XRd is a containerized model of IOS-XR the place you’ll be able to experiment with platform–impartial options and deploy them to any on-premises or cloud infrastructure. offering all the advantages of utilizing containers in community operations.
XRd comes with all of the programmability facets from IOS-XR, together with Telemetry and YANG fashions, which makes it supreme for builders and community engineers.
The XRd sandbox gives a superb alternative to get began with XRd and discover community programmability.
XRd is available in two variants: XRd Management Plane and XRd vRouter. XRd Control Plane is supreme for compute use circumstances like Digital Route Reflectors (vRR) or Path Compute Aspect (PCE). vRouter is designed to ahead visitors effectively and also can deal with management airplane computations.
The XRd Sandbox makes use of the XRd Control Plane, which is supreme for exploration and experimentation purposes.
XRd requires particular kernel settings on the host to work correctly. The sandbox is already configured with these settings.
There are a number of methods to deploy XRd, together with utilizing Terraform, Helm or Packer. Nevertheless, we used docker compose for the sandbox as a result of it’s easy and simple to handle.
Topology
For this sandbox, we primarily based on the pattern segment-routing topology from the xrd-tools GitHub repository. We used a customized compose format known as XR-YAML, and the whole setup will probably be deployed in a single digital machine (VM) utilizing Docker Compose.
Modifications
A few modifications had been wanted to make the topology work. First, we updared the IP addressing for the administration community to match the out there sources in the sandbox.
Second, we used the macvlan Docker driver so every XRd container had its personal IP handle as a substitute of sharing the IP handle with the host VM.
See the XRd Sandbox GitHub repository for particulars and to discover the config recordsdata used to create the sandbox.
Deploy
The lab gives every part you want; you’ll solely must create the compose file that will probably be utilized by Docker Compose. This file is created utilizing the xr-compose script from xrd-tools.
Subsequent, replace the compose file (created by xr-compose) to level to the precise container interface that will probably be created by the macvlan driver.
The sandbox directions embrace the entire record of needed instructions.
To begin experimenting, search for the XRd sandbox on the Cisco sandfield web page.
Launch a reservation and comply with the directions. Use the instructions to create and begin the topology.
The XRd sandbox is ideal to get aware of XRd, learn how to work with it, and to play with native community protocols (e.g., ISIS, OSPF, BGP, MPLS, SR) or to discover programmable use circumstances with YANG, NETCONF and GNMI.
When growing the sandbox, we ran right into a problem. We all of a sudden misplaced the SSH connection to the VM when docker compose was creating the topology.
It turned out that the hyperlinks between XRd containers had been created utilizing docker bridge, which picked an IP phase utilized by the sandbox infrastructure, successfully blackholing the visitors. To repair it, we needed to configure a default handle pool to make use of an unused IP phase.
After making use of this configuration, the difficulty was resolved.
Listed here are some sources that will help you get began with XRd:
Extra labs can be found on the listing “~/xrd-tools/samples/xr_compose_topos” within the Sandbox.
Need to get extra content material about XRd? Attain out to me on LinkedIn. I’m comfortable to listen to your concepts.
Share: