS. In this step, we are going to access the SDN controller through a RESTCONF request. The controller will then create a request via the OVSDB protocol and OVS will create the same request, as shown in OVS-VSCTL show.
This RPC request returns the same data as an output of the ovs-vsctl show command. But the show command returns text output. In case of RPC request, the output is formatted as JSON or XML (depending on the Accept header) what is more appropriate for API between software layers of SDN solutions (i.e.: RPCs returning JSON or XML formatted output of commands are SDN ready).
NOTE: In this state, the OVSDB connection between SDN controller and Open vSwitch is established. There’s also another connection which is used by Neutron service. You can check this in the output of ovs-vsctl show:
… and also in the output of RESTCONF request:
The only OpenFlow connection(s) in this state are used by Neutron service, you can see it in the output of ovs-vsctl show:
… and also in the output of RESTCONF request:
Here is an example of complete ovs-vsctl show command output:
The related RESTCONF request:
The example output of the request can be found here.
4. Retrieve specific node from OVSDB topology data (node-id: “ovsdb://HOST1”)
Since there’s only one OVSDB topology node in the SDN controller, the output contains the same data as in case of the previous request.
5. Retrieve OVSDB data of specific bridge (br-int):
This request returns only a subset of data related to the bridge br-int.
6. Setup SDN controller as OpenFlow controller for bridge br-int:
7. Check the state of the connection – retrieve the controller-entry list of br-int:
The GET request above only retrieves OVSDB data of OpenFlow connection between Open vSwitch and SDN controller. The output only contains one entry (if the OpenFlow connection is established then the item “is-connected” is set to true):
In the output of ovs-vsctl show command or previous get requests to OVSDB, you will also see a connection between Open vSwitch and Neutron service:
8. Retrieve network topology:
Here’s an example of the output, where you can find a node-id of the Open vSwitch instance. This can be used in subsequent requests.
9. Retrieve data of all nodes (reply includes also OpenFlow flow tables):
Here’s is the output from our example.
10. Retrieve data of a specific node (reply includes also OpenFlow flow tables):
This request uses node-id in the URL. The node-id can be found in reply to requests 8. and 9.
11. Retrieve specific OpenFlow table of specific node:
12. Delete OpenFlow controller connection from Open vSwitch configuration of bridge br-int:
13. Close OVSDB connection to the Open vSwitch instance:
OpenFlow manager (OFM)
For this setup, you can also use the OFM application, which provides GUI for management of OpenFlow switches. You can connect OFM to the controller and retrieve OpenFlow tables of a specific switch – plus the flows will be graphically displayed. You can also modify existing flows, or add new using OFM. See our blog about OpenFlow integration.
Conclusion
In this blog, we have described the use of an SDN controller with OVSDB and OpenFlow support. It can be used to manage Open vSwitch virtual switches. We have used Open vSwitch running in an OpenStack environment and we described the sequence of requests needed to connect SDN controller to OVSDB and OpenFlow interfaces of Open vSwitch.
This approach can be used to manage Open vSwitch instances, running in OpenStack Network nodes and Compute nodes without breaking the connection between Neutron service and the Open vSwitch instances. But the SDN controller example and described requests can be used with any virtual or physical network device supporting OpenFlow or OVSDB or both protocols.
The usage of RESTCONF SB plugin in the SDN controller means, that any application can implement RESTCONF (HTTP/REST/API) client and communicate with the controller, as we have demonstrated by Postman application and OpenFlow manager (OFM) in the previous blog.
[lighty.io] OpenFlow Integration
/in Blog /by PANTHEON.techlighty.io 9.2.x provides examples of OVSDB & OpenFlow SDN controllers for integration with your SDN solution. Those examples will guide you through lighty.io controller core initialization, with OVSDB and/or OpenFlow southbound plugins attached. You can use those management protocols with a really small memory footprint and simple runtime packaging.
Today, we will show you how to run and integrate the OpenFlow plugin in lighty.
What is OpenFlow?
OpenFlow (OF) is a communications protocol, that gives access to the forwarding plane of a network switch or router over the network. OpenFlow can be applied for:
In a virtual networking context, OF can be used to program virtual switches with tenant level segregation tags (for example VLANs). In the context of NFV, OF can be used to re-direct traffic to a chain of services. It is managed by the Open Networking Foundation.
Why do we need OpenFlow?
Routers and switches can achieve various (limited) levels of user programmability. However, engineers and managers need more than the limited functionality of this hardware. OpenFlow achieves consistent traffic management and engineering exactly for these needs. This is achieved by controlling the functions independently of the hardware used.
PANTHEON.tech has managed to implement the OpenFlow plugin in lighty-core. Today, we will show you how you can run the plugin yourself.
Prerequisites
In order to build and install lighty-core artifacts locally, follow the procedure below:
~/.m2
directoryBuild and Run OpenFlow plugin example
1. Download the lighty-core repository:
2. Checkout lighty-core version 9.2.x:
3. Build the lighty-core project with the maven command:
This will download all important dependencies and create .zip archive in ‘lighty-examples/lighty-community-restconf-ofp-app’ directory.
Extract this archive and start ‘start-ofp.sh’ script or run .jar file using Java 8 with the command:
Use custom config files
The previous command will run the application with default configuration. In order to run it with a custom configuration, edit (or create new) JSON configuration file. Example of JSON configuration can be found in lighty-community-restconf-ofp-app-9.2.1-SNAPSHOT folder.
With the previous command to start the application, pass the path to the configuration file as an argument:
OpenFlow plugin and RESTCONF Configuration
An important configuration, which decides what can be changed, is stored in sampleConfigSingleNode.json. For applying all changes, we need to start OFP with this configuration as a Java parameter.
