As known in the art, a virtual private cloud (VPC) is a logically isolated virtual network that is created as an overlay on top of a cloud service provider's public cloud infrastructure.
Many cloud service providers rely on software-defined networking (SDN) technology to provision and manage VPCs within their public cloud infrastructure. For instance,
One challenge faced by customers that use VPCs provided by cloud service providers is how to maintain compliance with rules and regulations that govern workloads being processed in the cloud (e.g., Payment Card Industry (PCI) regulations, Federal Information Security Management Act (FISMA) regulations, etc.). Many of these rules/regulations require network traffic to be collected and monitored on a periodic basis for auditing and reporting purposes. In a conventional network environment that is owned/operated by the customer, the customer can achieve this by enabling hardware port mirroring on one or more ports of a physical switch/router in the network (e.g., a top-of-rack switch) and thereby mirror port traffic to a collector tool. The collector tool can then aggregate and analyze the mirrored traffic as required by the relevant rules/regulations. However, in a VPC, enabling port mirroring is more complicated because the cloud infrastructure is owned and operated by the cloud service provider rather than the customer using the VPC. Accordingly, the customer may not have appropriate privileges to access the network elements in the cloud infrastructure in order to turn on or configure port mirroring functionality.
Techniques for facilitating port mirroring in virtual networks are provided. In one embodiment, a computer system can receive, from a user, port mirroring configuration information for enabling port mirroring within a virtual network, the port mirroring configuration information including an identity of a port to be mirrored and an address of a traffic receiver intended to receive traffic mirrored from the port. The computer system can further power-on a virtual machine (VM) within the virtual network in response to receiving the port mirroring configuration information, where the VM executes an instance of a virtual bridge. The computer system can then transmit one or more configuration commands to the virtual bridge, where the one or more configuration commands cause the virtual bridge to perform port mirroring in accordance with the port mirroring configuration information received from the user.
The following detailed description and accompanying drawings provide a better understanding of the nature and advantages of particular embodiments.
In the following description, for purposes of explanation, numerous examples and details are set forth in order to provide an understanding of various embodiments. It will be evident, however, to one skilled in the art that certain embodiments can be practiced without some of these details, or can be practiced with modifications or equivalents thereof.
1. Overview
Embodiments of the present disclosure provide techniques for facilitating port mirroring in a virtual network such as a virtual private cloud (VPC). In one set of embodiments, an SDN port mirroring application can be implemented that runs on top of an SDN controller communicatively coupled with the virtual network. The SDN application can receive, from a user (e.g., a customer using the virtual network), port mirroring configuration information that includes one or more ports in the virtual network to be mirrored and a receiver for the mirrored traffic (e.g., a collector tool). The SDN application can then power on a virtual machine (VM) in the virtual network that executes a virtual bridge, determine one or more configuration commands for the virtual bridge based on the received port mirroring configuration information, and transmit the configuration commands to the VM/virtual bridge. Upon receiving the commands, the virtual bridge can carry out port mirroring in accordance with the user-provided port mirroring configuration information (e.g., establish a mirror port, tap network traffic at the specified port(s) to mirror, and send the tapped traffic out the mirror port to the traffic receiver).
In some embodiments, the traffic receiver may be local—in other words, reside within the same virtual network as the source of the mirrored traffic. In these embodiments, the virtual bridge can directly send the traffic out the mirror port without modification. In other embodiments, the traffic receiver may be remote—in other words, reside within an entirely separate network, such as a different VPC that is located across a wide area network like the Internet. In these embodiments, the user can specify, as part of the port mirroring configuration information provided to the SDN application, one or more parameters for tunneling (via, e.g., GRE, IPSec, IP-IP or some other tunneling protocol) the mirrored traffic to the traffic receiver. Upon receiving these parameters, the virtual bridge can encapsulate all outgoing traffic on the mirror port using the appropriate tunneling protocol, thereby ensuring that the mirrored traffic reaches the traffic receiver at the remote network.
With the techniques described above, there is no need for the user of the SDN application to have control over the network elements underlying the virtual network in order to enable port mirroring within the network. Instead, the user need only have access to the application itself, which can independently turn on/off port mirroring and perform other related tasks (e.g., encapsulation of mirrored traffic) via the dynamically provisioned VM. Thus, these techniques may be particularly beneficial for customers that use a VPC operated by a cloud service provider, since the customers can enable port mirroring as needed within the VPC in order to meet their data auditing/reporting/monitoring obligations, without requiring access to the physical network infrastructure.
