A Primer on Multus-CNI

This blog is for those who are looking forward to getting started with Multus CNI, the blog covers an overview of CNI in Kubernetes, Multus CNI plugin, basic configuration along with a quick deployment scenario.

Kubernetes is one of the most popular Container orchestrations tools used in the industry. K8s makes deployment, management of applications in a cluster easy for developers and administrators. Kubernetes deploys multiple vital components such as API server, Scheduler, Controller, etc., that coordinate with each other to maintain the ultimate desired state of the cluster. In addition to these components, CNI (Container Networking Interface) is responsible for providing network connectivity within a Kubernetes cluster for the applications to talk to each other.

CNI plugins can be a choice depending on the need for the cluster. Popular CNI plugins used are Calico, Flannel, Canal, Weave Net. These CNI plugins, in general, allow the application’s traffic to pass through the host to a different application on the same host or different host within the cluster. Generally, we have a CNI configured at the time of deploying the cluster in this case called as the master CNI, this is usually the ‘eth0` interface in your pod, where Kubernetes service interacts with the pods. Now here comes the interesting part, in case there is a requirement of maintaining separate interfaces for monitoring, control-data plane separation or depending on the architecture requirements, there arises a need for attaching separate interfaces to your pods and this is where Multus comes in picture.

Multus enables pod to be deployed with multiple interfaces, here the additional interfaces can be of any choice from the provided list of  Container networking plugins. Multus CNI can be deployed using the following ways

  • Install via daemonset using the quickstart-guide.
  • Download binaries from the release page
  • By Docker image from Docker Hub
Figure: Multus interfaces representation

Below mentioned steps can be used to quickly spin a multus enabled environment, the prerequisite before setting up multus is a Kubernetes cluster.

  1. git clone https://github.com/intel/multus-cni.git && cd multus-cni
  2. cat ./images/multus-daemonset.yml | kubectl apply -f – (for Kubernetes 1.16+)
  3. cat ./images/multus-daemonset-pre-1.16.yml | kubectl apply -f – (Kubernetes versions < 1.16)
  4. cat ./images/multus-daemonset-pre-1.16.yml | kubectl apply -f –

If you are using the quickstart-guide, this will deploy a multus daemonset which will place the multus-binary in /opt/cni/bin and creates a new configuration file for multus by reading the first configuration file (alphabetically) from /etc/cni/net.d/. You can create your configuration file manually following setting up conf file.

After we have the multus daemonset up and running the next step is to configure additional interfaces for the pods. Irrespective of what type of interface is to be provisioned there are few mandatory configuration parameters to be passed in the config file present in /etc/cni/net.d/.

  • cniVersion: Tells each CNI plugin which version is being used for compatibility purposes.
  • type: Name of the binary to be used from /opt/cni/bin.
  • additional: additional CNI parameters.

Depending on the type of interface (macvlan, bridge, loopback) you can specify respective configurations in the conf file, the following link can be used for reference example configurations.

Steps:

Below are the steps to configure a macvlan interface with a centos pod.

  1. Create a k8s cluster using kubeadm or kubespray. Configure master/default CNI.
  2. Follow the above mentioned steps to configure multus conf in /etc/cni/net.d/ and place multus binary in /opt/cni/bin. If using a quickstart guide this will be handled by the daemonset itself.
  3. Apply the manifest that configures the “macvlan” interface using CRD “NetworkAttachmentDefinition”.
  4. Create a sample centos pod by specifying the annotations for the interface to be used by the pod.

