Packet Pushers

Where Too Much Technology Would Be Barely Enough

  • Podcasts
    • Day Two Cloud
    • Full Stack Journey
    • Heavy Networking
    • Heavy Strategy
    • Heavy Wireless
    • IPv6 Buzz
    • Kubernetes Unpacked
    • Network Break
    • Tech Bytes
    • The Community Show
    • Datanauts (Retired)
    • Priority Queue (Retired)
  • Hosts
  • Articles
    • Tech Blogs
    • Industry News
    • Books And Whitepapers
    • Toolbox – IT Resource Collections
  • Library
  • Newsletter
  • Slack
  • Subscribe
  • Sponsor
You are here: Home / Episode / Datanauts 009 – The Silo Series: Designing A vSwitch

Datanauts 009 – The Silo Series: Designing A vSwitch

Drew Conry-Murray September 16, 2015

https://media.blubrry.com/packetpushers/content.blubrry.com/packetpushers/Datanauts_009_-_The_Silo_Series__Designing_a_vSwitch.mp3

Podcast: Download () | Embed

Welcome to episode 9 of the Datanauts podcast! Join Chris Wahl and Ethan Banks as they assume their silo-busting roles of Server Dude and Network Guy. In today’s episode they mix some virtualization peanut butter with networking chocolate to build a vSwitch Peanut Butter Cup.

Networks no longer stop at the physical switchport. Rather, networks extend into hypervisors where we find virtual switches. Virtual switches present networking to the virtual machines that connect to them. Network engineers ignore these virtual switches at their peril. At the same time, virtualization engineers ignore the physical network at theirs. Let’s work together to configure a vSwitch as good as it can be.

Show Notes:

Section 1 – What’s A vSwitch?

-Where does the vSwitch stop and the hypervisor’s physical uplink to the network start?

-There are different vSwitches, including VMware’s default, NSX vSwitch, Cisco’s Nexus1000V, and Open vSwitch. Is there a “right” choice?

  • Technical differences
  • Cost concerns
  • Hypervisor support

-What is a distributed vSwitch?

  • NIOC
  • Inbound traffic shaping
  • PVLAN support
  • Netflow
  • LLDP
  • Port mirroring
  • LACP (instead of just a static port channel)
  • Traffic filtering
  • SR-IOV
  • 40Gb NIC support

-How are networking maximums influenced by hardware?

  • Type of NIC used
  • Speed of the NIC (1, 10, and 40 GbE)
  • Combination of 1 GbE and 10 GbE (10 x 10 GbE + 4 x 1 GbE)
  • Virtual Interface Cards (VICs)

Section 2 – vSwitch Design

-Is there anything about NIC drivers in ESX to pay special attention to?

-Does adding more virtual switchports take away system resources?

  • Elastic ports

-Is it true a vSwitch can never form a bridging loop?

-802.1q tagging concerns

  • EST, VST, VGT
  • Towards the guests
  • Towards the host/physical networks
  • When to isolate

-Is there a best practice for the VLANs that a vSwitch should be carved into? I have seen…

  • One or more for guests depending on security needs, mostly
  • One for managing the VMware infrastructure
  • One for storage traffic
  • One for VMotion & maybe FT

-Can you map specific vNICs to specific physical ports via the vSwitch? If so, what’s the use case?

-Link load balancing & 802.3ad LACP concerns

  • LAG bandaids
  • This is a recent addition to ESX
  • When is LACP a good idea?
  • When are the standard load balancing methods preferred?

-Should the physical plumbing change when connecting a single host/single vSwitch vs. multiple hosts/distributed vSwitch?

-What happens when a physical Ethernet link on the host goes down?

-When a host has been plumbed and vSwitch configured, what sort of failure scenarios should be tested for, and how?

  • Cable/NIC failure to a host
  • Physical switch failure
  • Other?

Section 3 – Takeaways And Future

-Lab environment

  • Home lab (heavy CapEx, but best way to tinker)
  • Ravello lab (free for vExperts, pay by the drip)
  • VMware Hands on Lab

-Study materials

  • Pluralsight course + Networking book
  • Go for a CCNA R&S or DC + VCP

-License for VDS

  • You can get a 60 day trial of Enterprise Plus

-Busting silos in your environment

  • A virtual switch can be a great conversation-starter and learning point
  • Lots of cross-over: storage, network, and compute, backup, security, monitoring, application teams, etc.
  • Don’t design them in a silo; come up with a design, then share with the team
  • Gather input and you’ll usually learn new things about your environment that will alter your design
  • Get all the stakeholders involved in decisions

6 Comments

About Drew Conry-Murray

Drew Conry-Murray has been writing about information technology for more than 15 years, with an emphasis on networking, security, and cloud. He's co-host of The Network Break podcast and a Tech Field Day delegate. He loves real tea and virtual donuts, and is delighted that his job lets him talk with so many smart, passionate people. He writes novels in his spare time. Follow him on Twitter @Drew_CM or reach out at [email protected].

