Brak opisu

Manuel Buil cedeb9381d Log all config created using CLI flags 3 lat temu
.github b10f969af4 Comment out the PR template message and add release note section 7 lat temu
Documentation 584c19aebe release v0.14.0 3 lat temu
backend fdef5949d6 Add tencent cloud VPC network support 4 lat temu
dist 26b1485e07 moving go modules to flannel-io/flannel and updating to go 1.16 4 lat temu
images 8477bba6a1 use alpine 3.12 everywhere 4 lat temu
logos 170fd5de88 logos: resized for readme 9 lat temu
network fdef5949d6 Add tencent cloud VPC network support 4 lat temu
pkg 26b1485e07 moving go modules to flannel-io/flannel and updating to go 1.16 4 lat temu
subnet 26b1485e07 moving go modules to flannel-io/flannel and updating to go 1.16 4 lat temu
vendor fdef5949d6 Add tencent cloud VPC network support 4 lat temu
version cbac427350 Version embedding for Go 1.4 and 1.5 9 lat temu
.appveyor.yml 145a4a48dc backend: Get flannel building on windows with stubs 7 lat temu
.dockerignore a8972ad5cd BUILDS: Overhaul build process 8 lat temu
.gitignore 8a5dd04f72 flannel: Get flannel running on windows 7 lat temu
.travis.yml be073e831a upgrade to go1.15.5 4 lat temu
CONTRIBUTING.md f741cc2d7e {README,CONTRIBUTING}: drop obsolete communication channels 4 lat temu
DCO c1c060c005 Added boilerplate files 10 lat temu
Dockerfile.amd64 6cd8b162fc Merge pull request #1290 from PascalBourdier/CVE-2019-14697 4 lat temu
Dockerfile.arm 0a5fca3daf Add --no-sanity-check to iptables-wrapper-installer.sh for architectures other than amd64 4 lat temu
Dockerfile.arm64 0a5fca3daf Add --no-sanity-check to iptables-wrapper-installer.sh for architectures other than amd64 4 lat temu
Dockerfile.ppc64le 0a5fca3daf Add --no-sanity-check to iptables-wrapper-installer.sh for architectures other than amd64 4 lat temu
Dockerfile.s390x 0a5fca3daf Add --no-sanity-check to iptables-wrapper-installer.sh for architectures other than amd64 4 lat temu
LICENSE c1c060c005 Added boilerplate files 10 lat temu
MAINTAINERS 960b3243b9 MAINTAINERS: remove @philips 5 lat temu
Makefile 26b1485e07 moving go modules to flannel-io/flannel and updating to go 1.16 4 lat temu
NOTICE c1c060c005 Added boilerplate files 10 lat temu
OWNERS ce699f7db0 New reviewers to OWNERS file 4 lat temu
README.md 26b1485e07 moving go modules to flannel-io/flannel and updating to go 1.16 4 lat temu
bill-of-materials.json 26b1485e07 moving go modules to flannel-io/flannel and updating to go 1.16 4 lat temu
bill-of-materials.override.json 22d406b596 bill-of-materials: initial commit 7 lat temu
code-of-conduct.md 6695a0202b update CoC 7 lat temu
go.mod fdef5949d6 Add tencent cloud VPC network support 4 lat temu
go.sum fdef5949d6 Add tencent cloud VPC network support 4 lat temu
header-check.sh ff825f7a00 edit Flannel license info so that GitHub recognizes it 6 lat temu
main.go cedeb9381d Log all config created using CLI flags 3 lat temu
packet-01.png 82195b1cc4 diagram: update to reflect name change 10 lat temu

README.md

flannel

flannel Logo

Build Status

Flannel is a simple and easy way to configure a layer 3 network fabric designed for Kubernetes.

How it works

Flannel runs a small, single binary agent called flanneld on each host, and is responsible for allocating a subnet lease to each host out of a larger, preconfigured address space. Flannel uses either the Kubernetes API or etcd directly to store the network configuration, the allocated subnets, and any auxiliary data (such as the host's public IP). Packets are forwarded using one of several backend mechanisms including VXLAN and various cloud integrations.

Networking details

Platforms like Kubernetes assume that each container (pod) has a unique, routable IP inside the cluster. The advantage of this model is that it removes the port mapping complexities that come from sharing a single host IP.

Flannel is responsible for providing a layer 3 IPv4 network between multiple nodes in a cluster. Flannel does not control how containers are networked to the host, only how the traffic is transported between hosts. However, flannel does provide a CNI plugin for Kubernetes and a guidance on integrating with Docker.

Flannel is focused on networking. For network policy, other projects such as Calico can be used.

Getting started on Kubernetes

The easiest way to deploy flannel with Kubernetes is to use one of several deployment tools and distributions that network clusters with flannel by default. For example, CoreOS's Tectonic sets up flannel in the Kubernetes clusters it creates using the open source Tectonic Installer to drive the setup process.

Though not required, it's recommended that flannel uses the Kubernetes API as its backing store which avoids the need to deploy a discrete etcd cluster for flannel. This flannel mode is known as the kube subnet manager.

Deploying flannel manually

Flannel can be added to any existing Kubernetes cluster though it's simplest to add flannel before any pods using the pod network have been started.

For Kubernetes v1.17+ kubectl apply -f https://raw.githubusercontent.com/coreos/flannel/master/Documentation/kube-flannel.yml

See Kubernetes for more details.

Getting started on Docker

flannel is also widely used outside of kubernetes. When deployed outside of kubernetes, etcd is always used as the datastore. For more details integrating flannel with Docker see Running

Documentation

Contact

Community Meeting

The Flannel Maintainer Community runs a meeting on every other Thursday at 8:30 AM PST. This meeting is used to discuss issues, open pull requests, and other topics related to Flannel should the need arise.

The meeting agenda and Zoom link can be found here: Flannel Community Meeting Agneda

Contributing

See CONTRIBUTING for details on submitting patches and the contribution workflow.

Reporting bugs

See reporting bugs for details about reporting any issues.

Licensing

Flannel is under the Apache 2.0 license. See the LICENSE file for details.