Command for creating “macvlan” interface

cat <<EOF | kubectl create -f -

apiVersion: "k8s.cni.cncf.io/v1"

kind: NetworkAttachmentDefinition

metadata:

  name: macvlan-conf

spec:

  config: '{

      "cniVersion": "0.3.0",

      "type": "macvlan",

      "master": "eth0",

      "mode": "bridge",

      "ipam": {

        "type": "host-local",

        "subnet": "192.168.1.0/24",

        "rangeStart": "192.168.1.200",

        "rangeEnd": "192.168.1.216",

        "routes": [

          { "dst": "0.0.0.0/0" }

        ],

        "gateway": "192.168.1.1"

      }

    }'

EOF

Command for creating sample centos pod that is created with Master CNI and Minion CNI as Macvlan

cat <<EOF | kubectl create -f -

apiVersion: v1

kind: Pod

metadata:

  name: samplepod

  annotations:

    k8s.v1.cni.cncf.io/networks: macvlan-conf

spec:

  containers:

  - name: samplepod

    command: ["/bin/bash", "-c", "trap : TERM INT; sleep infinity & wait"]

    image: dougbtv/centos-network

EOF

Use Cases :

  • Separation of control, management and data/user network planes.
  • Support different protocols or software stacks and different tuning and configuration requirements.
  • Applying segregated network policies.
  • Individual interface monitoring.

Ping demonstration on interfaces created using Multus CNI plugin:

Below are snapshots that demonstrate ping from “samplepod-2” to “samplepod-1” over “net1” interfaces created using the Multus plugin.

  1. Ensure pods deployed using kube-multus daemonset are up and running.
  2. Ensure that the “macvlan-conf” manifest mentioned above is applied with desired configurations as highlighted.
  3. Ensure pods have an additional interface attached by the name “net1”, below are the interfaces listed for “samplepod-1” where “eth0” is primary/master interface (running Calico as CNI) and “net1” is interface attached using Multus.
  4. Actual ping from “samplepod-2” to “samplepod-1” over interface added using Multus.

Multus CNI demo: demo-link

 
Share:

Related Posts

Anomaly Detection in Machine Learning Classification Algorithms vs Anomaly Detection

Anomaly Detection in Machine Learning: Classification Algorithms vs Anomaly Detection

Discover the power of anomaly detection in machine learning to enhance operational efficiency, reduce costs, and mitigate risks with the right algorithms and features.

Share:
How to Run Commands on Remote Windows Machine Using Python Paramiko Module

How to Run Commands on Remote Windows Machine Using Python Paramiko Module

Discover how Python’s Paramiko module simplifies remote command execution on Windows machines. Enhance security and productivity with Calsoft’s expert insights.

Share:

Importance of High Availability Feature in Storage

Discover the importance of High Availability (HA) in storage solutions. Learn how HA ensures data access, scalability, and operational efficiency in the IT industry.

Share:

7 Useful ServiceNow Integrations

ServiceNow has created its position as one of the best platforms and workflow integration tools. It enables enterprises to develop custom plug-ins as well to meet their unique business requirements.

Share:
GoLang Memory Management

GoLang Memory Management

One, created at Google and growing rapidly now having around 90,000+ repositories. Go can be used for cloud and systems programming and extended to the game server development and handling text-processing problems.

Share:
Unit Testing with MockitoPowerMockito

Unit Testing with Mockito/PowerMockito

Mockito is an open-source Mocking framework in Java. The features it provides for unit-testing is important.
It has simplified test case writing for developers. While Mockito can help with test case writing, there are certain things it cannot do viz:. mocking or testing private, final or static methods.

Share:

This Post Has 2 Comments

  1. Hi Pranav,
    I am working on 3 node cluster with calico as the master CNI. When I try to bring up weave as secondary IP using multus in one of the worker nodes, I am not able to ping the weave IP from master node or from any pod. But this works with a single node setup where I have only master. Any input on how to resolve this.

    Thanks,
    Shobana Jothi

    1. Can we do a few pre-checks before we start with the actual RCA.

      1. On each node make sure you have multus-conf file in dir /etc/cni/net.d directory prefixed with 00 as kubelet honors the first configuration file it gets alphabetically.
      2. You have the cni binaries on each node in /opt/cni/bin
      3. Is your multus, weave and calico daemonset running as intended ?
      4. Also can you let me know what was your approach while creating the setup and steps you did in order so we can troubleshoot accordingly.

Comments are closed.