diff --git a/docs/faq/overview.md b/docs/faq/overview.md index edd326f..e8e3208 100644 --- a/docs/faq/overview.md +++ b/docs/faq/overview.md @@ -8,8 +8,61 @@ The Hedgehog Fabric is managed via Kubernetes objects and custom resource defini ## What are the advantages of a spine-leaf architecture? -A spine-leaf architecture provides more bandwidth for traffic that is passing between servers inside of a data center, other architectures like core-access-aggregation are setup to provide more bandwidth in and out of the data center. A spine-leaf architecture provides multiple paths between nodes which allows for router maintenance and resilience in the case of failures. The spine-leaf architecture allows allows for multiple points of egress via border leaf nodes. In a spine-leaf architecture the unit of connection is a layer 3 route, this is advantageous to manage traffic ingress or egress as well as quality of service for the applications on the network. To manage the availability of routes usually BGP, OSPF, or IS-IS are used. +A spine-leaf architecture is designed to facilitate traffic that is passing between servers inside of a data center, other architectures like core-access-aggregation are setup to facilitate traffic moving in and out of the data center. A spine-leaf architecture provides multiple paths between nodes which allows for router maintenance and resilience in the case of failures. The spine-leaf architecture allows allows for multiple points of egress via border leaf nodes. In a spine-leaf architecture the unit of connection is a layer 3 route. There are robust tools, queueing algorithms and hardware available to manage network traffic at layer 3. To manage the distribution of routes to switches inside the fabric a protocol such as BGP, OSPF, or IS-IS is used. +### Spine Leaf Architecture Diagram +```mermaid +graph TD + S1([Spine 1]) + S2([Spine 2]) + S3([Spine 3]) + L1([Leaf 1]) + L2([Leaf 2]) + L3([Leaf 3]) + L4([Leaf 4]) + WS1@{ shape: procs, label: "Worload Servers" } + WS2@{ shape: procs, label: "Worload Servers" } + WS3@{ shape: procs, label: "Worload Servers" } + WS4@{ shape: procs, label: "Worload Servers" } + + S1 & S2 & S3 ---- L1 & L2 & L3 & L4 + L1 ---- WS1 + L2 ---- WS2 + L3 ---- WS3 + L4 ---- WS4 + +``` +In the above diagram Leaf and Spine routers, servers inside of a virtual private cloud can be attached to any leaf. In order for the servers to communicate routes are applied to leaf nodes and traffic that needs to pass from leaf 1 to leaf 2 could travel via any spine. The leaf uses [ECMP](https://en.wikipedia.org/wiki/Equal-cost_multi-path_routing) to decide which spine to use. An [EVPN](https://en.wikipedia.org/wiki/Ethernet_VPN) technology ensures that servers inside of a VPC are reachable at layer2 regardless of which leaf they are attached to the fabric. + +### Core Access Aggregation Diagram +```mermaid +graph TD + CG1((Core Router 1)) + CG2((Core Router 2)) + AG1([Aggregation 1]) + AG2([Aggregation 2]) + AG3([Aggregation 3]) + A1[Access 1] + A2[Access 2] + A3[Access 3] + WS1@{ shape: procs, label: "Worload Servers" } + WS2@{ shape: procs, label: "Worload Servers" } + WS3@{ shape: procs, label: "Worload Servers" } + + CG1 ---- AG1 & AG2 & AG3 + CG2 ---- AG1 & AG2 & AG3 + AG1 ---- A1 + AG2 ---- A2 + AG3 ---- A3 + AG1 -..- A2 & A3 + AG2 -..- A1 & A3 + AG3 -..- A1 & A2 + A1 ---- WS1 + A2 ---- WS2 + A3 ---- WS3 + +``` +In the diagram above, the Access switches are a isolated and or managed by layer 2 constructs like ACLs, bridging, and VLANs. the Aggregation routers are where layer 2 traffic is promoted to layer 3. The core routers handle layer 3 traffic only. Often some form of Spanning Tree Protocol is used to avoid loops in the layer 2 domain. Loops would cripple the network as layer 2 often relies on Broadcast / Flooding for discovery. While there are multiple paths out from the workload servers to the core they are often not passing traffic due to the Spanning Tree Protocol, these disable links are shown as dotted lines. ## What does it mean to manage my network with Kubernetes? @@ -18,3 +71,7 @@ A common way to manage a network is to proceed manually via the command-line int For example, if the administrator of a Kubernetes cluster wants to create a new Nginx pod, they write down the YAML file describing the pod name, the container image, any ports that the pod needs exposed, and what namespace to run the pod in. After the YAML file is created, a simple `kubectl apply -f nginx.yaml` is all that the administrator needs to run in order for the pod to be scheduled. With the Hedgehog Fabric, the same principles apply to managing network resources. Administrators create a YAML file to configure a VPC. The YAML file describes the IP address range for the private cloud, for example the `192.168.0.0/16` space. It also describes any VLANs that the private cloud needs. After the desired options are in the file, administrators can push the configuration to the switch with a mere `kubectl apply -f vpc1.yaml`, and within a few seconds the switch configuration is live. + + +## What is a Virtual Private Cloud (VPC) +A VPC is [layer 3](https://en.wikipedia.org/wiki/Network_layer) logical isolation inside of a network. To isolate the servers a [VRF](https://en.wikipedia.org/wiki/Virtual_routing_and_forwarding) is used. A VRF allows for multiple routing tables to exist at the same time on a switch. To isolate one VPC from another there is simply no route between them.