A CNI meta-plugin for multi-homed pods in Kubernetes
Go to file
Kuralamudhan Ramakrishnan d4bea58766 adding unit test fixes
2019-03-26 14:28:30 +00:00
.github/ISSUE_TEMPLATE Add issue template for {bug,enhance,support} 2018-11-06 16:28:33 +09:00
checkpoint add kubelet client for Pod resource info 2019-03-22 09:50:53 -04:00
doc Minor Update for typo () 2019-03-13 14:04:48 -04:00
examples Enable Rolling Update on defined DaemonSets 2019-03-26 18:51:22 +00:00
images Enable Rolling Update on defined DaemonSets 2019-03-26 18:51:22 +00:00
k8sclient add kubelet client for Pod resource info 2019-03-22 09:50:53 -04:00
kubeletclient add kubelet client for Pod resource info 2019-03-22 09:50:53 -04:00
logging Add 'verbose' option to logging minimum information () 2019-03-07 11:00:46 -05:00
multus adding unit test fixes 2019-03-26 14:28:30 +00:00
testing Caches all pod delegates json for pods deletion without k8s info 2019-03-07 23:50:07 +09:00
types fix missing deviceID in NetConfList 2019-03-26 12:39:44 +00:00
vendor update vendor dependencies for kubelet client 2019-03-22 09:50:53 -04:00
.gitignore Add .gitignore file 2018-12-03 16:50:21 +09:00
.goreleaser.yml [travis] Updates Travis to tag master builds as :latest, and adds version tagged images to daemonsets 2019-03-26 13:24:40 +00:00
.travis.yml [travis] Updates Travis to tag master builds as :latest, and adds version tagged images to daemonsets 2019-03-22 12:13:54 +09:00
build Add version into binary and fix .travis.yml to run forked repo. 2019-01-11 00:00:43 +09:00
CONTRIBUTING.md Update CONTRIBUTING.md 2017-09-26 13:53:10 +01:00
Dockerfile [dockerfile] Adds Dockerfile.rhel for OpenShift build 2018-12-06 16:16:26 +09:00
Dockerfile.openshift [dockerfile] Updates Dockerfile for OpenShift-style build 2019-01-07 11:36:56 -05:00
glide.lock add kubelet client for Pod resource info 2019-03-22 09:50:53 -04:00
glide.yaml add kubelet client for Pod resource info 2019-03-22 09:50:53 -04:00
LICENSE Initial commit 2016-12-13 14:48:12 +00:00
README.md [docs] Adds additional quickstart.md specific guide, some updates to usage guide 2018-11-30 00:31:39 +09:00
test.sh Update test.sh with coveralls job inclusion 2018-08-18 12:39:50 +01:00

Multus-CNI

multus-cni Logo

Travis CIGo Report Card

Multus CNI enables attaching multiple network interfaces to pods in Kubernetes.

How it works

Multus CNI is a container network interface (CNI) plugin for Kubernetes that enables attaching multiple network interfaces to pods. Typically, in Kubernetes each pod only has one network interface (apart from a loopback) -- with Multus you can create a multi-homed pod that has multiple interfaces. This is accomplished by Multus acting as a "meta-plugin", a CNI plugin that can call multiple other CNI plugins.

Multus CNI follows the Kubernetes Network Custom Resource Definition De-facto Standard to provide a standardized method by which to specify the configurations for additional network interfaces. This standard is put forward by the Kubernetes Network Plumbing Working Group.

Multus is one of the projects in the Baremetal Container Experience kit

Multi-Homed pod

Here's an illustration of the network interfaces attached to a pod, as provisioned by Multus CNI. The diagram shows the pod with three interfaces: eth0, net0 and net1. eth0 connects kubernetes cluster network to connect with kubernetes server/services (e.g. kubernetes api-server, kubelet and so on). net0 and net1 are additional network attachments and connect to other networks by using other CNI plugins (e.g. vlan/vxlan/ptp).

multus-pod-image

Quickstart Installation Guide

Multus may be deployed as a Daemonset, and is provided in this guide along with Flannel. Flannel is deployed as a pod-to-pod network that is used as our "default network" (a network interface that every pod will be created with). Each network attachment is made in addition to this default network.

Firstly, clone this GitHub repository. We'll apply files to kubectl from this repo.

We apply these files as such:

$ cat ./images/{multus-daemonset.yml,flannel-daemonset.yml} | kubectl apply -f -

This will configure your systems to be ready to use Multus CNI, but, to get started with adding additional interfaces to your pods, refer to our complete quick-start guide

Additional installation Options

  • Install via daemonset using the quick-start guide, above.
  • Download binaries from release page
  • By Docker image from Docker Hub
  • Or, roll-you-own and build from source

Comprehensive Documentation

Contact Us

For any questions about Multus CNI, feel free to ask a question in #general in the Intel-Corp Slack, or open up a GitHub issue.