Skip to content

Commit da9dee7

Browse files
committed
Updates to the notes, readme's + videos
1 parent 800865c commit da9dee7

File tree

12 files changed

+54
-23
lines changed

12 files changed

+54
-23
lines changed

1-network-namespace/README.md

+6-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@ SSH to the VM and run the setup script to create the network namespace and the v
1515

1616
```
1717
vagrant ssh
18-
cd /vagrant
1918
./setup.sh
2019
```
2120

@@ -49,3 +48,9 @@ To teardown the network:
4948
```
5049
./teardown.sh
5150
```
51+
52+
To test the entire flow, i.e. setup - run the tests - teardown, from your machine, run the following:
53+
54+
```
55+
make
56+
```

2-single-node/README.md

+6
Original file line numberDiff line numberDiff line change
@@ -30,3 +30,9 @@ To teardown the network:
3030
```
3131
./teardown.sh
3232
```
33+
34+
To test the entire flow, i.e. setup - run the tests - teardown, from your machine, run the following:
35+
36+
```
37+
make
38+
```

3-multi-node/README.md

+6
Original file line numberDiff line numberDiff line change
@@ -31,3 +31,9 @@ To teardown the network:
3131
```
3232
./teardown.sh
3333
```
34+
35+
To test the entire flow, i.e. setup - run the tests - teardown, from your machine, run the following:
36+
37+
```
38+
make
39+
```

4-overlay-network/README.md

+6
Original file line numberDiff line numberDiff line change
@@ -31,3 +31,9 @@ To teardown the network:
3131
```
3232
./teardown.sh
3333
```
34+
35+
To test the entire flow, i.e. setup - run the tests - teardown, from your machine, run the following:
36+
37+
```
38+
make
39+
```

README.md

+4
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,10 @@ Examples of creating a network of linux containers (network namespaces).
1010

1111
[4 - Overlay Network](4-overlay-network/README.md)
1212

13+
## Talks
14+
15+
* 2018-06 - Bristol Cloud Native: https://www.youtube.com/watch?v=mICllKv8JM4&t=1712s
16+
1317
## References
1418

1519
https://blog.scottlowe.org/2013/09/04/introducing-linux-network-namespaces/

slides/Notes.md

+26-22
Original file line numberDiff line numberDiff line change
@@ -83,13 +83,11 @@ this.
8383

8484
```
8585
./setup.sh
86-
# The interfaces inside the network namespace
86+
# The interfaces + routes inside the network namespace
8787
sudo ip netns exec con ip a
88-
# The routes inside the network namespace
8988
sudo ip netns exec con ip r
90-
# The interfaces on the node
89+
# The interfaces + routes on the node
9190
ip a
92-
# The routes on the node
9391
ip r
9492
# Pings the network namespace from the node
9593
ping 176.16.0.1
@@ -139,15 +137,13 @@ Note: you can run multiple processes inside a network namespace, which roughly c
139137

140138
```
141139
./setup.sh
142-
# The interfaces inside a network namespace
140+
# The interfaces + routes inside a network namespace
143141
sudo ip netns exec con1 ip a
144-
# The routes inside a network namespace
145142
sudo ip netns exec con1 ip r
146-
# The interfaces on the node
143+
# The interfaces + routes on the node
147144
ip a
148-
# The routes on the node
149145
ip r
150-
# Ping between the network namespaces
146+
# Pings between the network namespaces
151147
sudo ip netns exec con1 ping 172.16.0.3
152148
# Pings the node from the network namespace
153149
sudo ip netns exec con1 ping 10.0.0.10
@@ -185,22 +181,23 @@ On each node, run:
185181

186182
```
187183
./setup.sh
184+
# The routes on the node
185+
ip r
186+
```
187+
188+
From 10.0.0.20:
189+
190+
```
191+
# Captures ICMP packetes on the veth20 interface connected to the bridge
192+
sudo tcpdump -ni veth10 icmp
188193
```
189194

190195
Then from 10.0.0.10:
191196

192197
```
193-
# The interfaces inside a network namespace
194-
sudo ip netns exec con1 ip a
195-
# The routes inside a network namespace
196-
sudo ip netns exec con1 ip r
197-
# The interfaces on the node
198-
ip a
199-
# The routes on the node
200-
ip r
201-
# Ping from a network namespaces on one node to one on the other node
198+
# Pings from a network namespaces on one node to one on the other node
202199
sudo ip netns exec con1 ping 172.16.1.2
203-
# Pings from a node to a network namespace on the other node
200+
# Pings the same network namespace from the node
204201
ping 172.16.1.2
205202
```
206203

@@ -260,12 +257,19 @@ On each node, run:
260257
./setup.sh
261258
```
262259

263-
Then from 10.0.0.10:
260+
From 10.0.0.20:
261+
262+
```
263+
# Captures ICMP packetes on the veth20 interface connected to the bridge
264+
sudo tcpdump -ni veth10 icmp
265+
```
266+
267+
From 10.0.0.10:
264268

265269
```
266270
# Ping from a network namespaces on one node to one on the other node
267271
sudo ip netns exec con1 ping 172.16.1.2
268-
# Pings from a node to a network namespace on the other node
272+
# Pings the same network namespace from the node
269273
ping 172.16.1.2
270274
```
271275

@@ -279,7 +283,7 @@ To see the encapsulation process more clearly:
279283
On node 10.0.0.10:
280284

281285
```
282-
# Pings from a local network namespace to a remote network namespace"
286+
# Pings from a local network namespace to a remote network namespace
283287
./send.sh
284288
```
285289

videos/demo1-1.mp4

1.07 MB
Binary file not shown.

videos/demo1-2.mp4

424 KB
Binary file not shown.

videos/demo2-1.mp4

-2.15 MB
Binary file not shown.

videos/demo3-1.mp4

-186 KB
Binary file not shown.

videos/demo4-1.mp4

4.7 MB
Binary file not shown.

videos/demo4-2.mp4

5.82 MB
Binary file not shown.

0 commit comments

Comments
 (0)