[clug] Bridging for KVM HOST servers - diagram

George at Clug Clug at goproject.info
Sun Apr 12 11:34:34 UTC 2020


Hi,

In my previous email, my imagined environment was simplified, the idea would be to have more than one KVM HOST servers for fail-over, redundancy, migration, etc.

I hope the below diagram gives a better idea. If it is not readable, I apologise, it is the best I could think of.  

Notes:
KVMn means to what ever number of KVM hosts are in the environment.
{SWITCH} means various switch ports for connecting to multiple physical devices.

Concept borrowed from https://www.cyberciti.biz/faq/rhel-linux-kvm-virtualization-bridged-networking-with-libvirt/
===Bare Metal KVM HOST Servers KVM1 to KVMn =================================================================

Internet  --> |SWITCH | --> | eth1 |  <=KVM1=> | br1 |       -> KVM VMs connected to Directly the Internet
                   |SWITCH | --> | eth1 |  <=KVM2=> | br1 |       -> KVM VMs connected to Directly the Internet
                   |SWITCH | --> | eth1 |  <=KVMn=> | br1 |       -> KVM VMs connected to Directly the Internet 
                   |{SWITCH}|-->| ports |  <=====> |       |       -> physical servers (some applications require bare metal servers for performance reasons)
                              59.51.2.0/28

DMZ  --> |SWITCH | --> | eth2 |  <=KVM1=> | br2 |       -> KVM VMs connected to DMZ for isolated Internet facing servers (for web and email servers)
              |SWITCH | --> | eth2 |  <=KVM2=> | br2 |       -> KVM VMs connected to DMZ for isolated Internet facing servers (for web and email servers)
              |SWITCH | --> | eth2 |  <=KVMn=> | br2 |       -> KVM VMs connected to DMZ for isolated Internet facing servers (for web and email servers)
              |{SWITCH}|-->| ports |  <=====> |       |       -> physical servers (some applications require bare metal servers for performance reasons)
                               123.1.2.0/24

LAN  -->  |SWITCH | --> | eth3 |  <=KVM1=> | br3 |      ->  KVM VMs connected to the companies internal LAN  (DHCP server, file servers, virtual workstations, etc)
              |SWITCH | --> | eth3 |  <=KVM2=> | br3 |       -> KVM VMs connected to the companies internal LAN  (DHCP server, file servers, virtual workstations, etc)
              |SWITCH | --> | eth3 |  <=KVMn=> | br3 |       -> KVM VMs connected to the companies internal LAN  (DHCP server, file servers, virtual workstations, etc)
              |{SWITCH}|-->| ports |  <=====> |       |       -> physical servers (some applications require bare metal servers for performance reasons)
              |{SWITCH}|-->| ports |  <=====> | PCs |       -> physical workstations connected to the companies internal LAN 
                               123.2.2.0/24

LAN  -->  |SWITCH | --> | eth0 |  <=KVM1=> | br0 |      ->  KVM VMs connected to LAN for SAN/NFS/BACKUP and management network
              |SWITCH | --> | eth0 |  <=KVM2=> | br0 |       -> KVM VMs connected to LAN for SAN/NFS/BACKUP and management network
              |SWITCH | --> | eth0 |  <=KVMn=> | br0 |       -> KVM VMs connected to LAN for SAN/NFS/BACKUP and management network
              |{SWITCH}|-->| NICs |  <=====>  |       |      ->  physical LAN for SAN/NFS/BACKUP and management network
                               10.10.x.y/24
====================================================================

George.




More information about the linux mailing list