Winery Network Documentation#

Intended audience

sysadm staff members

VPN Access#

The winery environment is hosted in a CEA’s datacenter.

All the traffic between the main Software Heritage datacenter and the CEA datacenter is encapsulated in an IPSEC VPN.

A second IPSEC VPN is available to reach the management network in case an access to the servers’s IDRac is needed.

Macro architecture of the VPNs

* This is the target, currently (2024-03-06), the access vpn is not up and all the traffic is handled by the management VPN.

Network configuration#

The network equipment are organized like this:

Macro architecture of the VPNs

The management and access networks are physically isolated.

Each server has a physical link plugged to 2 different switches with LACP activated for the access network.

The details of the installation is available in the internal inventory

The network is composed of several ip ranges:

Range

Description

VLAN

Frontend

MONs

OSDs

Switches

Bastion

X.X.X.X/28

Uplink vlan

Uplink - Frontend / ID CEA

X

X.X.X.X/28

Uplink vlan

Uplink - Management / ID CEA

X

10.25.6.0/24

Default / installation

Default / 1

X

X

X

10.25.1.0/24

VLAN for ceph access

Ceph clients / 2

X

X

X

10.25.2.0/24

VLAN for ceph internal

Ceph cluster / 3

X

10.25.3.0/24

Management addresses

None

X

X

X

X

Inside each range, the addresses are dispatched according to these rules:

Type

Range

Frontend

.1-.10

MONs

.11-.20

OSDs

.21-.100

Switches

.240-.253

GW

.254