Nessuna descrizione

Ciprian Hacman a352879cba Use "docker manifest" to publish multi-arch Docker images 4 anni fa
.github b10f969af4 Comment out the PR template message and add release note section 7 anni fa
Documentation c2e0b388a5 Merge pull request #1269 from knight42/doc/awsvpc 4 anni fa
backend 80fd09edd9 Merge pull request #1238 from matthiasng/improve-windows-support 4 anni fa
dist 70b109514b Add and implement iptables-wrapper-installer.sh from https://github.com/kubernetes-sigs/iptables-wrappers 4 anni fa
images 8477bba6a1 use alpine 3.12 everywhere 4 anni fa
logos 170fd5de88 logos: resized for readme 9 anni fa
network 0d7b99460b Use iptables --random-fully when available 6 anni fa
pkg d31b0dc85a windows: replace old netsh (rakelkar/gonetsh) with powershell commands 4 anni fa
subnet bd3f2c0715 Update release-tests harness to match latest k8s and etcd 5 anni fa
vendor 80fd09edd9 Merge pull request #1238 from matthiasng/improve-windows-support 4 anni fa
version cbac427350 Version embedding for Go 1.4 and 1.5 9 anni fa
.appveyor.yml 145a4a48dc backend: Get flannel building on windows with stubs 7 anni fa
.dockerignore a8972ad5cd BUILDS: Overhaul build process 8 anni fa
.gitignore 8a5dd04f72 flannel: Get flannel running on windows 7 anni fa
.travis.yml 7a8088e017 Fix glide 5 anni fa
CONTRIBUTING.md c1c060c005 Added boilerplate files 10 anni fa
DCO c1c060c005 Added boilerplate files 10 anni fa
Dockerfile.amd64 6cd8b162fc Merge pull request #1290 from PascalBourdier/CVE-2019-14697 4 anni fa
Dockerfile.arm 6cd8b162fc Merge pull request #1290 from PascalBourdier/CVE-2019-14697 4 anni fa
Dockerfile.arm64 6cd8b162fc Merge pull request #1290 from PascalBourdier/CVE-2019-14697 4 anni fa
Dockerfile.ppc64le 6cd8b162fc Merge pull request #1290 from PascalBourdier/CVE-2019-14697 4 anni fa
Dockerfile.s390x 6cd8b162fc Merge pull request #1290 from PascalBourdier/CVE-2019-14697 4 anni fa
LICENSE c1c060c005 Added boilerplate files 10 anni fa
MAINTAINERS 960b3243b9 MAINTAINERS: remove @philips 5 anni fa
Makefile a352879cba Use "docker manifest" to publish multi-arch Docker images 4 anni fa
NOTICE c1c060c005 Added boilerplate files 10 anni fa
OWNERS ae4144090b New maintainers and reviewers. Creating an owners file that the ci-bots can work with. 6 anni fa
README.md ff825f7a00 edit Flannel license info so that GitHub recognizes it 6 anni fa
bill-of-materials.json 22d406b596 bill-of-materials: initial commit 7 anni fa
bill-of-materials.override.json 22d406b596 bill-of-materials: initial commit 7 anni fa
code-of-conduct.md 6695a0202b update CoC 7 anni fa
glide.lock 7a8088e017 Fix glide 5 anni fa
glide.yaml 3231210712 Fix typo in glide.yaml 6 anni fa
header-check.sh ff825f7a00 edit Flannel license info so that GitHub recognizes it 6 anni fa
main.go d31b0dc85a windows: replace old netsh (rakelkar/gonetsh) with powershell commands 4 anni fa
packet-01.png 82195b1cc4 diagram: update to reflect name change 10 anni fa

README.md

flannel

flannel Logo

Build Status

Flannel is a simple and easy way to configure a layer 3 network fabric designed for Kubernetes.

How it works

Flannel runs a small, single binary agent called flanneld on each host, and is responsible for allocating a subnet lease to each host out of a larger, preconfigured address space. Flannel uses either the Kubernetes API or etcd directly to store the network configuration, the allocated subnets, and any auxiliary data (such as the host's public IP). Packets are forwarded using one of several backend mechanisms including VXLAN and various cloud integrations.

Networking details

Platforms like Kubernetes assume that each container (pod) has a unique, routable IP inside the cluster. The advantage of this model is that it removes the port mapping complexities that come from sharing a single host IP.

Flannel is responsible for providing a layer 3 IPv4 network between multiple nodes in a cluster. Flannel does not control how containers are networked to the host, only how the traffic is transported between hosts. However, flannel does provide a CNI plugin for Kubernetes and a guidance on integrating with Docker.

Flannel is focused on networking. For network policy, other projects such as Calico can be used.

Getting started on Kubernetes

The easiest way to deploy flannel with Kubernetes is to use one of several deployment tools and distributions that network clusters with flannel by default. For example, CoreOS's Tectonic sets up flannel in the Kubernetes clusters it creates using the open source Tectonic Installer to drive the setup process.

Though not required, it's recommended that flannel uses the Kubernetes API as its backing store which avoids the need to deploy a discrete etcd cluster for flannel. This flannel mode is known as the kube subnet manager.

Deploying flannel manually

Flannel can be added to any existing Kubernetes cluster though it's simplest to add flannel before any pods using the pod network have been started.

For Kubernetes v1.7+ kubectl apply -f https://raw.githubusercontent.com/coreos/flannel/master/Documentation/kube-flannel.yml

See Kubernetes for more details.

Getting started on Docker

flannel is also widely used outside of kubernetes. When deployed outside of kubernetes, etcd is always used as the datastore. For more details integrating flannel with Docker see Running

Documentation

Contact

Contributing

See CONTRIBUTING for details on submitting patches and the contribution workflow.

Reporting bugs

See reporting bugs for details about reporting any issues.

Licensing

Flannel is under the Apache 2.0 license. See the LICENSE file for details.