A CNI meta-plugin for multi-homed pods in Kubernetes
Go to file
Zenghui Shi 91d9964d07 assign device id to pciBusID in delegated config
This allows host-device plugin to recognize
Device PCI address passed from Multus.
It is related to the change in host-device which
enables use of device pci address as a config option:
https://github.com/containernetworking/plugins/pull/300
2019-05-16 10:05:12 -04:00
.github/ISSUE_TEMPLATE Add issue template for {bug,enhance,support} 2018-11-06 16:28:33 +09:00
checkpoint add kubelet client for Pod resource info 2019-03-22 09:50:53 -04:00
doc [entrypoint][docs] Adds --multus-autoconfig-dir and entrypoint documentation 2019-05-16 10:04:26 -04:00
examples Enable Rolling Update on defined DaemonSets 2019-03-26 18:51:22 +00:00
images [entrypoint][docs] Adds --multus-autoconfig-dir and entrypoint documentation 2019-05-16 10:04:26 -04:00
k8sclient add kubelet client for Pod resource info 2019-03-22 09:50:53 -04:00
kubeletclient add kubelet client for Pod resource info 2019-03-22 09:50:53 -04:00
logging Add 'verbose' option to logging minimum information (#275) 2019-03-07 11:00:46 -05:00
multus [bugfix] Skipped clearing the network status annotation if the pod sandbox is not found 2019-05-03 09:46:52 -04:00
testing Caches all pod delegates json for pods deletion without k8s info 2019-03-07 23:50:07 +09:00
types assign device id to pciBusID in delegated config 2019-05-16 10:05:12 -04:00
vendor update vendor dependencies for kubelet client 2019-03-22 09:50:53 -04:00
.gitignore Add .gitignore file 2018-12-03 16:50:21 +09:00
.goreleaser.yml [travis] Updates Travis to tag master builds as :latest, and adds version tagged images to daemonsets 2019-03-22 12:13:54 +09:00
.travis.yml [travis] Updates Travis to tag master builds as :latest, and adds version tagged images to daemonsets 2019-03-22 12:13:54 +09:00
build [build] Adds CGO_ENABLED=0 and -tags no_openssl to build script 2019-04-19 00:55:36 +09:00
CONTRIBUTING.md Update CONTRIBUTING.md 2017-09-26 13:53:10 +01:00
Dockerfile [dockerfile] Adds Dockerfile.rhel for OpenShift build 2018-12-06 16:16:26 +09:00
Dockerfile.openshift [dockerfile] Updates Dockerfile for OpenShift-style build 2019-01-07 11:36:56 -05:00
glide.lock add kubelet client for Pod resource info 2019-03-22 09:50:53 -04:00
glide.yaml add kubelet client for Pod resource info 2019-03-22 09:50:53 -04:00
LICENSE Initial commit 2016-12-13 14:48:12 +00:00
README.md [docs] Updates the README.md to reflect the need for a default network and removes Flannel reference. 2019-05-16 10:02:47 -04:00
test.sh Update test.sh with coveralls job inclusion 2018-08-18 12:39:50 +01:00

Multus-CNI

multus-cni Logo

Travis CIGo Report Card

Multus CNI enables attaching multiple network interfaces to pods in Kubernetes.

How it works

Multus CNI is a container network interface (CNI) plugin for Kubernetes that enables attaching multiple network interfaces to pods. Typically, in Kubernetes each pod only has one network interface (apart from a loopback) -- with Multus you can create a multi-homed pod that has multiple interfaces. This is accomplished by Multus acting as a "meta-plugin", a CNI plugin that can call multiple other CNI plugins.

Multus CNI follows the Kubernetes Network Custom Resource Definition De-facto Standard to provide a standardized method by which to specify the configurations for additional network interfaces. This standard is put forward by the Kubernetes Network Plumbing Working Group.

Multus is one of the projects in the Baremetal Container Experience kit

Multi-Homed pod

Here's an illustration of the network interfaces attached to a pod, as provisioned by Multus CNI. The diagram shows the pod with three interfaces: eth0, net0 and net1. eth0 connects kubernetes cluster network to connect with kubernetes server/services (e.g. kubernetes api-server, kubelet and so on). net0 and net1 are additional network attachments and connect to other networks by using other CNI plugins (e.g. vlan/vxlan/ptp).

multus-pod-image

Quickstart Installation Guide

The quickstart installation method for Multus requires that you have first installed a Kubernetes CNI plugin to serve as your pod-to-pod network, which we refer to as your "default network" (a network interface that every pod will be creatd with). Each network attachment created by Multus will be in addition to this default network interface. For more detail on installing a default network CNI plugins, refer to our quick-start guide.

Clone this GitHub repository, we'll apply a daemonset which installs Multus using to kubectl from this repo. From the root directory of the clone, apply the daemonset YAML file:

$ cat ./images/multus-daemonset.yml | kubectl apply -f -

This will configure your systems to be ready to use Multus CNI, but, to get started with adding additional interfaces to your pods, refer to our complete quick-start guide

Additional installation Options

  • Install via daemonset using the quick-start guide, above.
  • Download binaries from release page
  • By Docker image from Docker Hub
  • Or, roll-you-own and build from source

Comprehensive Documentation

Contact Us

For any questions about Multus CNI, feel free to ask a question in #general in the Intel-Corp Slack, or open up a GitHub issue.