In certain alternative embodiments, the SDN application can also enable port mirroring by sending appropriate configuration commands to a virtual router resident in the virtual network (rather than to a dynamically provisioned VM). In these alternative embodiments, the configuration commands can cause the virtual router to mirror (and encapsulate, if needed) traffic at an appropriate mirror port of the router in accordance with the user-provided port mirroring configuration information.
The foregoing and other aspects of the present disclosure are described in further detail in the sections that follow.
2. Virtual Network Environment
In addition to the foregoing components, VPC 200 includes a novel SDN port mirroring application 220 running on SDN controller 218 that is communicatively coupled with a user interface (UI) 222 operated by a user 224. As detailed below, at a time user 224 wishes to enable port mirroring with respect to a particular port or group of ports in VPC 200, user 224 can provide to application 220 (via UI 222) configuration information pertaining to how the mirroring should be performed (i.e., identity of port(s) to be mirrored, location of receiver, tunneling configuration, etc.). Application 220 can then use this information to determine and transmit configuration commands, via controller 218, to one or more components of VPC 200 in order to initiate the mirroring process. In one set of embodiments (described with respect to
It should be appreciated that
3. Port Mirroring Workflow (VM Use Case)
Starting with block 302, application 220 can receive, from user 224, port mirroring configuration information indicating how user 224 would like to setup port mirroring using a VM/virtual bridge within VPC 200. For example, this port mirroring configuration information can include a local IP address and port number for communicating with the VM, the IP address and port number of the traffic receiver, the port(s) of the virtual bridge that should be mirrored, and the port of the virtual bridge that should be used as the mirror port (this mirror port will act as a “tunnel source” in the case that tunneling is needed). This information can also include other parameters depending on the particular implementation. For example, in embodiments where the traffic receiver may support multiple tunneling protocols, the port mirroring configuration information can include an indication of a particular tunneling protocol to use (e.g., GRE, IPSec, IP-in-IP, etc.).
The code listing below identifies, as a series YANG model definitions, exemplary input parameters that may be received by application 220 in an embodiment where the VM/virtual bridge to be configured is a Linux installation running OpenVirtualSwitch (OVS):
It should be noted that the information received at block 302 may be entered by user 224 into UI 222 of
At block 304, application 220 can determine one or more commands for configuring port mirroring using the VM/virtual bridge in accordance with the information received at block 302. In a particular embodiment, these commands can take the form of OpenFlow commands (if the VM/virtual bridge is configured to communicate with SDN controller 218 using the OpenFlow protocol). In alternative embodiments, these commands can be formatted according to any other protocol (e.g., Secure Shell (SSH), etc.).
At block 306, application 220 can cause, via SDN controller 218, a new VM to be powered-on within VPC 200 that is configured to run the virtual bridge. Application 220 can then send the configuration commands determined at block 304 to the VM/virtual bridge in order to configure the virtual bridge for port mirroring as specified by the user (block 308). For instance, in response to block 308, the virtual bridge can establish a mirror port, provision a tunnel on the mirror port, and place a tap on the port(s) to be mirrored.
Finally, at block 310, the virtual bridge can begin mirroring traffic per its port mirroring configuration. For example, the virtual bridge can tap network traffic received on the port(s) to be mirrored, encapsulate the tapped/mirrored traffic using an appropriate tunneling protocol, and then send out the encapsulated traffic via the mirror port to the IP address of the traffic receiver. The virtual bridge can continue performing this mirroring until, e.g., it receives an indication from application 220 that it should stop operation, or its port mirroring configuration is changed.
To illustrate the effects of workflow 300,
4. Port Mirroring Workflow (Virtual Router Use Case)
Starting with block 502, application 220 can receive user-defined information for setting up port mirroring using a virtual router. This information can be similar to the information received at block 302 of
At block 504, application 220 can determine one or more commands for configuring port mirroring using the virtual router in accordance with the received information. These configuration commands may or may not be similar to the configuration commands determined in the VM use case, depending on how the virtual router is designed. In a particular embodiment, these commands can take the form of NETCONF commands (if the virtual router is configured to communicate with SDN controller 218 using the NETCONF protocol). In alternative embodiments, these commands can be formatted according to any other southbound protocol.
