networking 3.3 spec - sangmin/architecture GitHub Wiki

Table of Contents

Networking

β€’ The next generation of networking must – preserve support for the existing AWS network semantics – accommodate expansion to other AWS semantics – β€’ Pending AWS semantics – Security Groups β€’ VM participation in multiple security groups (membership vs. firewall groups) – VPC β€’ Dynamic definition of private subnets β€’ Dynamic configuration of DHCP per private subnet β€’ Static private address control for private subnets – IPv6

Basics

β€’ Current Semantics – Security Groups – Private addressing for participating VMs – Network level isolation of security groups – Internet traffic ingress/egress firewalling – Cross-group ingress/egress firewalling – Dynamic reconfiguration of the above types of rules – Elastic IPs β€’ Pending AWS semantics – Security Groups β€’ VM participation in multiple security groups (membership vs. firewall groups) – VPC β€’ Dynamic definition of private subnets β€’ Dynamic configuration of DHCP per private subnet β€’ Static private address control for private subnets – IPv6

VPC

β€’ Overview – Logically isolated environment – Your private IP range – Internet or Hardware VPN connectivity options β€’ Capabilities – User-defined address space up to /16 – Up to 20* user-defined, per AZ subnets up to /16 – User-defined: β€’ Virtual Routing, DHCP options, and NAT instances β€’ Internet Gateways, Private/Customer Gateways, and VPN tunnels – Private IPs stable once assigned – Elastic Network Interfaces β€’ Enhanced Security Capabilities – Network topology, routing, and subnet ACLs – Security group enhancements β€’ Egress control β€’ dynamic (re)assignment β€’ richer protocol support – Multiple network interfaces per instance – Completely private networking via VPN – Support for dedicated instances

Use Cases

β€’ Mixing public and private resources – E.g., web-facing hosts with DMZ subnets, control plane subnets β€’ Workloads that expect fixed IPs and/or multiple NICs β€’ AWS cloud as private extension of on- premises network – Accessible from on-premises hosts – No change to addressing – No change to Internet threat/risk posture

Limits

β€’ 5 VPCs per Region β€’ 20 Subnets per VPC β€’ 10 Network ACLs per VPC β€’ 20 rules/ACL β€’ 10 Route Tables per VPC β€’ 20 entries/Route Table β€’ 50 Security Groups per VPC β€’ 50 rules/Security Group β€’ http://docs.amazonwebservices.com/AmazonVPC/latest/UserGuide/VPC_Appendix_Limits.html

Constraints

β€’ Gateways require unique public IP addresses β€’ Non-overlapping IP Ranges w/ internal networks β€’ Inability to change CIDR/Subnet address ranges β€’ Can’t move instances from one subnet to another – Relaunch for different VPC or AZ

Other Notes

https://eucalyptus.atlassian.net/secure/IssueNavigator.jspa?requestId=12211&mode=hide

  • true edge networking
  • turn node controller into the router
  • split CC into CC and NS
  • extensibility ==> SDN
  • ipsets/ebtables ==> ovs
  • NC/edge networking ==> customer delight
  • convolution w/ network architecture
  • cloudstack virtual router situation
  • even fewer network configuration dependencies to get full AWS functionality
  • refactorization analysis
  • what about public address routing
  • ELB/multi-warlus implications

tag:rls-3.3
⚠️ **GitHub.com Fallback** ⚠️