"This Project has been archived by the owner, who is no longer providing support. The project remains available to authorized users on a "read only" basis."
meshnet is a (K8s) CNI plugin to create arbitrary network topologies out of point-to-point links with the help of koko. Heavily inspired by Ratchet-CNI, kokonet and Multus.
- Using K8s etcd as datastore via Custom Resources
- All internal communication now happens over gRPC
- Support for macvlan links to connect to external resources
The goal of this plugin is to interconnect pods via direct point-to-point links according to a pre-define topology. To do that, the plugin uses three types of links:
- veth - used to connect two pods running on the same host
- vxlan - used to connected two pods running on different hosts
- macvlan - used to connect to external resources, i.e. any physical or virtual device outside of the Kubernetes cluster
Topology information, represented as a list of links per pod, is stored in k8s's etcd datastore as custom resources:
apiVersion: networkop.co.uk/v1beta1
kind: Topology
metadata:
name: r1
spec:
links:
- uid: 1
peer_pod: r2
local_intf: eth1
local_ip: 12.12.12.1/24
peer_intf: eth1
peer_ip: 12.12.12.2/24
The plugin configuration file contains a "chained" meshnet
in the list of plugins:
{
"cniVersion": "0.3.1",
"name": "kindnet",
"plugins": [
{
"ipMasq": false,
"ipam": {
"dataDir": "/run/cni-ipam-state",
"ranges": [
[
{
"subnet": "10.244.0.0/24"
}
]
],
"routes": [
{
"dst": "0.0.0.0/0"
}
],
"type": "host-local"
},
"mtu": 1500,
"type": "ptp"
},
{
"capabilities": {
"portMappings": true
},
"type": "portmap"
},
{
"name": "meshnet",
"type": "meshnet",
"ipam": {},
"dns": {}
}
]
}
The plugin consists of three main components:
- datastore - a k8s native etcd backend cluster storing topology information and runtime pod metadata (e.g. pod IP address and NetNS)
- meshnet - a CNI binary responsible for pod's network configuration
- meshnetd - a daemon responsible for communication with k8s and vxlan link configuration updates
Below is the order of operation of the plugin from the perspective of kube-node-1:
- Kubernetes cluster gets populated with the topology information via custom resources
- pod-1/pod-2 come up, local kubelet calls the
meshnet
binary for each pod to setup their networking. - Based on the CNI configuration file, Kubelet calls meshnet to set up additional interfaces.
Note that
eth0
is always setup by one of the existing CNI plugins. It is used to provide external connectivity to and from the pod
- meshnet binary updates the topology data with pod's runtime metadata (namespace filepath and primary IP address).
- meshnet binary (via a local meshnet daemon) retrieves the list of
links
and looks up peer pod's metadata to identify what kind of link to setup - veth, vxlan or macvlan. - If the peer is on the same node, it calls koko to setup a
veth
link between the two pods. - If the peer is on the remote node, it does two things:
7.1 It calls koko to setup a localvxlan
link. 7.2 It makes a gRPCUpdate
call to the remote node's meshnet daemon, specifying this link's metadata (e.g. VTEP IP and VNI). - Upon receipt of this information, remote node's
meshnetd
idepmotently updates the local vxlan link, i.e. it creates a new link, updates the existing link if there's a change or does nothing if the link attributes are the same.
Clone this project and build a local 3-node Kubernetes cluster
make up
Build the meshnet-cni docker image
make docker
Install meshnet-cni plugin
make install
Verify that meshnet is up and READY
kubectl get daemonset -n meshnet
Install a 3-node test topology
kubectl apply -f tests/3node.yml
Check that all pods are running
kubectl get pods -l test=3node
NAME READY STATUS RESTARTS AGE
r1 1/1 Running 0 40m
r2 1/1 Running 0 40m
r3 1/1 Running 0 40s
Test connectivity between pods
kubectl exec r1 -- ping -c 1 12.12.12.2
kubectl exec r2 -- ping -c 1 23.23.23.3
kubectl exec r3 -- ping -c 1 13.13.13.1
Cleanup
kubectl delete --grace-period=0 --force -f tests/3node.yml
Destroy the local kind cluster
make down
The following manifest will create all that's required for meshnet plugin to function, i.e.:
- A
meshnet
namespace - A Custom Resource Definition for network topologies
- A set of RBAC rules to allow meshnet to interact with new custom resources
- A daemonset with meshnet plugin and configuration files
kubectl apply -k manifests/base
Meshnet plugin was designed to work alongside any other existing or future Kubernetes resources that may not require any special topology to be set up for them. Every pod coming up will have its first interface setup by an existing CNI plugin (e.g. flannel, weave, calico) and will only have additional interfaces connected if there's a matching custom Topology
resource.
