No Description

matt c5b207fde5 Added compatibility check to compare GBP for VXLAN 7 years ago
.github 0e65fd8b5d Add templates for PRs/Issues 7 years ago
Documentation 402fddecd9 Merge pull request #722 from andyxning/add_healthz 7 years ago
backend c5b207fde5 Added compatibility check to compare GBP for VXLAN 7 years ago
dist fb4a25e608 backend/extension: Introduce new extension backend 7 years ago
logos 170fd5de88 logos: resized for readme 9 years ago
network 01afb49e72 Remove the experimental support for multiple networks. 8 years ago
pkg dd396c9ea0 network order functionality changed based on endianess 7 years ago
subnet db0f3d31d5 Allow more events to be buffered before the backend starts 7 years ago
vendor 1b8190be03 glide install 8 years ago
version cbac427350 Version embedding for Go 1.4 and 1.5 9 years ago
.dockerignore a8972ad5cd BUILDS: Overhaul build process 8 years ago
.gitignore 77ea67d61e Add iptables binaries 8 years ago
.travis.yml 56ef07bd0f Makefile: Push tags to flannel-git for all builds 8 years ago
CONTRIBUTING.md c1c060c005 Added boilerplate files 10 years ago
DCO c1c060c005 Added boilerplate files 10 years ago
Dockerfile.amd64 fb4a25e608 backend/extension: Introduce new extension backend 7 years ago
Dockerfile.arm 01afb49e72 Remove the experimental support for multiple networks. 8 years ago
Dockerfile.arm64 01afb49e72 Remove the experimental support for multiple networks. 8 years ago
Dockerfile.ppc64le 01afb49e72 Remove the experimental support for multiple networks. 8 years ago
Dockerfile.s390x 01afb49e72 Remove the experimental support for multiple networks. 8 years ago
LICENSE c1c060c005 Added boilerplate files 10 years ago
MAINTAINERS c2171f9dc5 MAINTAINERS: remove steevej 8 years ago
Makefile 5356ef095d Makefile: Smaller flanneld binary 7 years ago
NOTICE c1c060c005 Added boilerplate files 10 years ago
README.md e0ac742033 Add reference to #flannel channel on calico users slack 7 years ago
bill-of-materials.json 22d406b596 bill-of-materials: initial commit 7 years ago
bill-of-materials.override.json 22d406b596 bill-of-materials: initial commit 7 years ago
glide.lock dbee0823c2 glide update 8 years ago
glide.yaml dbee0823c2 glide update 8 years ago
license-check.sh a8972ad5cd BUILDS: Overhaul build process 8 years ago
main.go 6f0cb4124d fix typo 7 years ago
packet-01.png 82195b1cc4 diagram: update to reflect name change 10 years ago

README.md

flannel

flannel Logo

Build Status

Flannel is a virtual network that gives a subnet to each host for use with container runtimes.

Platforms like Kubernetes assume that each container (pod) has a unique, routable IP inside the cluster. The advantage of this model is that it reduces the complexity of doing port mapping.

How it works

Flannel runs an agent, flanneld, on each host and is responsible for allocating a subnet lease out of a preconfigured address space. Flannel uses either etcd or the Kubernetes API to store the network configuration, allocated subnets, and auxiliary data (such as host's IP). Packets are forwarded using one of several backend mechanisms.

The following diagram demonstrates the path a packet takes as it traverses the overlay network:

Life of a packet

Getting started

The easiest way to deploy flannel with Kubernetes is to use one of several deployment tools and distributions that network clusters with flannel by default. CoreOS's Tectonic sets up flannel in the Kubernetes clusters it creates using the open source Tectonic Installer to drive the setup process.

Flannel can use the Kubernetes API as its backing store, meaning there's no need to deploy a discrete etcd cluster for flannel. This flannel mode is known as the kube subnet manager.

Adding flannel

Flannel can be added to any existing Kubernetes cluster. It's simplest to add flannel before any pods using the pod network have been started.

For information on deploying flannel manually, using the (currently alpha) Kubernetes installer toolkit kubeadm, see Installing Kubernetes on Linux with kubeadm.

Using flannel

Once applied, the flannel manifest defines three things:

  1. A service account for flannel to use.
  2. A ConfigMap containing both a CNI configuration and a flannel configuration. The network in the flannel configuration should match the pod network CIDR. The choice of backend is also made here and defaults to VXLAN.
  3. A DaemonSet to deploy the flannel pod on each Node. The pod has two containers 1) the flannel daemon itself, and 2) a container for deploying the CNI configuration to a location that the kubelet can read.

When you run pods, they will be allocated IP addresses from the pod network CIDR. No matter which node those pods end up on, they will be able to communicate with each other.

Kubernetes 1.6 requires CNI plugin version 0.5.1 or later.

Documentation

Contact

Contributing

See CONTRIBUTING for details on submitting patches and the contribution workflow.

Reporting bugs

See reporting bugs for details about reporting any issues.

License

Flannel is under the Apache 2.0 license. See the LICENSE file for details.