Last week we announced the Flexiant Kubernetes Orchestration as a Service feature in Flexiant Concerto. We also demonstrated the new service in a short six minute video and showed how easy it is to the launch the guestbook feature in Kubernetes using Concerto.
This week we go into more detail to show you how to execute the guestbook example using the Concerto command line. Through the command line we will create a Kubernetes cluster and deploy these microservices from the guest book to the command line.
Need some help with your cloud strategy? You’ve come to the right place. Our blog combines insights from experts across the cloud industry with a focus on telcos and service providers to help you grow your business. If you missed some of our blogs this year, check out our top 15 cloud blog posts of 2015.
To overcome cloud networking scalability challenges as outlined in a previous blog post, cloud service providers look to solutions like Layer 2, VLANs and Layer 3. Discussed below are the issues service providers face with Layer 2.
Layer 2 issues
One of the first challenges in scaling the cloud provider’s network comes at layer 2.
To explain this, it is first necessary to recap how a switched Ethernet network works. Each network interface card (physical or virtual) participating in a layer 2 network has a unique MAC address. Each packet contains a header (the MAC header) containing the source and destination MAC address of the sending and receiving network interface. The switches on the layer 2 network learn the source addresses of any packet passing through them. When a switch comes to forward a packet to a given destination, it looks up that destination in the forwarding table that it has learnt, and if an entry is present, the packet is forwarded to that port. If an entry is not present (or if the packet is a broadcast packet), the packet is forwarded to all ports. Such forwarding to all ports is to be avoided as they use bandwidth on each port as well as switch capacity. It is thus vital the forwarding table can contain entries for all source MAC addresses in use.
Need some help with your cloud strategy? You’ve come to the right place. Our blog combines insights from experts across the cloud industry with a focus on service providers to help you grow your business. If you missed some of our blogs this year, check out our top 10 cloud blog posts of 2014.
There are many considerations when such as the performance, how mature the technology is, how it integrates with existing systems, the commercial implications and guest and functionality support. In our latest selecting a hypervisor white paper, we put together a guide that sets out to help you select the most appropriate hypervisor.