ForwardingRulesManager
FLOWs can be added to OpenFlow Plugin (OFP) in two ways:
Flow added this way is persistent.
In case you need to disable FRM, start OFP with an external configuration & set the enableForwardingRulesManager to false. Then, simply start OFP with this external configuration.
RESTCONF
RESTCONF configuration can be changed in the JSON config file sampleConfigSingleNode.json, mentioned above. It is possible to change the RESTCONF port, IP address or version of RESTCONF. Currently, the version of RESTCONF set to DRAFT_18, but it can be set to DRAFT_02.
How to start the OpenFlow example
Firstly, start the OpenFlow example application.
Make sure to read through this guide on how to install mininet.
Next step is to start mininet, with at least one Open vSwitch (use version 2.2.0 and higher).
For this explanation of OFP usage, RESTCONF is set to DRAFT_18. All RESTCONF calls used in this example can be imported from file OFP_postman_collection.json, in project resources to Postman.
We will quickly check if the controller is the owner of the connected device. If not, then the controller is not running or the device is not properly connected:
If you followed the instructions and there is a single controller running (not cluster) and only one device connected, the result is:
Let’s get information about the connected device. If you want to see all OFP inventory, use ‘get inventory‘ call from PostmanCollection.
From config:
From operational:
JSON result starts with:
Add FLOW
Now try to add table-miss flow, which will modify the switch to send all not-matched-packets to the controller via packet-in messages.
To config data-store:
Directly to a device via RPC call:
Get FLOW
Check if flow is in data-store:
In the config:
In operational:
Result:
Get FLOW directly from modified device s1 in the command line:
Device result:
Update FLOW
This works the same as add flow. OFP will find openflow:1, table=0, flow=1 from url and update changes from the body.
Delete FLOW
From config data-store:
Via RPC calls:
Proactive flow installation & traffic monitor via Packet-In messages
In order to create traffic, we need to setup topology behavior. There are three methods for flow table population (Reactive, Proactive, Hybrid). We encourage you to read more about their differences.
In our example, we use Proactive flow installation, which means that we proactively create flows before traffic started.
Now we tested that connection between devices is not established:
Next step is to create flows, that create a connection between switches. This will be managed by setting Matched and Action filed in Table 0. In this example, we connect two ports eth1 and eth2 in a switch together. So everything that comes from port eth1, is redirected to port eth2 and vice versa.
Next configuration will be sending monitoring packets in a network. This configuration has set the switch s1 to send all packets, which came to port eth2, to the controller. So the visualized result should look like this:
1. Add flow to switch s1 (named in OFP as ‘openflow:1’), which redirect all traffic that comes from port eth1 (in OFP named as ‘1’) to port eth2 (in OFP named as ‘2’).
2. Add flow to switch s1, which will connect port 2 and 1 in another direction. Set switch s1 to send all packet transmitted through port 2 to controller:
3. Check all added flows at s1 switch:
4. Add flow to switch s2 to connect port 1 and 2:
5. Check all added flow at s2 switch:
Now, when we try to ping all devices in mininet, we will receive positive feedback:
Show Packet-In messages with Wireshark
Wireshark is a popular network protocol analyzer. It lets you analyze everything that is happening in your network and is a necessity for network administrators and power-users alike.
Start Wireshark with the command:
After it starts, double click on ‘any’ filter. Then, filter packets with ‘openflow_v4.type == 10‘. Now, the Wireshark environment setup will only show Packet-In messages from OpenFlow protocol.
To create traffic in mininet network, we used mininet command:
If everything is setup correctly, then we can see Packet-In messages showing up.
Show Packet-In messages with PacketInListener
In the below section for Java developers, there is an option for setting Packet-In Listener. This configuration set to log every Packet-In message as a TRACE log to console. When this is done, run mininet command ‘h2 ping h1’ again.
If everything is set up correctly, then we can see Packet-In messages in logs.
Java DevelopersSome configuration can be done in Java Main class from OpenFlow Protocol example.
Packet-in listener
Packet handling is managed by adding a Packet Listener. In our example, we add the PacketInListener class, which will be logging packet-in messages. For a new packet listener class, it is important to have implemented the class “PacketProcessingListener”.
The first step is to create an instance of PacketInListener (1 – in the window below). Then we will add OpenflowSouthboundPluginBuilder to this part of the code (2 – in the window below).
OpenFlow Manager (OFM) App
OpenFlow Manager (OFM) is an application developed to run on top of ODL/Lighty to visualize OpenFlow (OF) topologies, program OF paths, gather OF stats and for managing flow tables. In order to install the OFM App, follow these steps:
1. Download OFM repositories from GitHub and checkout master branch
2. NGINX installation
NGINX is used to serve as a proxy server towards OFM application and ODL/lighty RESTCONF interface. Before NGINX starts, it is important to the switch NGINX config file in /etc/nginx/sites-enabled/ with the default file in the root of this project.
In this default file, we have set up the NGINX port, port for RESTCONF and Grunt port. Please be sure that these ports are correct.
After replacing the config file, start NGINX with the command:
If you need to stop NGINX, type in the command:
3. OFM configuration
Before running the OFM standalone application, it is important to configure:
All this information should be written in env.module.js file located in the directory ofm src/common/config.
4. Grunt installation
To run OFM standalone app on local web server, you can use tool Grunt. For this tool is everything prepared in the OFM repository. Grunt is installable via npm, the Node.js package manager.After running grunt and NGINX you can access OFM standalone app via web browser on used NGINX port typing URL localhost:9000.
