Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


best way to imperment gre? - Page 2
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

best way to imperment gre?

2»

Comments

  • AlexBarakovAlexBarakov Patron Provider, Veteran

    Well, it deffinetely is possible and is widely done in my experience. Can't say if it is the best option, however at least at the time of speaking it is not causing any kernel instability.

  • The hosts involved have agreed to enable gre.

    and tunnel broker is based on gre.

  • The main reason I'm looking at gre is stability as its at kernel level.
    And he.net tunnel uses it.

  • petrispetris Member

    @mtwiscool said:
    The main reason I'm looking at gre is stability as its at kernel level.
    And he.net tunnel uses it.

    Incorrect. HE.net uses 6in4 which is IP protocol number 41. GRE is IP protocol number 47. They are two completely different protocols.

  • wcypierre said: What may be safe for now may be not safe in the next or forthcoming updates. You simply can't guess what will happen later(unknown reboots, crashes, hang at start up and etc) so that's why only required modules are enabled at the host node.

    Seriously? You might as well exit the industry then. What's ok to sell now may not be okay to sell later!!!!!oneoneone1111

    Silliest argument I ever saw anywhere.

  • It is easier, use two Mikrotik instances on both locations and create an Ethernet over IP (EoIP) interface on both instances and all is fine :) This can be done within 2 minutes.

    We using this to bridge the client VXLANs for their private networks between all locations.

  • AlexBarakovAlexBarakov Patron Provider, Veteran

    @fileMEDIA said:
    It is easier, use two Mikrotik instances on both locations and create an Ethernet over IP (EoIP) interface on both instances and all is fine :) This can be done within 2 minutes.

    We using this to bridge the client VXLANs for their private networks between all locations.

    Interesting, what about the actual re-routing of the traffic, is it handled by mikrotik?

  • @Wintereise said:

    It would be more convincing if you can take a case that is related to my case to show me the flawed case though. But still, the argument still applies even for your case. Now HDD are still pretty dominant in both desktop and server environment. Imagine that 10 years later where SSD will be the norm, RAM with battery backup to be a more premium option, so selling hardware w/ normal HDD may not be a good option anymore.

    Anyway, what I wanted to say is that if you're not planning to support it, then may as well as not enable it as you may not have the time or skills to handle with the rising potential issues when it comes by.

    p/s: this is a bit offtopic, so if you still have desire for further discussion then cestpit is the way to go.

  • fileMEDIAfileMEDIA Member
    edited May 2014

    @Alex_LiquidHost It builds a layer 2 on top of your layer 3 infrastructure over ip encapsulation. You can give the layer 2 interfaces ip addresses to route some networks to it or build a big layer 2 between all locations.

    We have in all our colos two or three CCR1036 to handle the traffic and it works fine. We have in this network for our VTEPs (OpenvSwitch) to handle the private networks over multicast.

  • MaouniqueMaounique Host Rep, Veteran

    Wintereise said: Seriously? You might as well exit the industry then. What's ok to sell now may not be okay to sell later!

    While that is true, it is not really related to the issue at hand. That is OVZ is not as stable as xen, for example, the more processes you have, the higher the instability, softlocks, race conditions, etc.
    There is nothing wrong in trying to add as little straws to the camel as possible and the fact that bugs are introduced all the time is not helping either.
    reduce the surface of attack is a very good defense method, the fewer modules and features enabled, the better the chances it wont crash, at least in theory. And, it is simple for a provider to do it, if a certain feature is required by one/two customers, it is worth to tell them you do not support it than annoy 100 with crashes and instability. Experience shows that if you experience 2-3 crashes a month on one node, about 10% of the customers will leave, which means 6-10 on larger nodes, if one new customer comes and asks for x module, it is better to say no and try to protect the old ones.

    Thanked by 1deptadapt
  • BlastVMBlastVM Member

    @Maounique said:
    reduce the surface of attack is a very good defense method, the fewer modules and features enabled, the better the chances it wont crash, at least in theory. And, it is simple for a provider to do it, if a certain feature is required by one/two customers, it is worth to tell them you do not support it than annoy 100 with crashes and instability. Experience shows that if you experience 2-3 crashes a month on one node, about 10% of the customers will leave, which means 6-10 on larger nodes, if one new customer comes and asks for x module, it is better to say no and try to protect the old ones.

