This change introduces prometheus metric exporter support for multus-daemon, thick plugin.
4.6 KiB
Multus Thick plugin
Multus CNI can also be deployed using a thick plugin architecture, which is characterized by a client/server architecture.
The client - which will be referred to as "shim" - is a binary executable located on the Kubernetes node's file-system that speaks CNI: the runtime - Kubernetes - passes parameters to the plugin via environment variables and configuration - which is passed via stdin. The plugin returns a result on stdout on success, or an error on stderr if the operation fails. Configuration and results are a JSON encoded string.
Once the shim is invoked by the runtime (Kubernetes) it will contact the
multus-daemon (server) via a unix domain socket which is bind mounted to the
host's file-system; the multus-daemon is the one that will do all the
heavy-pulling: fetch the delegate CNI configuration from the corresponding
net-attach-def, compute the RuntimeConfig, and finally, invoke the delegate.
It will then return the result of the operation back to the client.
Please refer to the diagram below for a visual representation of the flow described above:
┌─────────┐ ┌───────┐ ┌────────┐ ┌──────────┐
│ │ cni ADD/DEL │ │ REST POST │ │ cni ADD/DEL │ │
│ runtime ├────────────►│ shim │===========│ daemon ├────────────►│ delegate │
│ │<------------│ │ │ │<------------│ │
└─────────┘ └───────┘ └────────┘ └──────────┘
How to use it
Configure Deployment
If your delegate CNI plugin requires some files which is in container host, please update
update deployments/multus-daemonset-thick.yml to add directory into multus-daemon pod.
For example, flannel requires /run/flannel/subnet.env, so you need to mount this directory
into the multus-daemon pod.
Required directory/files are different for each CNI plugin, so please refer your CNI plugin.
Deployment
There is a dedicated multus daemonset specification for users wanting to use this thick plugin variant. This reference deployment spec of multus can be deployed by following these commands:
kubectl apply -f deployments/multus-daemonset-thick.yml
Command line parameters
Multus thick plugin variant accepts the same entrypoint arguments its thin counterpart allows - with the following exceptions:
additional-bin-dirbinDircleanup-config-on-exitcniDirmultus-kubeconfig-file-hostrename-conf-filerestart-crioskip-multus-binary-copy
It is important to refer that these are command line parameters to the golang
binary; as such, they should be passed using a single dash ("-") e.g.
-additional-bin-dir=/opt/multus/bin, -multus-log-level=debug, etc.
Furthermore, it also accepts a new command line parameter, where the user specifies the path to the server configuration:
config: Defaults to"/etc/cni/net.d/multus.d/daemon-config.json"metricsPort: Metrics port (of multus' metric exporter), default is disable
Server configuration
The server configuration is encoded in JSON, and allows the following keys:
"chrootDir": Specify the directory which points to host root from the pod. See 'Chroot configuration' section for the details."socketDir": Specify the location where the unix domain socket used for client/server communication will be located. Defaults to"/run/multus-cni".
In addition, you can add any configuration which is in configuration reference. Server configuration override multus CNI configuration (e.g. /etc/cni/net.d/00-multus.conf)
Chroot configuration
In thick plugin case, delegate CNI plugin is executed by multus-daemon from Pod, hence if the delegate CNI requires resources in container host, for example unix socket or even file, then CNI plugin is failed to execute because multus-daemon runs in Pod. Multus-daemon supports "chrootDir" option which executes delegate CNI under chroot (to container host).
This configuration is enabled in deployments/multus-daemonset-thick.yml as default.