Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
35 changes: 24 additions & 11 deletions static/calico-cloud/llms-full.txt
Original file line number Diff line number Diff line change
Expand Up @@ -13844,7 +13844,6 @@ Get visibility into the network activity at the HostEndpoint level using Calico
**Limitations**

- HostEndpoint reporting is only supported on Kubernetes nodes.
- Flow logs on ApplyOnForward policies are currently not supported. As a result, a policy blocking traffic at the host level from forwarding to a workload endpoint would not result in a flow log from the host endpoint.

## How to[​](#how-to)

Expand Down Expand Up @@ -41064,21 +41063,21 @@ That said, there are a few design rules for BGP that need to be kept in mind whe

These considerations are:

AS continuity
- AS continuity

: or *AS puddling* Any router in an AS *must* be able to communicate with any other router in that same AS without transiting another AS.
or *AS puddling* Any router in an AS *must* be able to communicate with any other router in that same AS without transiting another AS.

Next hop behavior
- Next hop behavior

: By default BGP routers do not change the *next hop* of a route if it is peering with another router in its same AS. The inverse is also true, a BGP router will set itself as the *next hop* of a route if it is peering with a router in another AS.
By default BGP routers do not change the *next hop* of a route if it is peering with another router in its same AS. The inverse is also true, a BGP router will set itself as the *next hop* of a route if it is peering with a router in another AS.

Route reflection
- Route reflection

: All BGP routers in a given AS must *peer* with all the other routers in that AS. This is referred to a *complete BGP mesh*. This can become problematic as the number of routers in the AS scales up. The use of *route reflectors* reduce the need for the complete BGP mesh. However, route reflectors also have scaling considerations.
All BGP routers in a given AS must *peer* with all the other routers in that AS. This is referred to a *complete BGP mesh*. This can become problematic as the number of routers in the AS scales up. The use of *route reflectors* reduce the need for the complete BGP mesh. However, route reflectors also have scaling considerations.

Endpoints
- Endpoints

: In a Calico Cloud network, each endpoint is a route. Hardware networking platforms are constrained by the number of routes they can learn. This is usually in range of 10,000's or 100,000's of routes. Route aggregation can help, but that is usually dependent on the capabilities of the scheduler used by the orchestration software.
In a Calico Cloud network, each endpoint is a route. Hardware networking platforms are constrained by the number of routes they can learn. This is usually in range of 10,000's or 100,000's of routes. Route aggregation can help, but that is usually dependent on the capabilities of the scheduler used by the orchestration software.

A deeper discussion of these considerations can be found in the IP Fabric Design Considerations\_ appendix.

Expand Down Expand Up @@ -41106,7 +41105,15 @@ If the AS per spine option is used, then each ToR only has to peer with each spi

Within the rack, the configuration is the same for both variants, and is somewhat different than the configuration north of the ToR.

Every router within the rack, which, in the case of Calico Cloud is every compute server, shares the same AS as the ToR that they are connected to. That connection is in the form of an Ethernet switching layer. Each router in the rack must be directly connected to enable the AS to remain contiguous. The ToR's *router* function is then connected to that Ethernet switching layer as well. The actual configuration of this is dependent on the ToR in use, but usually it means that the ports that are connected to the compute servers are treated as *subnet* or *segment* ports, and then the ToR's *router* function has a single interface into that subnet.
Every router within the rack, which, in the case of Calico Cloud is every

<!-- -->

compute server, shares the same AS as the ToR that they are connected

<!-- -->

to. That connection is in the form of an Ethernet switching layer. Each router in the rack must be directly connected to enable the AS to remain contiguous. The ToR's *router* function is then connected to that Ethernet switching layer as well. The actual configuration of this is dependent on the ToR in use, but usually it means that the ports that are connected to the compute servers are treated as *subnet* or *segment* ports, and then the ToR's *router* function has a single interface into that subnet.

This configuration allows each compute server to connect to each other compute server in the rack without going through the ToR router, but it will, of course, go through the ToR switching function. The compute servers and the ToR router could all be directly meshed, or a route reflector could be used within the rack, either hosted on the ToR itself, or as a virtual function hosted on one or more compute servers within the rack.

Expand Down Expand Up @@ -41182,7 +41189,13 @@ The first consideration is that an AS must be kept contiguous. This means that a

A corollary of that rule is that any two administrative regions that share the same AS number, are in the same AS, even if that was not the desire of the designer. BGP has no way of identifying if an AS is local or foreign other than the AS number. Therefore re-use of an AS number for two *networks* that are not directly connected, but only connected through another *network* or AS number will not work without a lot of policy changes to the BGP routers.

Another corollary of that rule is that a BGP router will not propagate a route to a peer if the route has an AS in its path that is the same AS as the peer. This prevents loops from forming in the network. The effect of this prevents two routers in the same AS from transiting another router (either in that AS or not).
<!-- -->

Another corollary of that rule is that a BGP router will not propagate a route to a peer if the route has an AS in its path that is the same AS

<!-- -->

as the peer. This prevents loops from forming in the network. The effect of this prevents two routers in the same AS from transiting another router (either in that AS or not).

