Нет описания

Tom Taylor 2cbd855e63 aws-vpc: add support for multiple route tables 7 лет назад
.github 0e65fd8b5d Add templates for PRs/Issues 7 лет назад
Documentation 2cbd855e63 aws-vpc: add support for multiple route tables 7 лет назад
backend 2cbd855e63 aws-vpc: add support for multiple route tables 7 лет назад
dist 0c6d2efc42 Merge pull request #702 from philips/add-bill-of-materials 7 лет назад
logos 170fd5de88 logos: resized for readme 9 лет назад
network 01afb49e72 Remove the experimental support for multiple networks. 8 лет назад
pkg dd396c9ea0 network order functionality changed based on endianess 7 лет назад
subnet 2cbd855e63 aws-vpc: add support for multiple route tables 7 лет назад
vendor 1b8190be03 glide install 8 лет назад
version cbac427350 Version embedding for Go 1.4 and 1.5 9 лет назад
.dockerignore a8972ad5cd BUILDS: Overhaul build process 8 лет назад
.gitignore 77ea67d61e Add iptables binaries 8 лет назад
.travis.yml 56ef07bd0f Makefile: Push tags to flannel-git for all builds 8 лет назад
CONTRIBUTING.md c1c060c005 Added boilerplate files 10 лет назад
DCO c1c060c005 Added boilerplate files 10 лет назад
Dockerfile.amd64 01afb49e72 Remove the experimental support for multiple networks. 8 лет назад
Dockerfile.arm 01afb49e72 Remove the experimental support for multiple networks. 8 лет назад
Dockerfile.arm64 01afb49e72 Remove the experimental support for multiple networks. 8 лет назад
Dockerfile.ppc64le 01afb49e72 Remove the experimental support for multiple networks. 8 лет назад
Dockerfile.s390x 01afb49e72 Remove the experimental support for multiple networks. 8 лет назад
LICENSE c1c060c005 Added boilerplate files 10 лет назад
MAINTAINERS c2171f9dc5 MAINTAINERS: remove steevej 8 лет назад
Makefile 01afb49e72 Remove the experimental support for multiple networks. 8 лет назад
NOTICE c1c060c005 Added boilerplate files 10 лет назад
README.md 1c84a9f30d Added Tom's notes. 7 лет назад
bill-of-materials.json 22d406b596 bill-of-materials: initial commit 7 лет назад
bill-of-materials.override.json 22d406b596 bill-of-materials: initial commit 7 лет назад
glide.lock dbee0823c2 glide update 8 лет назад
glide.yaml dbee0823c2 glide update 8 лет назад
license-check.sh a8972ad5cd BUILDS: Overhaul build process 8 лет назад
main.go 2cbd855e63 aws-vpc: add support for multiple route tables 7 лет назад
packet-01.png 82195b1cc4 diagram: update to reflect name change 10 лет назад

README.md

flannel

flannel Logo

Build Status

Flannel is a virtual network that gives a subnet to each host for use with container runtimes.

Platforms like Kubernetes assume that each container (pod) has a unique, routable IP inside the cluster. The advantage of this model is that it reduces the complexity of doing port mapping.

How it works

Flannel runs an agent, flanneld, on each host and is responsible for allocating a subnet lease out of a preconfigured address space. Flannel uses either etcd or the Kubernetes API to store the network configuration, allocated subnets, and auxiliary data (such as host's IP). Packets are forwarded using one of several backend mechanisms.

The following diagram demonstrates the path a packet takes as it traverses the overlay network:

Life of a packet

Getting started

The easiest way to deploy flannel with Kubernetes is to use one of several deployment tools and distributions that network clusters with flannel by default. CoreOS's Tectonic sets up flannel in the Kubernetes clusters it creates using the open source Tectonic Installer to drive the setup process.

It's easy to use flannel with Kubernetes. Flannel can use the Kubernetes API as its backing store, meaning there's no need to deploy a discrete etcd cluster for flannel. This flannel mode is known as the kube subnet manager and is demonstrated below.

Adding flannel

Flannel can be added to any existing Kubernetes cluster. It's simplest to add flannel before any pods using the pod network have been started.

For information on deploying flannel manually, using the (currently alpha) Kubernetes installer toolkit kubeadm, see Installing Kubernetes on Linux with kubeadm.

Using flannel

Once applied, the flannel manifest defines three things:

  1. A service account for flannel to use.
  2. A ConfigMap containing both a CNI configuration and a flannel configuration. The network in the flannel configuration should match the pod network CIDR. The choice of backend is also made here and defaults to VXLAN.
  3. A DaemonSet to deploy the flannel pod on each Node. The pod has two containers 1) the flannel daemon itself, and 2) a container for deploying the CNI configuration to a location that the kubelet can read.

When you run pods, they will be allocated IP addresses from the pod network CIDR. No matter which node those pods end up on, they will be able to communicate with each other.

Documentation

Contact

Contributing

See CONTRIBUTING for details on submitting patches and the contribution workflow.

Reporting bugs

See reporting bugs for details about reporting any issues.

License

Flannel is under the Apache 2.0 license. See the LICENSE file for details.