At block 506, application 220 can send (via SDN controller 218) the configuration commands determined at block 504 to the virtual router in order to configure the router as specified by the user. For instance, in response to block 506, the virtual router can establish a mirror port, provision a tunnel on the mirror port, and place a tap on the port(s) to be mirrored.
Finally, at block 508, the virtual router can begin mirroring traffic per its port mirroring configuration. For example, the virtual router can tap network traffic received on the port(s) to be mirrored, encapsulate the tapped/mirrored traffic using an appropriate tunneling protocol, and then send out the encapsulated traffic via the mirror port to the IP address of the traffic receiver. The virtual router can continue performing this mirroring until, e.g., it receives an indication from application 220 that it should stop operation, or its port mirroring configuration is changed.
To illustrate the effects of workflow 500,
It should be appreciated that
As another example, although
Further, it should be noted that there may be certain cases where it is preferable to use the VM embodiment shown in
5. Computer System
Bus subsystem 704 can provide a mechanism for letting the various components and subsystems of computer system 700 communicate with each other as intended. Although bus subsystem 704 is shown schematically as a single bus, alternative embodiments of the bus subsystem can utilize multiple busses.
Network interface subsystem 716 can serve as an interface for communicating data between computer system 700 and other computing devices or networks. Embodiments of network interface subsystem 716 can include wired (e.g., coaxial, twisted pair, or fiber optic Ethernet) and/or wireless (e.g., Wi-Fi, cellular, Bluetooth, etc.) interfaces.
User interface input devices 712 can include a keyboard, pointing devices (e.g., mouse, trackball, touchpad, etc.), a scanner, a barcode scanner, a touch-screen incorporated into a display, audio input devices (e.g., voice recognition systems, microphones, etc.), and other types of input devices. In general, use of the term “input device” is intended to include all possible types of devices and mechanisms for inputting information into computer system 700.
User interface output devices 714 can include a display subsystem, a printer, a fax machine, or non-visual displays such as audio output devices, etc. The display subsystem can be a cathode ray tube (CRT), a flat-panel device such as a liquid crystal display (LCD), or a projection device. In general, use of the term “output device” is intended to include all possible types of devices and mechanisms for outputting information from computer system 700.
Storage subsystem 706 can include a memory subsystem 708 and a file/disk storage subsystem 710. Subsystems 708 and 710 represent non-transitory computer-readable storage media that can store program code and/or data that provide the functionality of various embodiments described herein.
Memory subsystem 708 can include a number of memories including a main random access memory (RAM) 718 for storage of instructions and data during program execution and a read-only memory (ROM) 720 in which fixed instructions are stored. File storage subsystem 710 can provide persistent (i.e., non-volatile) storage for program and data files and can include a magnetic or solid-state hard disk drive, an optical drive along with associated removable media (e.g., CD-ROM, DVD, Blu-Ray, etc.), a removable flash memory-based drive or card, and/or other types of storage media known in the art.
It should be appreciated that computer system 700 is illustrative and not intended to limit embodiments of the present invention. Many other configurations having more or fewer components than computer system 700 are possible.
The above description illustrates various embodiments of the present invention along with examples of how aspects of the present invention may be implemented. The above examples and embodiments should not be deemed to be the only embodiments, and are presented to illustrate the flexibility and advantages of the present invention as defined by the following claims. For example, although certain embodiments have been described in the context of VPCs, the techniques described herein may be used to facilitate/enable port mirroring in any type of software defined network. Further, although certain embodiments have been described with respect to particular process flows and steps, it should be apparent to those skilled in the art that the scope of the present invention is not strictly limited to the described flows and steps. Steps described as sequential may be executed in parallel, order of steps may be varied, and steps may be modified, combined, added, or omitted. As another example, although certain embodiments have been described using a particular combination of hardware and software, it should be recognized that other combinations of hardware and software are possible, and that specific operations described as being implemented in software can also be implemented in hardware and vice versa.
The specification and drawings are, accordingly, to be regarded in an illustrative rather than restrictive sense. Other arrangements, embodiments, implementations and equivalents will be evident to those skilled in the art and may be employed without departing from the spirit and scope of the invention as set forth in the following claims.