After running Grunt and NGINX, you can access OFM standalone app via a web browser on a used NGINX port by typing the URL localhost:9000.
OpenFlow Manager environment
With OFM, we can also start the Lighty-OpenFlow Southbound plugin example. From lighty-core repository, follow the example above. In this example, we will use mininet to simulate network topology, start with the command:
If everything is set up correctly, then you should see a basic view of the network topology:
Device management
To see detailed device information, select those devices that you want to inspect. Then click on the main menu bar, at the top of “Flow management” section. Now, you should see device information and added Flows.
In a Flow section, you can Add Flow by clicking on the pen on the left-top side of the table marked by an arrow. In the right side of table at each row, you can delete or update selected flow.
Adding Flows
Adding a flow can be done from the Flow management section by clicking on the pen, on the left-top side of Flow table. Here you can choose the switch, from where the flow should be sent. Then just click on the property that should be added in the flow, from the left menu.
After filling all required fields, you can view your flow as a JSON message, by clicking on the “show preview” button. For sending flows to a switch, click on “Send message” button.
Statistics
To show statistics in the network click on the “Statistics” section in the main menu bar. Then, choose from the drop-down menu what statistic you want to see and click on “Refresh data” button.
Conclusion
We have managed to integrate the whole OpenFlow plugin into lighty-core. This is the same way it is implemented in OpenDaylight, version Fluorine (SR1). It is, therefore, possible to use lighty-controller for managing network devices via the OpenFlow protocol.
If you would like to see how our commercial version might benefit your business, please visit lighty.io for more information, or contact us here.
PANTHEON.tech @ MWC 2019 in Barcelona
/in Blog /by PANTHEON.techPANTHEON.tech‘s Denis Rasulev visited Barcelona for the annual Mobile World Conference in Barcelona. Here are his thoughts on the event.
I was thrilled to visit MWC from the beginning. Such a huge and renowned event always shows the latest tech not only in the mobile sector. This years themes and keywords could be summarized to three cores: 5G, IoT & AI.
First of all, I would like to point out how well the event was organized. I was greeted with my badge right at the airport, with directions towards the conference being provided by helpful volunteers. After settling in Barcelona, I set off to start my day early and arrive at the MWC at 8 AM.
I soon regretted being an early bird, since most booths were closed at this time and most presenters were just settling in. The Fira Gran Via, designed by Japanese architect Toyo Ito, was monumental and emphasized the futuristic approach of the conference. Saying the venue was monumental is an understatement – I was only able to visit 2/3 of all booths on the first day. In total,
I have made 89,109 steps throughout MWC 2019.
Themes @ MWC 2019
Some booths were both impressive and beautiful, either taking up several hundred square-meters of space. Some booths even had two floors, just to underline the massiveness of the event. The venue was packed with attendees since morning, but it was easy to talk to presenters and orientate in each pavilion.
With each day and conference, we can feel that 5G is coming closer to consumers and real-life deployment. What seemed like a wild, unreal idea a few years ago is now on the way of dictating the future of each new technology. I saw remote road assistance which was possible due to lightning-fast 5G utilization. Healthcare could become fully automated or remotely controlled. Again, this is due to 5G coverage.
I am glad, that PANTHEON.tech is making sure to stay on point of this revolution and keep up.
The future of our industry
There were prototypes of robots, which would make coffee shops with humans obsolete. It would take your order via voice recognition and prepare your order. Another robot has perfectly built paper-planes with inhumane precision. Some of these products seemed like a toy for playing around. But we have to remember that this is what makes greatness – testing, thinking out-of-the-box and creating a functional concept. It was wonderful to see, that startups had an opportunity to also present themselves. Not only to attendees, but to potential investors as well.
I held the future in my hands, in form of the Barefoot Networks’ Toffino 2 chip. I was able to see the first functional, foldable phone by Samsung. But most importantly, I was able to see how the future will be shaped in the coming years.
MWC is a must-go, powerful event with great networking opportunities. Trust me, you want to be there. In the future, I will definitely require a larger team to cover more ground at the next Mobile World Conference. Hopefully, PANTHEON.tech will see you there!
Vector Packet Processing 104: gRPC & REST
/in Blog, VPP /by PANTHEON.techWelcome back to our Vector Packet Processing implementation guide, Part 4.
Today, we will go through the essentials of gRPC and REST and introduce their core concepts, while introducing one missing functionality into our VPP build. This part will also introduce the open-source GoVPP, Go language bindings for binary API – VPP management.
The Issue
Natively, VPP does not include a gRPC / RESTful interface. PANTHEON.tech has developed an internal solution, which utilizes a gRPC-gateway to VPP, using GoVPP. It is called VPP-RPC, through which you can now connect to VPP using a REST client.
In case you are interested in this solution, please contact us via our website.
Introduction
First and foremost, here are the terms that you will come across in this guide:
JSON message sequence
gRPC gateway exposes the REST service, for which there is no built-in support in VPP. By using gRPC-gateway and gRPC server services, the VPP API is available through gRPC and REST at the same time. Both services use generated models from VPP binary APIs, therefore exposing both APIs is easy enough to include both. It is up to the user to choose, which mechanism they will use.
When exchanging data between a browser and a server, the data can only be text. Any JavaScript object can be converted into a JSON and sent to the server. This allows us to process data as JavaScript objects, while avoiding complicated translations and parsing issues.
