A CNI meta-plugin for multi-homed pods in Kubernetes
Go to file
2019-08-31 08:36:07 -04:00
.github/ISSUE_TEMPLATE Add issue template for {bug,enhance,support} 2018-12-19 15:55:44 -05:00
checkpoint add kubelet client for Pod resource info 2019-03-24 12:33:04 +08:00
deployment/webhook run webhook as a deployment 2018-12-19 16:02:36 -05:00
doc [entrypoint] Adds CRIO restart 2019-08-21 10:55:26 -04:00
examples [dependency] Add portmap capability support (Other changes were dependent on changes made in this commit) 2018-12-20 13:07:32 -05:00
images [entrypoint] Adds CRIO restart 2019-08-21 10:55:26 -04:00
k8sclient add kubelet client for Pod resource info 2019-03-24 12:33:04 +08:00
kubeletclient add kubelet client for Pod resource info 2019-03-24 12:33:04 +08:00
logging Add 'verbose' option to logging minimum information (#275) 2019-03-07 11:06:49 -05:00
multus CNIVersion fix for conflist 2019-05-30 14:24:38 -04:00
testing Caches all pod delegates json for pods deletion without k8s info 2019-03-20 16:20:10 -04:00
types assign device id to pciBusID in delegated config 2019-05-31 10:10:01 -04:00
vendor [deps] Update grpc for CVE-2019-9511 https://nvd.nist.gov/vuln/detail/CVE-2019-9511 2019-08-30 17:17:42 -04:00
webhook fix indentation 2018-12-19 16:02:36 -05:00
.gitignore Add .gitignore file 2018-12-19 16:04:53 -05:00
.goreleaser.yml Change .goreleaser.yml to support go module build 2019-08-30 15:21:09 -04:00
.travis.yml [dockerfile] Use ENV GO111MODULE=off when building from openshift/origin-release:golang-1.10 2019-08-31 08:36:07 -04:00
build Change .goreleaser.yml to support go module build 2019-08-30 15:21:09 -04:00
CONTRIBUTING.md Update CONTRIBUTING.md 2017-09-26 13:53:10 +01:00
Dockerfile [dockerfile] Adds Dockerfile.rhel for OpenShift build 2018-12-19 16:04:54 -05:00
Dockerfile.openshift [dockerfile] Use ENV GO111MODULE=off when building from openshift/origin-release:golang-1.10 2019-08-31 08:36:07 -04:00
glide.lock Merge to resolve conflicts in vendored packages 2019-05-30 14:33:14 -04:00
go.mod [deps] Update grpc for CVE-2019-9511 https://nvd.nist.gov/vuln/detail/CVE-2019-9511 2019-08-30 17:17:42 -04:00
go.sum [deps] Update grpc for CVE-2019-9511 https://nvd.nist.gov/vuln/detail/CVE-2019-9511 2019-08-30 17:17:42 -04:00
LICENSE Initial commit 2016-12-13 14:48:12 +00:00
OWNERS Update OWNERS 2019-08-29 21:33:38 -04:00
README.md [noop] 2019-02-19 09:55:52 -05:00
test.sh Change .goreleaser.yml to support go module build 2019-08-30 15:21:09 -04:00

Multus-CNI

multus-cni Logo

Travis CIGo Report Card

Multus CNI enables attaching multiple network interfaces to pods in Kubernetes.

How it works

Multus CNI is a container network interface (CNI) plugin for Kubernetes that enables attaching multiple network interfaces to pods. Typically, in Kubernetes each pod only has one network interface (apart from a loopback) -- with Multus you can create a multi-homed pod that has multiple interfaces. This is accomplished by Multus acting as a "meta-plugin", a CNI plugin that can call multiple other CNI plugins.

Multus CNI follows the Kubernetes Network Custom Resource Definition De-facto Standard to provide a standardized method by which to specify the configurations for additional network interfaces. This standard is put forward by the Kubernetes Network Plumbing Working Group.

Multus is one of the projects in the Baremetal Container Experience kit

Multi-Homed pod

Here's an illustration of the network interfaces attached to a pod, as provisioned by Multus CNI. The diagram shows the pod with three interfaces: eth0, net0 and net1. eth0 connects kubernetes cluster network to connect with kubernetes server/services (e.g. kubernetes api-server, kubelet and so on). net0 and net1 are additional network attachments and connect to other networks by using other CNI plugins (e.g. vlan/vxlan/ptp).

multus-pod-image

Quickstart Installation Guide

Multus may be deployed as a Daemonset, and is provided in this guide along with Flannel. Flannel is deployed as a pod-to-pod network that is used as our "default network" (a network interface that every pod will be created with). Each network attachment is made in addition to this default network.

Firstly, clone this GitHub repository. We'll apply files to kubectl from this repo.

We apply these files as such:

$ cat ./images/{multus-daemonset.yml,flannel-daemonset.yml} | kubectl apply -f -

This will configure your systems to be ready to use Multus CNI, but, to get started with adding additional interfaces to your pods, refer to our complete quick-start guide

Additional installation Options

  • Install via daemonset using the quick-start guide, above.
  • Download binaries from release page
  • By Docker image from Docker Hub
  • Or, roll-you-own and build from source

Comprehensive Documentation

Contact Us

For any questions about Multus CNI, feel free to ask a question in #general in the Intel-Corp Slack, or open up a GitHub issue.