No Description

Rajat Chopra b37f6b7f84 Merge pull request #1316 from frederiko/priority-class 4 years ago
.github b10f969af4 Comment out the PR template message and add release note section 7 years ago
Documentation 75fe1e0f6e documentation: set priorityClassName to system-node-critical 4 years ago
backend 117c10277e pass waitgroup pointer 4 years ago
dist 70b109514b Add and implement iptables-wrapper-installer.sh from https://github.com/kubernetes-sigs/iptables-wrappers 4 years ago
images 8477bba6a1 use alpine 3.12 everywhere 4 years ago
logos 170fd5de88 logos: resized for readme 9 years ago
network 0d7b99460b Use iptables --random-fully when available 6 years ago
pkg d31b0dc85a windows: replace old netsh (rakelkar/gonetsh) with powershell commands 4 years ago
subnet bd3f2c0715 Update release-tests harness to match latest k8s and etcd 5 years ago
vendor 5dc1ff6e0f switch to go modules 4 years ago
version cbac427350 Version embedding for Go 1.4 and 1.5 9 years ago
.appveyor.yml 145a4a48dc backend: Get flannel building on windows with stubs 7 years ago
.dockerignore a8972ad5cd BUILDS: Overhaul build process 8 years ago
.gitignore 8a5dd04f72 flannel: Get flannel running on windows 7 years ago
.travis.yml 393b18b511 remove glide 4 years ago
CONTRIBUTING.md c1c060c005 Added boilerplate files 10 years ago
DCO c1c060c005 Added boilerplate files 10 years ago
Dockerfile.amd64 6cd8b162fc Merge pull request #1290 from PascalBourdier/CVE-2019-14697 4 years ago
Dockerfile.arm 6cd8b162fc Merge pull request #1290 from PascalBourdier/CVE-2019-14697 4 years ago
Dockerfile.arm64 6cd8b162fc Merge pull request #1290 from PascalBourdier/CVE-2019-14697 4 years ago
Dockerfile.ppc64le 6cd8b162fc Merge pull request #1290 from PascalBourdier/CVE-2019-14697 4 years ago
Dockerfile.s390x 6cd8b162fc Merge pull request #1290 from PascalBourdier/CVE-2019-14697 4 years ago
LICENSE c1c060c005 Added boilerplate files 10 years ago
MAINTAINERS 960b3243b9 MAINTAINERS: remove @philips 5 years ago
Makefile 117c10277e pass waitgroup pointer 4 years ago
NOTICE c1c060c005 Added boilerplate files 10 years ago
OWNERS ae4144090b New maintainers and reviewers. Creating an owners file that the ci-bots can work with. 6 years ago
README.md ff825f7a00 edit Flannel license info so that GitHub recognizes it 6 years ago
bill-of-materials.json 22d406b596 bill-of-materials: initial commit 7 years ago
bill-of-materials.override.json 22d406b596 bill-of-materials: initial commit 7 years ago
code-of-conduct.md 6695a0202b update CoC 7 years ago
go.mod 5dc1ff6e0f switch to go modules 4 years ago
go.sum 5dc1ff6e0f switch to go modules 4 years ago
header-check.sh ff825f7a00 edit Flannel license info so that GitHub recognizes it 6 years ago
main.go 117c10277e pass waitgroup pointer 4 years ago
packet-01.png 82195b1cc4 diagram: update to reflect name change 10 years ago

README.md

flannel

flannel Logo

Build Status

Flannel is a simple and easy way to configure a layer 3 network fabric designed for Kubernetes.

How it works

Flannel runs a small, single binary agent called flanneld on each host, and is responsible for allocating a subnet lease to each host out of a larger, preconfigured address space. Flannel uses either the Kubernetes API or etcd directly to store the network configuration, the allocated subnets, and any auxiliary data (such as the host's public IP). Packets are forwarded using one of several backend mechanisms including VXLAN and various cloud integrations.

Networking details

Platforms like Kubernetes assume that each container (pod) has a unique, routable IP inside the cluster. The advantage of this model is that it removes the port mapping complexities that come from sharing a single host IP.

Flannel is responsible for providing a layer 3 IPv4 network between multiple nodes in a cluster. Flannel does not control how containers are networked to the host, only how the traffic is transported between hosts. However, flannel does provide a CNI plugin for Kubernetes and a guidance on integrating with Docker.

Flannel is focused on networking. For network policy, other projects such as Calico can be used.

Getting started on Kubernetes

The easiest way to deploy flannel with Kubernetes is to use one of several deployment tools and distributions that network clusters with flannel by default. For example, CoreOS's Tectonic sets up flannel in the Kubernetes clusters it creates using the open source Tectonic Installer to drive the setup process.

Though not required, it's recommended that flannel uses the Kubernetes API as its backing store which avoids the need to deploy a discrete etcd cluster for flannel. This flannel mode is known as the kube subnet manager.

Deploying flannel manually

Flannel can be added to any existing Kubernetes cluster though it's simplest to add flannel before any pods using the pod network have been started.

For Kubernetes v1.7+ kubectl apply -f https://raw.githubusercontent.com/coreos/flannel/master/Documentation/kube-flannel.yml

See Kubernetes for more details.

Getting started on Docker

flannel is also widely used outside of kubernetes. When deployed outside of kubernetes, etcd is always used as the datastore. For more details integrating flannel with Docker see Running

Documentation

Contact

Contributing

See CONTRIBUTING for details on submitting patches and the contribution workflow.

Reporting bugs

See reporting bugs for details about reporting any issues.

Licensing

Flannel is under the Apache 2.0 license. See the LICENSE file for details.