During the initial installation process, meshnet will try to insert itself into the list of CNI plugins. For example, assuming the following configuration is present in /etc/cni/net.d/weave.conf
:
{
"cniVersion": "0.2.0",
"name": "weave",
"type": "weave-net",
}
Meshnet will convert the above to conflist and produce the file /etc/cni/net.d/00-meshnet.conflist
with the following content:
{
"cniVersion": "0.2.0",
"name": "weave",
"plugins": [
{
"cniVersion": "0.2.0",
"name": "weave",
"type": "weave-net"
},
{
"name": "meshnet",
"type": "meshnet",
"ipam": {},
"dns": {}
}
]
}
``
### Cusomising installation paths
In some cases, Kubernetes distros may store CNI configuration files and binaries in non-standard directories and override them with `--cni-bin-dir` and `--cni-conf-dir` flags. In order to install meshnet into the right directories, create a new overlay under `manifests/overlays` and patch the `cni-dir` or `cni-bin` volumes with the correct location. See [kops overlay](manifests/overlays/kops) for an example.
### Resilient topologies
If you need to have Pods restarted and re-scheduled by the kube-controller, it's possible to deploy them as StatefulSets with replica number = 1. See [this example](/tests/2node-sts.yml).
### Examples
Inside the `tests` directory there are 4 manifests with the following test topologies
* A simple point-to-point 2-node topology
* A 3-node topology connected as a triangle
* A 5-node topology connected as [quincunx](https://en.wikipedia.org/wiki/Quincunx)
* A 2-node topology with 2nd node connected to a macvlan interface
#### Use k8s-topo to orchestrate network topologies
Login the K8s master node and
git clone https://github.com/networkop/k8s-topo.git && cd k8s-topo
Deploy k8s-topo pod
kubectl create -f manifest.yml
Connect to the k8s-topo pod
kubectl exec -it k8s-topo sh
Create a random 20-node network topology
./examples/builder/builder 20 0 Total number of links generated: 19
Create the topology inside K8s
k8s-topo --create examples/builder/random.yml
Optionally, you can generate a D3.js network topology graph
k8s-topo --graph examples/builder/random.yml
View the generated topology graph at `http://<any_k8s_cluster_node_ip>:32000`
Verify that the topology has been deployed (from the master node)
kubectl get pods -o wide | grep qrtr qrtr-1 1/1 Running 0 11s 10.233.65.231 node3 qrtr-10 1/1 Running 0 11s 10.233.65.234 node3 qrtr-11 1/1 Running 0 10s 10.233.66.246 node4
Login the first node and verify connectivity to every other loopback
$ qrtr-1
/ # for i in seq 0 20
; do echo "192.0.2.$i =>" $(ping -c 1 -W 1 192.0.2.$i|grep loss); done
192.0.2.0 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.1 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.2 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.3 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.4 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.5 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.6 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.7 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.8 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.9 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.10 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.11 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.12 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.13 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.14 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.15 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.16 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.17 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.18 => 1 packets transmitted, 1 packets received, 0% packet loss
192.0.2.19 => 1 packets transmitted, 1 packets received, 0% packet loss
Destroy the topology
k8s-topo --destroy examples/builder/random.yml
## Troubleshooting
There are two places to collect meshnet logs:
1. Meshnet daemon logs can be collected outside of the Kubernetes cluster. For example, the below command will collect logs from all meshnet daemons using [stern](https://github.com/wercker/stern)
stern meshnet -n meshnet
2. Meshnet plugin (binary) logs can be collected on the respective Kubernetes nodes, e.g.
root@kind-worker:/# journalctl -u kubelet
---
Each POD is supposed to run an `init-wait` container that waits for the right number of interface to be connected before passing the ball to the main container. However, sometimes, PODs restart resulting in the missing interfaces inside the main container process, since they may have been added *AFTER* the process that reads the container interface list (e.g. qemu-kvm for VM-based containers). This is the procedure I use to identify the cause of the failure:
1. Identify which POD is at fault. This will most likely be the incorrect number of interfaces.
2. Identify which interface is missing or was added last.
3. Identify the correlation between the pair of containers interconnected by the missing interface
4. Look for the peer container's failures using `kubectl get events --sort-by=.metadata.creationTimestamp'`
5. Identify which k8s node this POD is running on `kubectl get pods acme-scs1001-a -o yaml | grep node`
6. On that node check the `journalctl` for any errors associated with the POD
[dynamic-client]: https://www.oreilly.com/library/view/programming-kubernetes/9781492047094/ch04.html
[dynclient-example]: https://github.com/kubernetes/client-go/blob/611184f7c43ae2d520727f01d49620c7ed33412d/examples/dynamic-create-update-delete-deployment/main.go