Ei kuvausta

Tom Taylor 2cbd855e63 aws-vpc: add support for multiple route tables 7 vuotta sitten
.github 0e65fd8b5d Add templates for PRs/Issues 7 vuotta sitten
Documentation 2cbd855e63 aws-vpc: add support for multiple route tables 7 vuotta sitten
backend 2cbd855e63 aws-vpc: add support for multiple route tables 7 vuotta sitten
dist 0c6d2efc42 Merge pull request #702 from philips/add-bill-of-materials 7 vuotta sitten
logos 170fd5de88 logos: resized for readme 9 vuotta sitten
network 01afb49e72 Remove the experimental support for multiple networks. 8 vuotta sitten
pkg dd396c9ea0 network order functionality changed based on endianess 7 vuotta sitten
subnet 2cbd855e63 aws-vpc: add support for multiple route tables 7 vuotta sitten
vendor 1b8190be03 glide install 8 vuotta sitten
version cbac427350 Version embedding for Go 1.4 and 1.5 9 vuotta sitten
.dockerignore a8972ad5cd BUILDS: Overhaul build process 8 vuotta sitten
.gitignore 77ea67d61e Add iptables binaries 8 vuotta sitten
.travis.yml 56ef07bd0f Makefile: Push tags to flannel-git for all builds 8 vuotta sitten
CONTRIBUTING.md c1c060c005 Added boilerplate files 10 vuotta sitten
DCO c1c060c005 Added boilerplate files 10 vuotta sitten
Dockerfile.amd64 01afb49e72 Remove the experimental support for multiple networks. 8 vuotta sitten
Dockerfile.arm 01afb49e72 Remove the experimental support for multiple networks. 8 vuotta sitten
Dockerfile.arm64 01afb49e72 Remove the experimental support for multiple networks. 8 vuotta sitten
Dockerfile.ppc64le 01afb49e72 Remove the experimental support for multiple networks. 8 vuotta sitten
Dockerfile.s390x 01afb49e72 Remove the experimental support for multiple networks. 8 vuotta sitten
LICENSE c1c060c005 Added boilerplate files 10 vuotta sitten
MAINTAINERS c2171f9dc5 MAINTAINERS: remove steevej 8 vuotta sitten
Makefile 01afb49e72 Remove the experimental support for multiple networks. 8 vuotta sitten
NOTICE c1c060c005 Added boilerplate files 10 vuotta sitten
README.md 1c84a9f30d Added Tom's notes. 7 vuotta sitten
bill-of-materials.json 22d406b596 bill-of-materials: initial commit 7 vuotta sitten
bill-of-materials.override.json 22d406b596 bill-of-materials: initial commit 7 vuotta sitten
glide.lock dbee0823c2 glide update 8 vuotta sitten
glide.yaml dbee0823c2 glide update 8 vuotta sitten
license-check.sh a8972ad5cd BUILDS: Overhaul build process 8 vuotta sitten
main.go 2cbd855e63 aws-vpc: add support for multiple route tables 7 vuotta sitten
packet-01.png 82195b1cc4 diagram: update to reflect name change 10 vuotta sitten

README.md

flannel

flannel Logo

Build Status

Flannel is a virtual network that gives a subnet to each host for use with container runtimes.

Platforms like Kubernetes assume that each container (pod) has a unique, routable IP inside the cluster. The advantage of this model is that it reduces the complexity of doing port mapping.

How it works

Flannel runs an agent, flanneld, on each host and is responsible for allocating a subnet lease out of a preconfigured address space. Flannel uses either etcd or the Kubernetes API to store the network configuration, allocated subnets, and auxiliary data (such as host's IP). Packets are forwarded using one of several backend mechanisms.

The following diagram demonstrates the path a packet takes as it traverses the overlay network:

Life of a packet

Getting started

The easiest way to deploy flannel with Kubernetes is to use one of several deployment tools and distributions that network clusters with flannel by default. CoreOS's Tectonic sets up flannel in the Kubernetes clusters it creates using the open source Tectonic Installer to drive the setup process.

It's easy to use flannel with Kubernetes. Flannel can use the Kubernetes API as its backing store, meaning there's no need to deploy a discrete etcd cluster for flannel. This flannel mode is known as the kube subnet manager and is demonstrated below.

Adding flannel

Flannel can be added to any existing Kubernetes cluster. It's simplest to add flannel before any pods using the pod network have been started.

For information on deploying flannel manually, using the (currently alpha) Kubernetes installer toolkit kubeadm, see Installing Kubernetes on Linux with kubeadm.

Using flannel

Once applied, the flannel manifest defines three things:

  1. A service account for flannel to use.
  2. A ConfigMap containing both a CNI configuration and a flannel configuration. The network in the flannel configuration should match the pod network CIDR. The choice of backend is also made here and defaults to VXLAN.
  3. A DaemonSet to deploy the flannel pod on each Node. The pod has two containers 1) the flannel daemon itself, and 2) a container for deploying the CNI configuration to a location that the kubelet can read.

When you run pods, they will be allocated IP addresses from the pod network CIDR. No matter which node those pods end up on, they will be able to communicate with each other.

Documentation

Contact

Contributing

See CONTRIBUTING for details on submitting patches and the contribution workflow.

Reporting bugs

See reporting bugs for details about reporting any issues.

License

Flannel is under the Apache 2.0 license. See the LICENSE file for details.