Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
WIP: K8s network model diagrams #39069
WIP: K8s network model diagrams #39069
Changes from 1 commit
7aae1ad
2483764
f04dd84
f416212
b842660
1bee739
516a23a
9ae9f74
4bb80ef
5c775fc
070831e
67aa567
743df5f
39b9fcd
0e3e953
bdf6838
c539208
b6b970e
99a793b
9d1f69b
774872b
2a77eef
93ab5d3
3639d82
cbe9d2d
a41c343
7cc2dcb
cded548
ac611f7
981f21e
fc933ba
82585b0
f7ae32e
f3a499f
89d0d8d
beaddd0
e277fe5
96fe076
fdf5931
84a000b
90618e9
57d167f
08af340
6e6e6ba
bbc9f8d
c67a986
7f5e0fa
dabf57d
9de3510
903da02
92b9d3f
e92d8bf
dead0d1
11646a6
daddedc
082ba83
d8c4b96
9c398f8
5276678
987e746
75e1101
fb2b6a5
74725dd
a5883ed
7fbe6d4
1bd6749
13fce0e
401fd99
a21e1f7
6c840a1
91b1e3f
5fc05fe
507c25f
25252e2
7b08c16
89d6a54
5ff4c2e
f307243
47b3287
9efe14f
11440ea
2668c62
3fc2fa9
20d71a2
2a2c5cc
0f12ff8
5e4a37a
0e538cb
7bf363a
655a9da
997a437
c8064a5
e0f05e9
448e530
bfccfbb
77dc30d
95095ad
9064af2
b832ead
8f656c9
936026e
4c1adec
a299641
344b6db
9e17076
17f2ae9
5a05d6e
9e75590
9b05790
945babc
9bb924d
d4eaff9
329dfd1
6105278
4df5efb
bee8fec
c5778fd
001c92e
1fab492
ba99616
db787b5
58cf89a
6acd310
206231d
ec42ca7
f89b55e
25c74ff
ba9ad02
aaede4e
e244bf9
12d9b2c
35eda2c
efe8acd
ced4a3e
b372848
b514657
02991a6
334a083
512ba15
7bc3d62
28963c6
cdb1a9c
91714b4
58917de
39ad5e7
22a1760
fcd671a
11c3289
cd5919f
dbde7cf
f6d41d2
bb4092c
4ad5616
71a81bf
b1ed291
0a67b88
b57fdb0
e16623f
f92af2c
434db7b
9a8e973
4854329
33c2953
8566c8a
8b7e4f3
e97e4bb
69170a9
3d9ef70
6297df7
c342ef2
64dc81a
3305d7b
1d514a5
cde1ecc
99721e5
c92f1d3
7d6cc70
e4740b4
4798193
c2d4ca7
ad9b54a
c207222
a0085b4
b5dfc75
86a9bfd
3f6e14f
dea9f5e
9e97e1c
7a81702
3d850f6
aa9f17e
fbd180f
ff72b66
ec66152
9c86598
2714d34
9100a22
1f9b9e0
d1fec5a
5ec8366
0d87a3a
a7cd38a
2484c15
4f65827
1a44be7
ce650bf
8463423
8829999
43d3ffa
8053f6a
6eb1bde
6e6e4ed
590366e
74d09c9
74746dd
ecd90c8
9137c09
70fec9e
5fd1a9d
c38e5c0
25a926e
c6b3f34
a39ee49
c9640eb
3c8df5e
04cfb74
cf11a9d
a8454fd
b4f737e
b1ca7a8
c44bdb2
4c9b2b1
fc74321
fabc063
8eec242
3c3b784
8033e7b
071950d
6bbfc2f
78eb0a7
c8f7fb1
ae10bf5
8f286d7
3d88fa0
131a0c0
8ec6fea
1df49cb
ab0fca4
65f632c
5d78673
File filter
Filter by extension
Conversations
Jump to
There are no files selected for viewing
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We should show that a Pod running in host network mode can communicate with another Pod in normal cluster network mode, provided that they are both on the same Pod.
That might be something we save for a followup, but it's good to show it one day.
Also that some network architectures allow for this to happen even when the 2 Pods are on different modes, but that Kubernetes doesn't require or guarantee this.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Perhaps it'll help to show more than one image with detailed examples. Once we have those, maybe it'll be more obvious which elements are common.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will add a two examples to this section so figure captions will change.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
consider showing a node that doesn't have any workload Pods running?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Watch out for assuming that the network plugin uses layer 2 techniques. A network plugin that works at the IP layer only (eg a Linux
tun
interface plus userland packet encapsulation and decapsulation) is a viable design.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
https://www.researchgate.net/figure/Kubernetes-Network-routing-to-export-the-services_fig1_337362475 includes an example of a diagram that doesn't rely on OSI layer 2 (although, given it shows Flannel, this is partly down to eliding some detail)
Another option is with text, to highlight that this is one of several viable designs.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Understand re: L2-based and other network paradigms. Referenced paper is "researchy" but your point is valid.
Might call for Advanced Topics section later on that covers other paradigms like User-space networking (kernel bypass), Network Service Mesh, maybe eBPF, CNFs, ...
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.