The sequence diagram below describes the path the original JSON message takes in our solution:
VPP API build process
The figure below describes the build process for a single VPP API. Lets see what needs to happen for a tap API:
Build process for a VPP API. @PANTHEON.tech
VPP APIs are defined in /usr/share/VPP/api/ which is accessible after installing VPP. The Go package tap is a generated via the VPP Agent binary API of the ‘tap’ VPP module. It is generated from this file: tap.api.json.
This file will drive the creation of all 3 building blocks:
Running the examples
To run all the above, we need to make sure all these processes are running:
gRPC server (needs root privileges)
gRPC gateway
Running a simple request using Curl
If we want to invoke the API we have created, we can use Curl. Vpe will require an URL (vpe/showversion/request), which will map the above mentioned API to VPP’s binary API. We will now use Curl to POST a request to a default address of localhost:8080:
The decoded reply says:
Postman collection
We provide a Postman collection within our service, which serves as a starting point for users with our solution. The collection created in the vpp-rpc repository, tests/vpp-rpc.postman_collection.json path, contains various requests and subsequent tests to the Tap module.
Performance analysis in Curl
Curl can give us detailed timing analysis of a request’s performance. If we run the previous request 100 times, the summary times (in milliseconds) we get usually are:
Judging from the graph below, we see that most of the requests take well below the average mark. Profiling our solution, we’ve found the reason for the anomalies (above 10ms) to be caused by GoVPP itself when waiting on the reply from VPP. This behavior is well documented on GoVPP wiki. We can conclude our solution closely mirrors the performance of the synchronous GoVPP APIs.
Here is the unary RPC total time in ms:
In conclusion, we have introduced ourselves to the concepts of gRPC and have run our VPP API + GoVPP build, with a REST service feature. Furthermore, we have shown you our in-house solution VPP-RPC, which facilitates the connection between the API and GoVPP.
If you would like to inquire about this solution, please contact us for more information.
In the last part of this series, we will take a closer look at the gNMI service and how we can benefit from it.
You can contact us at https://pantheon.tech/
Explore our Pantheon GitHub.
Watch our YouTube Channel.
Vector Packet Processing 103: Ligato & VPP Agent
/in Blog, VPP /by PANTHEON.techWelcome back to our guide on Vector Packet Processing. In today’s post number three from our VPP series, we will take a look at Ligato and its VPP Agent.
Ligato is one of the multiple commercially supported technologies supported by PANTHEON.tech.
What is a VNF?
A Virtual Network Function is a software implementation of a function. It runs on single or multiple Virtual Machines or Containers, on top of a hardware networking infrastructure. Individual functions of this network may be implemented or combined together, in order to create a complete networking communication service. A VNF can be used as a standalone entity or part of an SDN architecture.
Its life-cycle is controlled by orchestration systems, such as the increasingly popular Kubernetes. Cloud-native VNFs and their control/management plane can expose REST or gRPC APIs to external clients, communicate over a message bus, or provide a cloud-friendly environment for deployment and usage. It can also support high-performance data planes, such as VPP.
What is Ligato?
It is the open-source cloud platform for building and wiring VNFs. Ligato provides infrastructure and libraries, code samples, and CI/CD processes to accelerate and improve the overall developer experience. It paves the way towards faster code reuse, reducing costs, and increasing application agility & maintainability. Being native to the cloud, Ligato has a minimal footprint, plus can be easily integrated, customized, and extended, deployed using Kubernetes. The three main components of Ligato are:
The platform is modular-based – new plugins provide new functionality. These plugins can be set up in layers, where each layer can form a new platform with different services at a higher layer plane. This approach mainly aims to create a management/control plane for VPP, with the addition of the VPP Agent.
What is the VPP Agent?
Quick starting the VPP Agent
For this example, we will work with the pre-built Docker image.
Install & Run
Run the downloaded Docker image:
docker pull ligato/vpp-agent
docker run -it --name vpp --rm ligato/vpp-agent
Using agentctl, configure the VPP Agent:
docker exec -it vpp agentctl -
Check the configuration, using agentctl or the VPP console:
docker exec -it vpp agentctl -e
172.17
.
0.1
:
2379
show
docker exec -it vpp vppctl -s localhost:
500
For a detailed rundown of the Quickstart, please refer to the Quickstart section of VPP Agents Github.
We have shown you how to integrate and quickstart the VPP Agent, on top of Ligato.
Our next post will highlight gRPC/REST – until then, enjoy playing around with VPP Agent.
You can contact us at https://pantheon.tech/
Explore our Pantheon GitHub.
Watch our YouTube Channel.
PANTHEON.tech joins the Telecom Infra Project
/in News /by PANTHEON.techIn January 2019, PANTHEON.tech has become a member of the Telecom Infra Project community – a collaborative telecom community.
The Telecom Infra Project is a network of companies which aim to share, create and collaborate on innovative technologies in the field of telecommunication. Its members comprise a variety of operators, technology providers, developers, startups and other institutions, outside of telecommunication services. It was launched in February 2016, with the aim of accelerating the pace of innovation in the telecom industry.
How it works
The Telecom Infra Project has a structure, in which its members can actively contribute and share their expertise in the wide range of telecom technologies:
Project groups design and build technologies. They are divided into three network areas, that altogether create an end-to-end network: Access – Backhaul – Core and Management.
Community Labs test and validate the technologies from Project Groups in field and production trials. There are 6 active TIP Community Labs from all around the world, which share their testing results and respond to the members outputs.
Ecosystem Acceleration Centers aim to build a dedicated space with venture capital funding and experienced advisors, in order to help upcoming and promising telecom startups bring their ideas to the market and consumers.
PANTHEON.tech is proud to be part of the driving force in telecommunication innovation.We believe that we will prove ourselves worthy of this membership with our expertise in SDN, NFV or open-source solutions.
