Abstract:
The disclosure herein describes a virtual extensible local area network (VXLAN) gateway. During operation, the VXLAN gateway receives, from a physical host, an Ethernet packet destined for a virtual machine residing in a remote layer-2 network broadcast domain that is different from a local layer-2 network broadcast domain where the physical host resides. The VXLAN gateway then determines a VXLAN identifier for the received Ethernet packet. The VXLAN gateway further encapsulates the Ethernet packet with the virtual extensible local area network identifier and an Internet Protocol (IP) header, and forwards the encapsulated packet to an IP network, thereby allowing the packet to be transported to the virtual machine via the IP network and allowing the remote layer-2 network broadcast domain and the local layer-2 network broadcast domain to be part of a common layer-2 broadcast domain.
Abstract:
The disclosure herein describes a virtual extensible local area network (VXLAN) gateway. During operation, the VXLAN gateway receives, from a physical host, an Ethernet packet destined for a virtual machine residing in a remote layer-2 network broadcast domain that is different from a local layer-2 network broadcast domain where the physical host resides. The VXLAN gateway then determines a VXLAN identifier for the received Ethernet packet. The VXLAN gateway further encapsulates the Ethernet packet with the virtual extensible local area network identifier and an Internet Protocol (IP) header, and forwards the encapsulated packet to an IP network, thereby allowing the packet to be transported to the virtual machine via the IP network and allowing the remote layer-2 network broadcast domain and the local layer-2 network broadcast domain to be part of a common layer-2 broadcast domain.
Abstract:
The disclosure herein describes a virtual extensible local area network (VXLAN) gateway. During operation, the VXLAN gateway receives, from a physical host, an Ethernet packet destined for a virtual machine residing in a remote layer-2 network broadcast domain that is different from a local layer-2 network broadcast domain where the physical host resides. The VXLAN gateway then determines a VXLAN identifier for the received Ethernet packet. The VXLAN gateway further encapsulates the Ethernet packet with the virtual extensible local area network identifier and an Internet Protocol (IP) header, and forwards the encapsulated packet to an IP network, thereby allowing the packet to be transported to the virtual machine via the IP network and allowing the remote layer-2 network broadcast domain and the local layer-2 network broadcast domain to be part of a common layer-2 broadcast domain.
Abstract:
An example first server host includes processor circuitry to: connect a virtual network interface card (vNIC) of the first server host to a first physical network interface card (pNIC) and a second pNIC of the first server host; establish an inter-switch link between first and second switches, the first switch and the first server host in a first network fabric, the second switch and a second server host in a second network fabric; and cause transmission of a first and second network packets from the vNIC of the first server host, the first and second network packets to be delivered to the second server host via the inter-switch link, the first network packet to be transmitted via the first pNIC when utilization of the first pNIC does not satisfy a threshold, the second network packet to be transmitted via the second pNIC when the utilization satisfies the threshold.
Abstract:
Methods, apparatus, systems, and articles of manufacture are disclosed to improve workload domain management of virtualized server systems. An example system includes memory, programmable circuitry, and instructions to program the programmable circuitry to generate a pool of virtualized servers based on a policy, determine whether a utilization of a first virtualized server is less than a first threshold, the first threshold based on at least one type of resource provisionable to the first virtualized server, determine that a firmware status associated with the first virtualized server corresponds to a first firmware version, transfer a workload of the first virtualized server to a second virtualized server after a determination that a second firmware version is available for the first virtualized server, deallocate the first virtualized server from the first workload domain to the pool of the virtualized servers, and update the first virtualized server to the second firmware version.
Abstract:
The disclosure provides an approach for managing an application workload on a computer system that includes data centers. The application workload includes first application instances running on a first data center and second application instances running on a second data center. The method comprises collecting usage data of first application instances, usage data of second application instances, and combining the collected data. The method further comprises evaluating the combined data to determine low health in least one application instance, and restarting the at least one application instance or creating a new application instance. The method further comprises evaluating the combined data to determine whether to change size of the application workload, and in which data center to place a second new application instance if increasing size. The method further comprises contacting a component of the chosen data center to place the second new application instance within a local host machine.
Abstract:
Some embodiments provide a novel method for adjusting a path for a packet flow from a source machine to a destination machine in a network. The method of some embodiments identifies a condition at a first forwarding element along a first path traversed by the packet flow through the network. The first path traverses through a hardware, second forwarding element before the first forwarding element. In some embodiments, the second forwarding element includes a programmable data plane circuit. The method, in some embodiments, uses an application programming interface (API) of the programmable data plane circuit to provide a set of parameters to the data plane circuit that cause the data plane circuit to forego selecting the first path to forward the packets of the packet flow to the destination machine and instead to select a second path, not traversing the first forwarding element, to the destination machine.
Abstract:
A disclosed example of autonomously configuring a virtual network and a physical network in a physical rack includes generating network topologies of hosts based on physical network connection information indicative of physical network connections between the hosts and a top-of-rack switch in the physical rack; determining whether implementing the network topologies of the hosts concurrently in the physical rack is valid based on evaluating the network topologies relative to a network topology validation rule; when implementing the network topologies of the hosts concurrently in the physical rack is valid: configuring a virtual distributed switch in a first one of the hosts based on one of the network topologies; and configuring the top-of-rack switch in communication with the first host based on the one of the network topologies.
Abstract:
Some embodiments of the invention provide a novel method of performing network slice-based operations on a data message at a hardware forwarding element (HFE) in a network. For a received data message flow, the method has the HFE identify a network slice associated with the received data message flow. This network slice in some embodiments is associated with a set of operations to be performed on the data message by several network elements, including one or more machines executing on one or more computers in the network. Once the network slice is identified, the method has the HFE process the data message flow based on a rule that applies to data messages associated with the identified slice.
Abstract:
Some embodiments of the invention provide a novel method of performing network slice-based operations on a data message at a hardware forwarding element (HFE) in a network. For a received data message flow, the method has the HFE identify a network slice associated with the received data message flow. This network slice in some embodiments is associated with a set of operations to be performed on the data message by several network elements, including one or more machines executing on one or more computers in the network. Once the network slice is identified, the method has the HFE process the data message flow based on a rule that applies to data messages associated with the identified slice.