Comments

  1. Tristan Buckley says

    September 22, 2015 at 12:10 pm

    Thanks guys. This was by far the best Datanauts show so far. Really informative and perfect amount of information. This is a favourite show for me on packetpushers.net

    Reply
    • Ethan Banks says

      September 23, 2015 at 3:10 pm

      Thanks, Tristan. We’ll keep trying to generate favorites.

      Reply
  2. Alex Cousins says

    September 23, 2015 at 2:14 pm

    Great show guys really enjoyed it and got a lot of useful information.

    Alex

    Reply
    • Ethan Banks says

      September 23, 2015 at 3:08 pm

      Great – thanks for saying so! We are indeed trying to make the show practical, so it’s good to know folks are getting a benefit.

      Reply
  3. Rui Bastos says

    September 24, 2015 at 8:01 am

    Hello there,
    Just “reverse arping in” to let you know I’m a regular user of the show and to add a small comment on the vSwitch discussion LACP topic.

    As far as I know if you don’t use LACP for load balancing, vmware will only balance the outbout traffic and the best you can to to manage the inboud traffic in some “manual way” like pairing NIC, etc in a king of failover config and not a real load balancing.

    But I think that in most situations it really doesn’t matter because one is most interested in the VMs outbound traffic (the first thing that comes to my mind is web servers), so it doesn’t matter if you just don’t balance the in bound because there will be a huge asymmetric pattern.

    I do also have a home lab (and I don’t think one can live without one), but that sort of testing is one that is I miss because you need extra fancy hardware like several switches, several NICs and my single NIC server connected to a single switch isn’t enough to do a real test 🙂

    regards,
    Rui

    Reply
  4. Steven Iveson says

    October 2, 2015 at 8:19 am

    A great show, I really appreciated an expert like Chris validating what I thought I knew (it’s been a while) and the schooling around the distributed vswitch.

    I found the topic of inbound traffic distribution when not using LACP both vague and somewhat misleading: “the switch will work out which port the traffic came from”! Unless something smart is done by the vswitch around MAC addressing (which I don’t believe is the case), there will be a significant difference between inbound and outbound load across the pswitch to pNIC links.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter
  • YouTube

RSS Day Two Cloud

  • D2C226: Creating An Effective Cloud Migration Strategy December 20, 2023

RSS Full Stack Journey

  • The Final Journey Of Full Stack Journey October 31, 2023

RSS Heavy Networking

  • HN714: Building The Branch Of The Future With SASE Powered By AI (Sponsored) December 15, 2023

RSS Heavy Strategy

  • HS061 What is IT Training or Education December 19, 2023

RSS Heavy Wireless

  • HW017: The Story Behind The CWNA Study Guide December 12, 2023

RSS IPv6 Buzz

  • IPB141: IPv6 End Of Year Wrap-Up  December 14, 2023

RSS Kubernetes Unpacked

  • KU043: How (& Why) To Contribute To The Kubernetes Release Team December 14, 2023

RSS Network Break

  • NB460: VMware Ditches Perpetual Licenses; GenAI Is Coming To Network Ops December 18, 2023

RSS Tech Bytes

  • Tech Bytes: Fortinet Advisor Brings GenAI To Support SecOps Teams (Sponsored) December 18, 2023

RSS YouTube

  • Creating An Effective Cloud Migration Strategy December 20, 2023

Recent Comments

  • Robin Grindley on NB458: Broadcom Debuts On-Chip Neural Net, Lays Off VMware Staff; Okta Breach Gets Worse
  • Eduardo Barrios on HW015: What Every Wi-Fi Pro Needs To Know About Private LTE
  • Kentzo on IPB139: Avoiding Typical IPv6 Pitfalls
  • Jeff Cameron on NB457: Broadcom, VMware Tie The Knot; Nvidia SuperNICs Target AI Ethernet Acceleration
  • Ronny Aasen on HS027 Broadcom and VMware – What’s Gonna Happen?
  • Seth Lane on 3 Takeaways From AutoCon0

PacketPushers Podcast

  • Heavy Networking
  • Day Two Cloud
  • Network Break
  • Briefings In Brief & Tech Bytes
  • Full Stack Journey
  • IPv6 Buzz
  • Community Podcast
  • Heavy Strategy
  • Priority Queue (Retired)
  • Datanauts (Retired)

PacketPushers Articles

  • All the News & Blogs
  • Only the Latest News
  • Only the Community Blogs
  • Virtual Toolbox

Search

Website Information

  • Frequently Asked Questions
  • Subscribe
  • Sponsorship
  • Meet The Hosts
  • Pitch Us
  • Privacy Policy
  • Website Terms

Connect

  • Contact The Packet Pushers
  • Join Our Slack Group
  • Subscribe To Podcasts
  • Subscribe To Newsletter
  • Become A Sponsor
  • Facebook
  • LinkedIn
  • RSS
  • Twitter
  • YouTube

© Copyright 2023 Packet Pushers Interactive, LLC · All Rights Reserved