We are looking forward to cooperating with other TIP members on improving and creating technologies.
You can contact us at https://pantheon.tech/
Explore our Pantheon GitHub. Follow us on Twitter.
Watch our YouTube Channel.
Vector Packet Processing 102: Honeycomb & hc2vpp
/in Blog, VPP /by PANTHEON.techWhat is Honeycomb?
Honeycomb is a generic, data plane management agent and provides a framework for building specialized agents. It exposes NETCONF, RESTCONF and BGP as northbound interfaces.
Honeycomb runs several, highly functional sets of APIs, based in ODL, which are used to program the VPP platform. It leverages ODL’s existing tools and integrates several of its existing components (YANG Tools, MD-SAL, NETCONF/RESTCONF…). In other words – it is a light on resources, bare bone version of OpenDaylight.
Its translation layer and data processing pipelines are classified as generic, which makes it extensible and usable not only as a VPP specific agent.
Honeycomb’s functionality can be split into two main layers:
Honeycomb mainly acts as a bridge between VPP and the actual OpenDaylight SDN Controller.
Examples of VPP x Honeycomb integrations
We’ve already showcased several use cases on our Pantheon Technologies’ YouTube channel:
For the purpose of integrating VPP with Honeycomb, we will further refer to the project hc2vpp, which was directly developed for VPP usage.
What is hc2vpp?
This VPP specific build is called hc2vpp, which provides an interface (somewhere between a GUI and a CLI) for VPP. It runs on the same host as the VPP instance and allows to manage it off-the-box. This project is lead by Pantheons own Michal Čmarada.
Honeycomb was created due to a need for configuring VPP via NETCONF/RESTCONF. During the time it was created, NETCONF/RESTCONF was provided by ODL. Therefore, Honeycomb is based on certain ODL tools (data-store, YANG Tools, others). ODL as such uses an enormous variety of tools. Honeycomb was created as a separate project, in order to create a smaller footprint. After its implementation, it exists as a separate server and starts these implementations from ODL.
Later on, it was decided that Honeycomb should be split into a core instance, and hc2vpp would handle VPP related parts. The split also occurred, in order to provide the possibility of creating a proprietary device control agent. hc2vpp (Honeycomb to VPP) is a configuration agent, so that configurations can be sent via NETCONF/RESTCONF. It translates the configuration to low level APIs (called Binary APIs).
Honeycomb and hc2vpp can be installed in the same way as VPP, by downloading the repositories from GitHub. You can either:
Install Honeycomb
Install hc2vpp
For more information, please refer to the hc2vpp official project site.
In the upcoming post, we will introduce you to the Ligato VPP Agent.
You can contact us at https://pantheon.tech/
Explore our Pantheon GitHub.
Watch our YouTube Channel.
PANTHEON.tech adds OC4VPP code to Sweetcomb
/in News, VPP /by PANTHEON.techRecently, PANTHEON.tech has decided to contribute to FD.io’s Sweetcomb project source-code. This was mainly due to the fact, that our new project OC4VPP would compliment the idea and possibilities of the project, while improving its functionality.
What was the OC4VPP project?
Network administrators have the possibility to use protocols, such as gNMI or NETCONF, in order to communicate with sysrepo.
OC4VPP was a sysrepo plugin, with which we were able to setup and orchestrate the VPP framework. This plugin was part of our in-house solution that we were working on.
Sweetcomb and OC4VPP both use VAPI, in order to communicate with the VPP API. Here at PANTHEON.tech, our developers managed to include more YANG models into OC4VPP. But we realized soon, that Sweetcomb was in advanced development and provided some of the functionality, we wanted to work on.
How will Sweetcomb benefit from OC4VPP?
Sweetcomb is a management agent, used to expose YANG modules, with the help of RESTCONF and NETCONF, in order to immediately allow management of the VPP instance. It translates all communication between the Northbound interface and the VPP API.
We believe, that Sweetcomb will directly benefit from PANTHEON.tech’s solution, in form of the source-code of OC4VPP. This will provide the project with more YANG models to expand its functionality.
Due to Sweetcomb being a new project and mainly proof of concept, it currently supports only these 5 IETF-YANG models:
First of all, Sweetcomb will gain support for OpenConfig models, which expands its usability and improves the projects deployment scale.
In case of OC4VPP, we managed to include 10 additional YANG models we would like to implement into the actual list of supported modules in Sweetcomb:
As a regular open-source contributor and supporter, we are glad that we were able to make this important decision and showcase crucial principles of open-source development:
Communication – Participation – Collaboration
You can find the source-code for Sweetcomb in the official GitHub.
You can contact us at https://pantheon.tech/
Explore our Pantheon GitHub. Follow us on Twitter.
Watch our YouTube Channel.
Vector Packet Processing 101: VPP Plugins & Binary API
/in Blog, VPP /by PANTHEON.techIn the first part of our new series, we will be building our first VPP platform plug-in, using basic examples. We will start with a first-dive into plugin creation and finish with introducing VAPI into this configuration.
If you do not know what VPP is, please visit our introductory post regarding VPP and why you should consider using it.
Table of contents:
How to write a new VPP Plugin
The principle of VPP is, that you can plug in a new graph node, adapt it to your network purposes and run it right off the bat. Including a new plugin does not mean, you need to change your core-code with each new addition. Plugins can be either included in the processing graph, or they can be built outside the source tree and become an individual component in your build.
Furthermore, this separation of plugins makes crashes a matter of a simple process restart, which does not require your whole build to be restarted because of one plugin failure.