#### Next hop behavior[​](#next-hop-behavior)

Expand Down
5 changes: 2 additions & 3 deletions static/calico-enterprise/llms-full.txt
Original file line number Diff line number Diff line change
Expand Up @@ -25605,7 +25605,6 @@ Get visibility into the network activity at the HostEndpoint level using Calico
**Limitations**

- HostEndpoint reporting is only supported on Kubernetes nodes.
- Flow logs on ApplyOnForward policies are currently not supported. As a result, a policy blocking traffic at the host level from forwarding to a workload endpoint would not result in a flow log from the host endpoint.

## How to[​](#how-to)

Expand Down Expand Up @@ -35211,7 +35210,7 @@ Yes. The license indicator in the web console (top right banner) turns red when

### What happens when a license expires or is invalid?[​](#what-happens-when-a-license-expires-or-is-invalid)

> **WARNING:** Although users can still log in to the web console, your deployment is no longer operational. All policy enforcement stops, except for policies in the default tier. In most cases, you will experience broken connectivity (depending on your policies in the default tier). Calico Enterprise stops reporting flow logs, DNS logs, and Calico Enterprise metrics, which affects other UI elements like Service Graph and dashboards. Although some elements may appear to work, actions are not saved, and you should regard your deployment as non-functional. We recommend that you proactively manage your license to avoid disruption.
> **WARNING:** Calico Enterprise stops reporting flow logs, DNS logs, and Calico Enterprise metrics, which affects other UI elements like Service Graph and dashboards. Although some elements in the UI may appear to work, actions are not saved. We recommend that you proactively manage your license to avoid disruption.

### Do licenses cover free upgrades in Calico Enterprise?[​](#do-licenses-cover-free-upgrades-in-calico-enterprise)

Expand Down Expand Up @@ -36838,7 +36837,7 @@ Yes. The license indicator in the web console (top right banner) turns red when

### What happens when a license expires or is invalid?[​](#what-happens-when-a-license-expires-or-is-invalid)

> **WARNING:** Although users can still log in to the web console, your deployment is no longer operational. All policy enforcement stops, except for policies in the default tier. In most cases, you will experience broken connectivity (depending on your policies in the default tier). Calico Enterprise stops reporting flow logs, DNS logs, and Calico Enterprise metrics, which affects other UI elements like Service Graph and dashboards. Although some elements may appear to work, actions are not saved, and you should regard your deployment as non-functional. We recommend that you proactively manage your license to avoid disruption.
> **WARNING:** Calico Enterprise stops reporting flow logs, DNS logs, and Calico Enterprise metrics, which affects other UI elements like Service Graph and dashboards. Although some elements in the UI may appear to work, actions are not saved. We recommend that you proactively manage your license to avoid disruption.

### Do licenses cover free upgrades in Calico Enterprise?[​](#do-licenses-cover-free-upgrades-in-calico-enterprise)

Expand Down
16 changes: 8 additions & 8 deletions static/calico/llms-full.txt
Original file line number Diff line number Diff line change
Expand Up @@ -19901,31 +19901,31 @@ Best practices for configuring Neutron subnets in Calico deployments can be foun

In Calico, these roles for the Neutron subnet are preserved in their entirety. All properties associated with these Neutron subnets are preserved and remain meaningful except for:

`host_routes`
- `host_routes`

: These have no effect, as the compute nodes will route traffic immediately after it egresses the VM.
These have no effect, as the compute nodes will route traffic immediately after it egresses the VM.

## Ports[​](#ports)

In vanilla Neutron, a port represents a connection from a VM to a single layer 2 Neutron network. Obviously, the meaning of this object changes in a Calico deployment: instead, a port is a connection from a VM to the shared layer 3 network that Calico builds in Neutron.

All properties on a port work as normal, except for the following:

`network_id`
- `network_id`

: The network ID still controls which Neutron network the port is attached to, and therefore still controls which Neutron subnets it will be placed in. However, as per the [note above](#networks), the Neutron network that a port is placed in does not affect which machines in the deployment it can contact.
The network ID still controls which Neutron network the port is attached to, and therefore still controls which Neutron subnets it will be placed in. However, as per the [note above](#networks), the Neutron network that a port is placed in does not affect which machines in the deployment it can contact.

### Extended Attributes: Port Binding Attributes[​](#extended-attributes-port-binding-attributes)

The `binding:host-id` attribute works as normal. The following notes apply to the other attributes:

`binding:profile`
- `binding:profile`

: This is unused in Calico.
This is unused in Calico.

`binding:vnic_type`
- `binding:vnic_type`

: This field, if used, **must** be set to `normal`. If set to any other value, Calico will not correctly function!
This field, if used, **must** be set to `normal`. If set to any other value, Calico will not correctly function!

## Quotas[​](#quotas)

Expand Down