Kubernetes defines a simple and consistent network model based on a flat network structure design. It can communicate efficiently without mapping host ports to network ports, and does not require other components to forward. This model also makes it easy to migrate applications from virtual machines or host physical machines to pods managed by Kubernetes. This article mainly explores the Kubernetes network model in depth and understands how containers and pods communicate with each other. The implementation of the network model will be introduced in the following article. Kubernetes Network ModelThe model defines:
Several related components are mentioned in the above definition:
We have talked about network namespaces so many times, but how does it work? How Network Namespaces WorkCreate a pod in the Kubernetes distribution k3s. This pod has two containers: the curl container that sends the request and the httpbin container that provides the web service. Although the distribution is used, it still uses the Kubernetes network model, which does not prevent us from understanding the network model. apiVersion : v1 Log in to the node and use lsns -t net to check the network namespace on the current host, but no httpbin process is found. There is a namespace command /pause, which is actually an invisible sandbox in each pod. lsns - t net Since each container has its own process space, we can change the command to view the space of the process type: lsns -t pid Through the process PID 129889, you can find the namespace it belongs to: ip netns identify 129889 You can then use exec to execute commands in this namespace: ip netns exec cni - 607 c5530 - b6d8 - ba57 - 420 e - a467d7b10c56 ip a From the result, we can see that the pod’s IP address 10.42.1.14 is bound to the interface eth0, and eth0 is connected to the interface 17. On the node host, check the information of interface 17. veth7912056b is the virtual Ethernet device in the host root namespace. It is the tunnel connecting the pod network and the node network. The other end is the interface eth0 in the pod namespace. ip link | grep -A1 ^ 17 From the above results, we can see that the veth is connected to the network bridge cni0. The bridge works at the data link layer (Layer 2 of the OSI model), connecting multiple networks (multiple network segments). When a request arrives at the bridge, the bridge will ask all connected interfaces (here the pod is connected to the bridge via veth) whether they have the IP address in the original request. If there is an interface response, the bridge will record the matching information (IP -> veth) and forward the data. What if there is no interface response? The specific process depends on the implementation of each network plug-in. I plan to introduce commonly used network plug-ins in the following articles, such as Calico, Flannel, Cilium, etc. Next, let's look at how network communication is accomplished in Kubernetes. There are several types:
How Kubernetes Networking WorksCommunication between containers in the same pod Communication between containers in the same pod is the simplest. These containers share a network namespace, and each namespace has a lo loopback interface, which can be used to communicate through localhost. Communication between pods on the same node When we run the curl container and httpbin in two pods respectively, these two pods may be scheduled to the same node. The request sent by curl reaches the eth0 interface in the pod according to the routing table in the container. Then it reaches the root network space of the node through the tunnel veth1 connected to eth0. veth1 is connected to other pods through the virtual Ethernet interface vethX via the bridge cni0. The bridge will ask all connected interfaces whether they have the IP address in the original request (such as 10.42.1.9 here). After receiving the response, the bridge will record the mapping information (10.42.1.9 => veth0) and forward the data. Finally, the data enters the pod httpbin through the veth0 tunnel. Communication between pods on different nodes Communication between pods across nodes is more complicated, and different network plug-ins handle it differently. Here we choose an easy-to-understand way to briefly explain it. The process in the first half is similar to the communication between pods on the same node. When the request reaches the bridge, the bridge asks which pod has the IP but does not receive a response. The process enters the host's routing addressing process and reaches a higher cluster level. At the cluster level, there is a routing table that stores the Pod IP network segment of each node (a Pod network segment (Pod CIDR) is assigned to a node when it joins the cluster. For example, the default Pod CIDR in k3s is 10.42.0.0/16, and the network segments obtained by the node are 10.42.0.0/24, 10.42.1.0/24, 10.42.2.0/24, and so on). The node requesting the IP can be determined through the Pod IP network segment of the node, and then the request is sent to the node. SummarizeNow you should have a preliminary understanding of Kubernetes network communication. The entire communication process requires the cooperation of various components, such as the Pod network namespace, the Pod Ethernet interface eth0, the virtual Ethernet interface vethX, the network bridge cni0, etc. Some of these components correspond to pods one by one and have the same life cycle as the pods. Although they can be created, associated, and deleted manually, non-permanent resources such as pods are frequently created and destroyed, and too much manual work is unrealistic. In fact, all these tasks are delegated by the container to the network plug-in, and the network plug-in follows the CNI (Container Network Interface) specification. What do network plugins do?
...
https://www.tigera.io/learn/guides/kubernetes-networking/ https://kubernetes.io/docs/concepts/services-networking/ https://matthewpalmer.net/kubernetes-app-developer/articles/kubernetes-networking-guide-beginners.html https://learnk8s.io/kubernetes-network-packets |
<<: Explore end-to-end 5G security
>>: How 5G helps IoT in healthcare
[[397604]] This experiment uses the SIM7600CE 4G ...
2016 is known as the "first year of online l...
RAKsmart is an early-established foreign hosting ...
The endless emergence of new technologies and con...
CloudPowerall is a relatively new foreign VPS ser...
[Original article from 51CTO.com] In 2017, the tr...
WiFi has now been fully integrated into our lives...
[[389359]] Data from the Global Mobile Suppliers ...
According to foreign media reports, a research te...
Virtualization has revolutionized the data center...
[51CTO.com original article] On the last Saturday...
[[416317]] Beijing time, August 9th, according to...
MPLS has been a popular technology for enterprise...
The Internet is everywhere and deeply affects our...
The beginning of a new year is often a time for p...