    I agree with the above but...

    VPS Providers should enable the most common required kernel modules on OpenVZ Nodes by default. I regularly setup OpenVZ Nodes.. and each time I set them up I enable the same modules each time. Kernel/IPTable Modules.. each time I find one that is not enabled. I will enable it for that particular client and schedule maintenance when possible. And then add that module to my list for future deployments.

  • MaouniqueMaounique Host Rep, Veteran

    Not many people that use OVZ need gre... Not many people in general, here it is a technical forum and I bet half of the people here never setup a gre tunnel, the other half is probably using some sort of xen/kvm/vmware/virtualbox, whatever, just a tiny minority will need it on OVZ and it is simply not worth it.

  • Mark_RMark_R Member

    @Maounique said:
    Not many people that use OVZ need gre... Not many people in general, here it is a technical forum and I bet half of the people here never setup a gre tunnel, the other half is probably using some sort of xen/kvm/vmware/virtualbox, whatever, just a tiny minority will need it on OVZ and it is simply not worth it.

    I'm surprised that people still use OVZ when there is XEN or KVM. I guess alot people just prefer a lower price over Quality.. Pretty shocking. Ovz should die already.. The only people that I've seen supporting this virtualization are providers who provide it or employees of a company providing it.

  • @Mark_R You're on lowendbox. You'll find most providers who do charge a considerable amount of money will use Xen or KVM or VM Ware. Low End Box only represents a small amount of the hosting/vps business.

  • @Mark_R said:
    I'm surprised that people still use OVZ when there is XEN or KVM. I guess alot people just prefer a lower price over Quality.. Pretty shocking. Ovz should die already.. The only people that I've seen supporting this virtualization are providers who provide it or employees of a company providing it.

    Because when it comes to bare-metal performance, OVZ wins?

  • 0xdragon said: Because when it comes to bare-metal performance, OVZ wins?

    but didn't u know some OVZ providers oversell? that makes it bad!!!one!!1

  • @AThomasHowe said:
    but didn't u know some OVZ providers oversell? that makes it bad!!!one!!1

    OMG DO ALL THE OVERSELLING! WHOOP! WHOOP! ;)

  • Mark_RMark_R Member

    Did any of you guys consider it might not be just because OVZ is just easily oversold? my major problem with it is that alot of stuff just doesn't work with it by default. I really dont feel like sending tickets in to get every single module enabled just to get something done I could've done within seconds in a KVM/XEN virtualization.

  • And do you know why? Because all containers share the same kernel which has it's own benefits (and disadvantages).

  • Mark_RMark_R Member

    @AThomasHowe said:
    And do you know why? Because all containers share the same kernel which has it's own benefits (and disadvantages).

    Why doesn't that kernel has everything enabled like XEN/KVM? It sounds like you know alot about it.

  • Mark_R said: Why doesn't that kernel has everything enabled like XEN/KVM? It sounds like you know alot about it.

    It's not that Xen/KVM have it all enabled by default it's that you're running your own kernel (with its own overhead - RAM/CPU/etc usage, aswell as other drawbacks like stability) and you can add and remove modules on the fly. With OpenVZ the host node can add and remove modules at will but it is disabled for the containers to be able to change which modules are enabled as it effects everyone else on the node.

    When you ask your host to enable a module they're doing on the host node what you'd do on your KVM/Xen VPS.

    Thanked by 1Mark_R
  • MaouniqueMaounique Host Rep, Veteran

    Zen said: OpenVZ != True Virtualization

    So stop comparing it to KVM and Xen

    I think this is more about market/price than virtualization. Strictly comparing features, technical capabilities and price, not really the technical means on how they are achieved.
    OVZ has advantages and disadvantages, same, xen/kvm, xen pv is difficult to repartition, does not support some oses or the support is sketchy/alpha grade, KVM is slower with much overhead and they are both more expensive than OVZ. Since in this market every penny counts, OVZ is still strong, some people are overselling, others are only overcommiting, still, OVZ is a bit unstable, even without overselling, but does have some advantages, among which speed and price are the most notable.

Sign In or Register to comment.