A CNI meta-plugin for multi-homed pods in Kubernetes
Go to file
Tomofumi Hayashi f0bc4fb475 Add multusNamespace/systemNamespaces config
This change provides new configuration parameters, multusNamespace
and systemNamespaces for flexible namespace management.
The change addresses issue #252 and issue #253.
2019-02-08 00:25:35 +09:00
.github/ISSUE_TEMPLATE Add issue template for {bug,enhance,support} 2018-11-06 16:28:33 +09:00
checkpoint added checkpoint tests file 2018-10-10 11:52:58 +01:00
doc Add multusNamespace/systemNamespaces config 2019-02-08 00:25:35 +09:00
examples CRD: interfaceRequest -> interface (v1 spec conformance) 2018-11-09 13:20:51 +09:00
images moved crio details out of the README.md and into the ./docs/quickstart.md 2019-01-30 09:22:46 -05:00
k8sclient Add multusNamespace/systemNamespaces config 2019-02-08 00:25:35 +09:00
logging Add logging message for debug/error 2018-08-17 00:43:31 +01:00
multus Add multusNamespace/systemNamespaces config 2019-02-08 00:25:35 +09:00
testing Change pod annotation name to 'v1.multus-cni.io/default-network' 2018-11-30 16:11:09 +09:00
types Add multusNamespace/systemNamespaces config 2019-02-08 00:25:35 +09:00
vendor Revert "Merge branch 'dev/k8s-deviceid-model' into master" 2018-08-30 20:15:30 +09:00
.gitignore Add .gitignore file 2018-12-03 16:50:21 +09:00
.goreleaser.yml Add version into binary and fix .travis.yml to run forked repo. 2019-01-11 00:00:43 +09:00
.travis.yml Add version into binary and fix .travis.yml to run forked repo. 2019-01-11 00:00:43 +09:00
build Add version into binary and fix .travis.yml to run forked repo. 2019-01-11 00:00:43 +09:00
CONTRIBUTING.md Update CONTRIBUTING.md 2017-09-26 13:53:10 +01:00
Dockerfile [dockerfile] Adds Dockerfile.rhel for OpenShift build 2018-12-06 16:16:26 +09:00
Dockerfile.openshift [dockerfile] Updates Dockerfile for OpenShift-style build 2019-01-07 11:36:56 -05:00
glide.lock adding changing in glide yaml and vendor for network status features 2018-07-30 14:58:30 +01:00
glide.yaml Fix glide.yaml 2018-08-17 13:32:01 +01:00
LICENSE Initial commit 2016-12-13 14:48:12 +00:00
README.md moved crio details out of the README.md and into the ./docs/quickstart.md 2019-01-30 09:22:46 -05:00
test.sh Update test.sh with coveralls job inclusion 2018-08-18 12:39:50 +01:00

Multus-CNI

multus-cni Logo

Travis CIGo Report Card

Multus CNI enables attaching multiple network interfaces to pods in Kubernetes.

How it works

Multus CNI is a container network interface (CNI) plugin for Kubernetes that enables attaching multiple network interfaces to pods. Typically, in Kubernetes each pod only has one network interface (apart from a loopback) -- with Multus you can create a multi-homed pod that has multiple interfaces. This is accomplished by Multus acting as a "meta-plugin", a CNI plugin that can call multiple other CNI plugins.

Multus CNI follows the Kubernetes Network Custom Resource Definition De-facto Standard to provide a standardized method by which to specify the configurations for additional network interfaces. This standard is put forward by the Kubernetes Network Plumbing Working Group.

Multus is one of the projects in the Baremetal Container Experience kit

Multi-Homed pod

Here's an illustration of the network interfaces attached to a pod, as provisioned by Multus CNI. The diagram shows the pod with three interfaces: eth0, net0 and net1. eth0 connects kubernetes cluster network to connect with kubernetes server/services (e.g. kubernetes api-server, kubelet and so on). net0 and net1 are additional network attachments and connect to other networks by using other CNI plugins (e.g. vlan/vxlan/ptp).

multus-pod-image

Quickstart Installation Guide

Multus may be deployed as a Daemonset, and is provided in this guide along with Flannel. Flannel is deployed as a pod-to-pod network that is used as our "default network" (a network interface that every pod will be created with). Each network attachment is made in addition to this default network.

Firstly, clone this GitHub repository. We'll apply files to kubectl from this repo.

We apply these files as such:

$ cat ./images/{multus-daemonset.yml,flannel-daemonset.yml} | kubectl apply -f -

This will configure your systems to be ready to use Multus CNI, but, to get started with adding additional interfaces to your pods, refer to our complete quick-start guide

Additional installation Options

  • Install via daemonset using the quick-start guide, above.
  • Download binaries from release page
  • By Docker image from Docker Hub
  • Or, roll-you-own and build from source

Comprehensive Documentation

Contact Us

For any questions about Multus CNI, feel free to ask a question in #general in the Intel-Corp Slack, or open up a GitHub issue.