The present application claims the benefit and priority under 35 U.S.C. 119(e) of U.S. Provisional Application No. 62/141,672, filed Apr. 1, 2015, entitled “TECHNIQUES FOR FACILITATING PORT MIRRORING IN VIRTUAL NETWORKS.” The entire contents of this provisional application are incorporated herein by reference for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
5774660 | Brendel et al. | Jun 1998 | A |
7103647 | Aziz | Sep 2006 | B2 |
7292535 | Folkes et al. | Nov 2007 | B2 |
7373500 | Ramelson et al. | May 2008 | B2 |
7519056 | Ishwar et al. | Apr 2009 | B2 |
8046694 | Lappas et al. | Oct 2011 | B1 |
8559314 | Yedavalli et al. | Oct 2013 | B2 |
8593958 | Zhang | Nov 2013 | B2 |
8644149 | Yedavalli | Feb 2014 | B2 |
8787154 | Medved et al. | Jul 2014 | B1 |
8830820 | Mandal et al. | Sep 2014 | B2 |
8937961 | Vairavakkalai | Jan 2015 | B1 |
8949410 | Patel et al. | Feb 2015 | B2 |
8995272 | Agarwal et al. | Mar 2015 | B2 |
9038151 | Chua et al. | May 2015 | B1 |
9124506 | Jogalekar et al. | Sep 2015 | B2 |
9143558 | Blander et al. | Sep 2015 | B2 |
9154381 | Dutta | Oct 2015 | B2 |
9191139 | Venkata et al. | Nov 2015 | B1 |
9444842 | Porras et al. | Sep 2016 | B2 |
9450817 | Bahadur et al. | Sep 2016 | B1 |
9450823 | Arora et al. | Sep 2016 | B2 |
9467536 | Kanekar et al. | Oct 2016 | B1 |
9705783 | Jogalekar et al. | Jul 2017 | B2 |
9742648 | Saquib et al. | Aug 2017 | B2 |
9749401 | Patil | Aug 2017 | B2 |
9832269 | Usgaonkar | Nov 2017 | B2 |
9853874 | Chinthalapati et al. | Dec 2017 | B2 |
20030218982 | Folkes et al. | Nov 2003 | A1 |
20070002755 | Matityahu et al. | Jan 2007 | A1 |
20070011685 | Yim et al. | Jan 2007 | A1 |
20070041332 | Jorgensen et al. | Feb 2007 | A1 |
20070153683 | McAlpine | Jul 2007 | A1 |
20110145390 | Kakadia et al. | Jun 2011 | A1 |
20120131222 | Curtis et al. | May 2012 | A1 |
20130010600 | Jocha et al. | Jan 2013 | A1 |
20130064079 | Zhang | Mar 2013 | A1 |
20130094350 | Mandal et al. | Apr 2013 | A1 |
20130124707 | Ananthapadmanabha et al. | May 2013 | A1 |
20130311675 | Kancherla | Nov 2013 | A1 |
20130318243 | Chinthalapati et al. | Nov 2013 | A1 |
20140075519 | Porras et al. | Mar 2014 | A1 |
20140149542 | Luo et al. | May 2014 | A1 |
20140173018 | Westphal et al. | Jun 2014 | A1 |
20140280817 | Uppalapati et al. | Sep 2014 | A1 |
20140280893 | Pfeifer et al. | Sep 2014 | A1 |
20150043382 | Arora et al. | Feb 2015 | A1 |
20150071108 | Lumezanu et al. | Mar 2015 | A1 |
20150103642 | Stuart | Apr 2015 | A1 |
20150195162 | Gandham et al. | Jul 2015 | A1 |
20150215156 | Yoon | Jul 2015 | A1 |
20150256397 | Agarwal | Sep 2015 | A1 |
20150304158 | Dharmadhikari et al. | Oct 2015 | A1 |
20150319190 | Kruglick | Nov 2015 | A1 |
20150334002 | Jogalekar et al. | Nov 2015 | A1 |
20150350077 | Durrani et al. | Dec 2015 | A1 |
20150358338 | Zeitlin | Dec 2015 | A1 |
20160043941 | D'Heureuse et al. | Feb 2016 | A1 |
20160112514 | Usgaonkar | Apr 2016 | A1 |
20160156550 | Song | Jun 2016 | A1 |
20160182336 | Doctor | Jun 2016 | A1 |
20160191545 | Nanda et al. | Jun 2016 | A1 |