1. Preparing your new VPP plugin
The easiest way how to create a new plugin that integrates with VPP is to reuse the sample code at “src/examples/sample-plugin”. The sample code implements a trivial “macswap” algorithm that demonstrates the plugins run-time integration with the VPP graph hierarchy, API and CLI.
To create a new plugin based on the sample plugin, copy and rename the sample plugin directory
There are the are following files:
2. Building & running your new plugin
How to create new API messages
API messages are defined in *.api files – see src/vnet/devices/af_packet.api, src/vnet/ip/ip.api, etc. These API files are used to generate corresponding message handlers. There are two types of API messages – non-blocking and blocking. These messages are used to communicate with the VPP Engine to configure and modify data path processing.
Non-blocking messages use one request and one reply message. Message replies can be auto-generated, or defined manually. Each request contains two mandatory fields – “client-index” and “context“, and each reply message contains mandatory fields – “context” and “retval“.
API message with auto-generated reply
Blocking messages use one request and series of replies defined in *.api file. Each request contains two mandatory fields – “client-index” and “context“, and each reply message contains mandatory field – “context“.
Blocking message is defined using two structs – *-dump and *_details
Once you define a message in an API file, you have to define and implement the corresponding handlers for given request/reply message. These handlers are defined in one of component/plugin file and they use predefined naming – vl_api_…_t_handler – for each API message.
Here is an example for existing API messages (you can check it in src/vnet/ip component):
Request and reply handlers are usually defined in api_format.c (or in plugin). Request uses a predefined naming – api_… for each API message and you have to also define help for each API message :
Replies can be auto-generated or manually defined.
How to call the binary API
In order to call the binary API, we will introduce VAPI to our configuration.
VAPI is the high-level C/C++ binary API. Please refer to src/vpp-api/vapi/vapi_doc.md for details.
VAPI’s multitude of advantages include:
We can use the following C++ code to call our new plugins’s binary API.
Additional C/C++ Examples
Furthermore, you are encouraged to try the minimal VAPI example provided in vapi_minimal.zip below.
Download VAPI_Minimal.zip
Send download link to:
This example creates a loopback interface, assigns it an IPv4 address and then prints the address.
Follow these steps:
In conclusion, we have:
Our next post will introduce and highlight the key reasons, why you should consider Honeycomb/hc2vpp in your VPP build.
You can contact us at https://pantheon.tech/
Explore our Pantheon GitHub. Follow us on Twitter.
Watch our YouTube Channel.
PANTHEON.tech @ 2020 Vision Executive Summit in Lisbon
/in Blog /by PANTHEON.techI was sent to Lisbon by PANTHEON.tech, in order to attend the annual 2020 Vision Executive Summit. Here are my experiences and insights into this event.
The 2020 Vision Executive Summit, presented by Light Reading, was focused mainly on the pending revolution of 5G networks, automation, Edge Computing, IoT, security, etc. It hosts a variety of vendors and service providers, who provide insights into the telecom industry’s current trends and emerging topics.
Themes of the summit
In case of 5G, we have seen a huge opportunity in discussing PANTHEON.tech’s future involvement and plans in this revolution. The challenges surrounding 5G were discussed by industry leaders with hands-on experience. This was beneficial, since we were confronted with the harsh reality of 5G. Due to it being a technology in-progress, many questions are still open. What will be the use-cases? What should we prepare for and when?
Nobody really knows how it may turn out, when it will become widely available for consumers, or if the world is even prepared for it. But it was a great opportunity to meet the people, whose bread and butter consists of building the future 5G network. It was an invaluable experience, to see a realistic view from industry-insiders and their perception of the future. It was a collective of equally-minded individuals and companies in the fields relevant to PANTHEON.tech’s vision.
Another heavily discussed topic was security. While it is no secret that technology is successfully becoming an important part of our lives. Companies have to heavily rely on a defense against potential security threats and cyber attacks. Panels were held regarding the importance of security measures in expanding networks and the need for flexible and agile security solutions.
Subsequently, Edge Computing, which brings the distribution of data closer to the consumer, was also mentioned and discussed, in regards to its vulnerabilities and future. In this case, it was said with certainty that if you are the type of parent that plans your child’s future for them, make them study cyber security. The investment will return sooner than you could imagine.
Our experience at the summit
Our vision in attending this summit was to find out, if this summit is the right fit for us (spoiler alert – it was) check on the newest trends in our field and in which direction are they developing. The discussions were open and involved the real thoughts and views, without the PR and marketing stuff.
Lisbon is an interesting city, since it is more hidden from the eye of a classic tourist. It reminded me, in a way, of San Francisco. This was mainly due to trams riding uphill and the many uphill roads one has to take, in order to get somewhere. It was surprising though, that the city is making it a point to keep the original architecture of the city in tact and without major reconstructions.
As for the venue itself, the Intercontinental Hotel in Lisbon was nothing short of wonderful. Another highlight was the gala dinner. It was the perfect opportunity for casual networking, in the pompous and spectacular setting of Palacio de Xebregas. I have also experienced my first tuk-tuk ride, where I had to consider whether my life was worth the visit.
In conclusion – it was. I am looking forward to the new business-partners and connections PANTHEON.tech has made at the 2020 Vision Executive Summit.
You can contact us at https://pantheon.tech/
Explore our Pantheon GitHub.
Watch our YouTube Channel.
PANTHEON.tech is the 2nd largest OpenDaylight contributor for Q3/2018
/in News, OpenDaylight /by PANTHEON.techIn the last week of November 2018, Bitergia, a software development analytics company, published a report on the past and current status of the OpenDaylight project, which plays a significant role in PANTHEON.tech’s offerings and solutions.
