Difference between revisions of "util-vserver:SplitSharedNetworks"

From Linux-VServer

Jump to: navigation, search
(Namespace ramblings)
Line 12: Line 12:
  
 
Network namespaces always had a big problem of not being able to reach them, unless you know a pid in that namespace. There is another technique, and that is to open a file which is somehow located in that namespace. Enough of that.
 
Network namespaces always had a big problem of not being able to reach them, unless you know a pid in that namespace. There is another technique, and that is to open a file which is somehow located in that namespace. Enough of that.
 
+
== Vserver to ip ==
How can we use that?  
+
How can we use that? First we must make sure that we are compatible: we can make vserver create the network namespace and let the ip utility know about that:
 
<PRE>
 
<PRE>
 
+
mkdir -p /var/run/netns
 +
touch /var/run/netns/$VSERVER
 +
vspace -e $VSERVER --net mount -o bind /proc/self/ns/net /var/run/netns/$VSERVER
 +
</PRE>
 +
From then on you can use the following incantations:
 +
<PRE>
 +
ip netns exec $VSERVER cmds
 +
vspace -e $VSERVER --net cmds
 +
</PRE>
 +
== Interface to vserver ==
 +
To put a network device into that namespace we do something like this:
 +
<PRE>
 +
ip link set dev $IFACE netns $VSERVER
 +
</PRE>
 +
We can check that with:
 +
<PRE>
 +
ip netns exec $VSERVER ip a ls
 +
vspace -e $VSERVER --net ip a ls
 +
</PRE>
 +
=== Useful interface creationism ===
 +
<PRE>
 +
# Create an interface on a a "real" device
 +
# A macvlan in bridge mode is as if we have a second network card
 +
# in the same network
 +
ip link add link $BASEDEVICE name $VSERVERDEVICE type macvlan mode bridge
 +
# Create a virtual network tunnel
 +
#
 
</PRE>
 
</PRE>

Revision as of 13:51, 26 December 2012

Contents

Split shared networks with util-vserver:

What are we trying to manage here: vservers are pretty good and pretty secure wrt networking. But there comes a time when your iron is to big and can server vservers on security wise multiple networks. Multi-homes is always a pain especially if you have an external firewall. You will make vlans on your big iron, but how will you firewall between one vlan and another on that same iron? Will you duplicate functionality, and have extra firewalling on your big iron, while you have another big iron doing that dedicated already? That's where network namespaces come into the picture. Network namespaces give the ability to have a seperate ip-stack per namespace. That's right: that's including iptables, multiple routing tables and whatever. If we can have multiple ip-stacks, we can give each vserver a seperate ip-stack, right? Well, yeah, but why? An ip-stack usually means another l2 or l3 interfacing, especially if those vservers are supposed to be on the same network. So we group all vservers in that belong security wise into same network also into the same network namespace. This gives the benefit that we don't have to fool around with special virtual bridges, virtual ethernet devices or whatever.

So this page will describe how to setup multiples of (a group of vservers which share the same ipstack on a single vlan) on a single system with only using vlans as network virtualization.

Namespace ramblings

Playing with the latest and greatest ip route I discovered that ip supports the creation and naming of network namespaces, all be it with a trick. The current ip route utility manages network namespaces by creating a new namespace, and then bind-mounting /proc/self/ns/net (a file!) to /var/run/netns/<a file named after the namespace>.

Network namespaces always had a big problem of not being able to reach them, unless you know a pid in that namespace. There is another technique, and that is to open a file which is somehow located in that namespace. Enough of that.

Vserver to ip

How can we use that? First we must make sure that we are compatible: we can make vserver create the network namespace and let the ip utility know about that:

mkdir -p /var/run/netns
touch /var/run/netns/$VSERVER
vspace -e $VSERVER --net mount -o bind /proc/self/ns/net /var/run/netns/$VSERVER

From then on you can use the following incantations:

ip netns exec $VSERVER cmds
vspace -e $VSERVER --net cmds

Interface to vserver

To put a network device into that namespace we do something like this:

ip link set dev $IFACE netns $VSERVER

We can check that with:

ip netns exec $VSERVER ip a ls
vspace -e $VSERVER --net ip a ls

Useful interface creationism

# Create an interface on a a "real" device
# A macvlan in bridge mode is as if we have a second network card
# in the same network
ip link add link $BASEDEVICE name $VSERVERDEVICE type macvlan mode bridge
# Create a virtual network tunnel
# 
Personal tools