20160205071 | Cooper et al. | Jul 2016 | A1 |
20160226701 | Luo et al. | Aug 2016 | A1 |
20160226742 | Apathotharanan et al. | Aug 2016 | A1 |
20160285729 | Chinthalapati et al. | Sep 2016 | A1 |
20160285750 | Saquib et al. | Sep 2016 | A1 |
20160344471 | Meng et al. | Nov 2016 | A1 |
20160344621 | Roeland et al. | Nov 2016 | A1 |
20170013049 | Patil | Jan 2017 | A1 |
20170041209 | Joshi et al. | Feb 2017 | A1 |
20170048312 | Moyer | Feb 2017 | A1 |
20170104622 | Sawal et al. | Apr 2017 | A1 |
20170111246 | Shaw et al. | Apr 2017 | A1 |
20170324809 | Patil | Nov 2017 | A1 |
Number | Date | Country |
---|---|---|
103782552 | May 2014 | CN |
2014139564 | Sep 2014 | WO |
2015032027 | Mar 2015 | WO |
2016153713 | Sep 2016 | WO |
Entry |
---|
“Port mirroring with Linux bridges;” Waldner; Jun. 17, 2014. |
PCT Patent Application No. PCT/US16/19510 filed on Feb. 25, 2016 by Eswara Chinthalapati et al. |
International Search Report & Written Opinion for PCT Application PCT/US16/19510 dated May 25, 2016, 13 pages. |
OpenFlow Switch Specification, Version 1.5.0, Open Networking Foundation, Dec. 19, 2014, 277 pages. |
Akyildiz et al.: “A roadmap for traffic engineering in SDN-Openflow networks”, Computer Networks, vol. 71, Jun. 19, 2014, 30 pages. |
NonFinal Office Action dated Nov. 18, 2016; U.S. Appl. No. 14/805,901; (9 pgs.). |
Soeurt et al, Shortest path forwarding using OpenFlow, University of Amsterdam, 58 pages, Feb. 2012. |
Egilmez et al., OpenQoS: An OpenFlow Controller Design for Multimedia Delivery With End-to-End Quality of Service Over Software-Defined Networks, IEEE, 8 pages, 2012. |
Adrichem et al.: “Fast Recovery in Software-Defined Networks”, EWSDN, 2014, 6 pages. |
Kempf et al.: “Scalable Fault Management for OpenFlow”, ICC, IEEE 2012, 5 pages. |
Tilmans: “Robust fault-recovery in Software-Defined Networks”, Ecole Polytechnique de Louvain, Masters Thesis, 2013-2014, 104 pages. |
NonFinal Office Action dated Mar. 24, 2017; U.S. Appl. No. 14/721,978; (31 pgs.). |
Zartash Afzal Uzmi, Markus Nebel, Ahsan Tariq, Sana Jawad, Ruichuan Chen, Aman Shaikh, Jia Wang, and Paul Francis, “SMALTA: Practical and Near-Optimal FIB Aggregation,” Pulished in: Proceedings of the Seventh Conference on emerging Networking Experiments and Technologies. Tokyo, Japan, Dec. 6-9, 2011. Article No. 29, 12 pages. |
Christian E. Rothenberg, Marcelo R. Nascimento, Marcos R. Salvador, Carlos N.A. Correa, Sidney c. de Lucena, and Robert Raszuk, “Revising Routing Control Platforms with the Eyes and Muscles of Software-Defined Networking.” HotSDN'12, Aug. 13, 2012, Helsinki, Finland. pp. 13-28. |
Marcelo Ribeiro Nascimento, Christian Esteve Rothenberg, Marcos Rogerio Salvador and Mauricio Ferreira Magalhaesy, “QuagFlow: Partnering Quagga with OpenFlow”, SIGCOMM'10, Aug. 30-Sep. 3, 2010, New Delhi, India, 2 pages. |
Paul Zimmerman, “OpenDaylight Controller: Binding-Independent Components”, Mar. 23, 2013, 16 printed pages. Available online: https://wiki.opendaylight.org/index.php?title=OpenDaylight—Controller:Binding-Independent—Components&oldid=331. |