PANTHEON.tech’s CTO Robert Varga, is leading the list of per-user-contributions to the source code of OpenDaylight, with over 980 commits to the source code in Q3 of 2018. This achievement further establishes PANTHEON.tech’s position as one of the largest contributors to the OpenDaylight project.
As for the list of companies which contribute to the source code of OpenDaylight, PANTHEON.tech is the 2nd largest contributor for Q3/2018, with 1034 commits. We were just 34 commits shy of the top contributor position, which belongs to Red Hat.
Due to ODL’s open-source nature, anyone can contribute to the project and improve it in the long-run. Any change that gets added to the source code is defined as a commit. These types of changes need an approval and can not be any type of automated activity – including bot-actions or merges. This means, that each single commit is a unique change, added to the source code.
PANTHEON.tech will continue its commitment to improving OpenDaylight and we are looking forward to being a part of the future of this project.
What is OpenDaylight?
ODL is a collaborative open source project aimed to speed up the adoption of SDN and create a solid foundation for Network Functions Virtualization (NFV).
PANTHEON.tech’s nurture for ODL goes back when it was forming. In a sense, PANTHEON.tech has led the way is and how an SDN controller is and should be. This requires dedication, which was proven over the years with the extensive amount of contribution thanks to its expert developers.
Click here if you are interested in our solutions, which are based on, or integrate ODL’s framework.
You can contact us at https://pantheon.tech/
Explore our Pantheon GitHub.
Watch our YouTube Channel.
PANTHEON.tech @ Huawei Connect 2018 in Shanghai
/in Blog /by PANTHEON.techPANTHEON.tech visited Shanghai last week to attend the third annual Huawei Connect. Martin Varga shares some insights from the event.
Activate Intelligence
This year’s theme was Activate Intelligence. Huawei outlined its broad strategy to bring artificial intelligence (AI) to the masses in applications in manufacturing, autonomous driving, smart cities, IoT and other areas. AI will enable billions of new devices to be connected and transfer big data over the network.
The conference was held in Shanghai, China, at the Shanghai World Expo Exhibition Center. Huawei has put a lot of resources and effort into organizing the event which has shown its direct impact on over 26,000 in the attendance. The conference was organized perfectly, to the last detail (exhibition areas, keynotes and conference area, chill-out zones, etc.).
We have witnessed the demonstrations of various smart technologies, ranging from smart city applications, smart education, smart transportation. Smart everything.
One of the most impressive technology demonstrations was an AI that was able to translate Chinese to English and vice versa, as good as a human translator could. Microsoft in cooperation with Huawei states:
Huawei is also building an AI ecosystem of partners, that is targeted to exceed 1 million developers over the next three years with US$140m.
Networking
We have had some interesting meetings with Huawei’s representatives. It was very pleasant to learn about Huawei’s visions for the near future. We are also glad to share the same vision for an exciting future. Huawei invests heavily into researching new technologies such as AI or IoT, in order to define practical use-cases that can be deployed into their product’s portfolio.
PANTHEON.tech, as a software development company, is strongly focused on computer networking which is related to the Huawei’s vision to integrate AI into managing network operations.
Mr. Yang Jin Director, Network Data Analytics Research Huawei Technologies Co., stated:
Feel free to contact PANTHEON.tech if you have interest in any of the AI, AR/VR, IoT, Intent Driven Network, SDN, NFV, Big Data, and related areas. We can talk about challenges and how we can solve them together.
Martin Varga
Technical Business Development Manager
FRINX UniConfig is now powered by PANTHEON.tech’s lighty.io
/in Blog /by PANTHEON.techWhat is lighty.io?
lighty.io is an SDK that provides components for the development of SDN controllers and applications based on well-established standards in the networking industry. It takes advantage of PANTHEON.tech’s extensive experience from the involvement in the OpenDaylight platform and simplifies and speeds up the development, integration, and delivery of SDN solutions.
lighty.io also enables SDN programmers to use ODL services in a plain JavaSE environment. lighty.io enables a major OpenDaylight distribution vendor to build and deploy their applications faster.
FRINX UniConfig
FRINX UniConfig provides a common network API across physical and virtual devices from different vendors. It leverages an open source device library, which offers connectivity to a multitude of networking devices and VNFs.
The API provides the ability to store intent and operational data from services and devices, enables to commit intent to the network, syncs from the network so that the latest device state is reflected in the controller, compares intended state and operational state and provides device and network wide transactions. All changes are applied in a way that only those parts of the configuration that have changed are updated on the devices.
The UniConfig framework consists of distinct layers, where each layer provides a higher level of abstraction. APIs of the lowest layer provides the ability to send and receive unstructured data to and from devices. The unified layer provides translation capabilities to and from OpenConfig. The UniConfig layer provides access to the intent and the actual state of each device plus the capability to perform transactions and rollback of configurations.
NETCONF devices can be configured via their native YANG models or via OpenConfig. Finally, FRINX UniConfig also provides service modules based on IETF YANG models for the configuration of L2VPNs, L3VPNs and enables the collection of LLDP topology information in heterogeneous networks.
The UniConfig Framework is based on open source projects like OpenDaylight and Honeycomb. It publishes all translation units under the Apache v2 license. Customers and integration partners can freely contribute, modify and create additional device models, which work with the UniConfig Framework.
How did PANTHEON’s lighty.io help?
PANTHEON.tech’s lighty.io helped to make UniConfig run and build faster.