Paul Zimmerman, “OpenDaylight Controller: Binding Aware Components”, Mar. 23, 2013, 10 printed pages. Available online: https://wiki.opendaylight.org/index.php?title=OpenDaylight—Controller:Binding—Aware—Components&oldid=339. |
Ivan Pepelnjak, “Hybrid OpenFlow, the Brocade Way”, Jun. 19, 2012, 3 printed pages. Available online: http://web.archive.org/web/20130514054903/http://blog.ioshints.info/2012/06/hybrid-openflow-brocade-way.html. |
Notice of Allowance dated Mar. 29, 2017; U.S. Appl. No. 14/805,901; (16 pgs.). |
Extended EP Search Report for EP Appln. No. 16001306.6 dated Dec. 6, 2016, 10 pages. |
U.S. Appl. No. 61/832,655, filed Jun. 7, 2013 by Jogalekar et al. |
U.S. Appl. No. 62/089,028, filed Dec. 8, 2014 by Durrani et al. |
U.S. Appl. No. 62/005,177, filed May 30, 2014 by Durrani et al. |
U.S. Appl. No. 62/141,672, filed Apr. 1, 2015 by Sreenivasa et al. |
U.S. Appl. No. 62/191,073, filed Jul. 10, 2015 by Patil. |
U.S. Appl. No. 62/204,388, filed Aug. 12, 2015 by Moyer. |
U.S. Appl. No. 62/247,904, filed Oct. 29, 2015 by Moyer et al. |
U.S. Appl. No. 62/136,922, filed Mar. 23, 2015 by Saquib et al. |
U.S. Appl. No. 14/805,901, filed Jul. 22, 2015 by Jogalekar et al. |
U.S. Appl. No. 14/721,978, filed May 26, 2015 by Durrani et al. |
U.S. Appl. No. 14/848,035, filed Sep. 8, 2015 by Patil. |
U.S. Appl. No. 14/918,441, filed Oct. 20, 2015 by Moyer. |
U.S. Appl. No. 14/923,738, filed Oct. 27, 2015 by Saquib et al. |
U.S. Appl. No. 14/923,769, filed Oct. 27, 2015 by Chinthalapati et al. |
Hommes: “Fault Detection and Network Security in Software-Defined Networks with Openflow”; PhD Dissertation; PhD-FSTC-2014-06; The Faculty of Sciences, Technology and Communication; Mar. 25, 2014; 130 pages. |
http://www.juniper.net/documentation/en—US/junos14.2/topics/example/cos-based-forwarding-example-cos-config-guide.html; 3 pages. |
http://www.cisco.com/c/en/us/td/docs/ios/12—0s/feature/guide/gscbts.html; 56 pages. |
http://blog.hoff.geek.nz/tag/cos-based-forwarding/; 16 pages. |
NonFinal Office Action dated Apr. 21, 2017; U.S. Appl. No. 14/923,769; (58 pgs.). |
Notice of Allowance dated Apr. 27, 2017; U.S. Appl. No. 14/923,738; ( 40 pgs.). |
Notice of Allowance for U.S. Appl. No. 14/848,035 dated Jul. 14, 2017, 43 pages. |
U.S. Appl. No. 15/660,744, filed Jul. 26, 2017 by Dhanashri Patil. |
Notice of Allowance for U.S. Appl. No. 14/923,769 dated Oct. 20, 2017, 20 pages. |
Final Office Action dated Nov. 9, 2017; U.S. Appl. No. 14/721,978; (119-7102US) (24 pgs.). |
Matt Gillies: “Software Defined Networks for Service Providers: A Practical Approach”; Cisco Connect Presentation slides dated May 13, 2013; Toronto, Canada; 68 printed pages. Available online: http://www.cisco.com/c/dam/glogal/en_ca/assets/ciscoconnect/2013/assets/docs/sdn-for-sp-mgillies.pdf. |
NonFinal Office Action dated Dec. 13, 2017; U.S. Appl. No. 14/918,441; (53 pgs.). |
Number | Date | Country | |
---|---|---|---|
20160294731 A1 | Oct 2016 | US |
Number | Date | Country | |
---|---|---|---|
62141672 | Apr 2015 | US |