Porting UniConfig to lighty.io required no changes to the application code and has brought many measurable improvements. UniConfig now starts faster, has a smaller memory footprint, and most importantly – significantly reduces build time.
lighty.io packs many features, some of which are:
About FRINX
FRINX offers solutions and services for open source network control and automation. The team is made up of passionate developers and industry professionals who want to change the way networking software is created, deployed and operated. FRINX offers network automation products and distributions of OpenDaylight and FD.io in conjunction with support services. They are proud to count service providers and enterprise companies from the Fortune Global 500 list among its customers.
About PANTHEON.tech
PANTHEON.tech is a software research & development company focused on network technologies and prototype software. Yet, we do not perceive networks as endless cables behind switches and routers. For us, it is all software-defined. Clean and neat. Able to dynamically expand and adapt according to the customer’s needs.
We thrive in a world of network functions virtualization and arising need for orchestration. Focusing on SDN, NFV, Automotive and Smart Cities. Experts in OpenDaylight, FD.IO VPP, PNDA, Sysrepo, Honeycomb, Ligato and much more.
PANTHEON.tech @ OTKD – 345 km in 33,5 hours.
/in News /by PANTHEON.techPANTHEON.tech’s running team participated in the From Tatry To Danube Run (OTKD) 2018.
The relay run named From Tatry To Danube (OTKD) is 345 kilometers long run and may comprise a maximum of 12 runners per team. This year, 214 teams had taken part. PANTHEON.tech running team took part in this adventure with our 12 runners who had to cover 345 kilometers in less than 36 hours. We are proud that our colleagues were successful. The running team finished the run in the overall 33 hours 34 minutes.
The run took place from Saturday, August 18 to Sunday, August 19. The runners started on Saturday morning in Demenovská valley and ran non-stop. Day and night, in harsh weather and terrain, to reach the finish in Bratislava on the bank of Danube river. Each of the runners covered approximately 30 kilometers in average.
PANTHEON.tech believes, a healthy mind can only cherish on a healthy body is happy to support its employees in participating in such activities. See you at OTKD 2019!
lighty.io powers datacenter management at kaloom.com
/in Blog /by PANTHEON.techComplete automation and full forwarding plane programmability
Private data centers are a hot topic for companies and enterprises that are not willing to push all the data into public clouds. Kaloom Software Defined Fabric™ (Kaloom SDF) is the world’s first fully programmable, automated, software-based data center fabric capable of running VNFs efficiently at scale. This is the first data center networking fabric on the market that provides complete automation and full forwarding plane programmability.
Kaloom approached PANTHEON.tech last year, knowing Pantheon’s intensive and long involvement in SDN, particularly in OpenDaylight project. OpenDaylight (ODL) is a modular open platform for orchestrating and automating networks of any size and scale. The OpenDaylight platform arose out of the SDN movement, in which PANTHEON.tech has expertise and experience. Hence, it was a logical step to utilize this expertise in this project and leverage what has already been done.
Traditional ODL based controller design was not suitable for this job because of the bulkiness of the Karaf based deployments. Kaloom requested a modern web UI, that the vanilla ODL platform does not provide. lighty.io as a component library provides an opportunity to run ODL services such as MD-SAL, NETCONF and YANG Tools in any modern web server stack, and integration with other components like MongoDB.
Architecture
The following architecture is starting to be like a blueprint for SDN applications today. We utilize the best of both worlds:
This is how Kaloom Fabric Manager (KFM) project has started. After several months of customizing development, we have deployed a tailored web application that provides management UI for Kaloom SDF. We have changed and tailored our Visibility Package application to suit Kaloom’s requirements and specifics. This specialized version uses the name of KFM. The architecture diagram above shows details/internals of the KFM and how we interconnect with Kaloom’s proprietary Fabric Manager/Virtual Fabric Manager controller devices.
The solution for physical data centers
lighty.io based back-end of the KFM with NETCONF plugin provides REST services to the Angular UI, which is using our Network Topology Visualization Component for the better topology view visualization and user experience. Using these REST endpoints, it is easy to send specific NETCONF RPC to the Kaloom SDF controllers.
While working on this next-gen Data Center Infrastructure Management software, we have realized that integrating all moving parts of the system is a crucial step for final delivery. Since different teams were working on different parts, it was crucial we could isolate the lighty.io part of the system and adapt it to the Kaloom SDF as much as possible. We have used our field-tested NETCONF device simulator from our lighty.io package to deliver the software which was tested thoroughly to provide stability of the KFM UI.
Kaloom SDF provides a solution for physical data centers administrated by Data Center Infrastructure Provider (DCIP) users. A physical data center can be easily sliced to virtual data centers offered to customers, called virtual Data Center Operator (vDCO) users. The DCIP user can monitor and configure the physical fabrics – PODs of the data center. KFM WEB UI shows the fabrics in topology view and allows updating the attributes of fabric and fabric nodes.
Topology View of Fabric Manager
Advantages for DCIP
The main task of DCIP users is to slice the fabrics to virtual data centers and virtual fabrics. This process involves choosing servers through associated termination points and associating them with the newly created virtual fabric manager controller. Server resources are used through the virtual fabric manager by vDCO users.
vDCO users can use the server resources and connect them via network management of their virtual data center. vDCO can attach server ports to the switches with proper encapsulation settings. After the switch is ready, vDCO can create a router and attach switches to it. The router offers different configuration possibilities to follow vDCO user’s needs: L3 interface configuration, static routing, BGP routing, VXLANs, and many more. KFM offers also topology view of the virtual data center network, so you can check relations between servers, switches, and routers.
Topology View of Fabric Manager
For more details about the KFM UI in action, please see the demo video with NETCONF simulator of Kaloom SDF bellow, or visit Kaloom or Kaloom Academy