Linkerd Multus Network Attach Operator
The operator helps to use Linkerd-CNI in Kubernetes clusters with Multus installed
via creating NetworkAttachmentDefinitions and adding attach annotations to Pods.
Description
The application contains 2 components:
- NetworkAttachmentDefinitions controller
- Mutating webhook
NetworkAttachmentDefinitions controller
The controller performs watches namespaces for linkerd.io/multus
annotation.
If the annotation's value is enabled
, then the controller:
- Loads the Linkerd-CNI ConfigMap from the CNI namespace (linkerd-cni by default)
- Generates NetworkAttachmentDefinition spec from the ConfigMap and its settings
- Creates the NetworkAttachmentDefinition in the namespace
If the annotation is not set or disabled, the NetworkAttachmentDefinition is deleted from
the namespace.
In addition, Linkerd control plane namespace always has the Multus NetworkAttachmentDefinition
present and the control plane Pods (based on linkerd.io/control-plane-component
labels)
are always patched to attach the NetworkAttachmentDefinition.
The NetworkAttachmentDefinition's settings are configurable via the controller's flags:
Flag |
Description |
-cni-namespace |
Namespace in which Linkerd CNI is installed. It is used to get the CNI ConfigMap |
-linkerd-namespace |
Namespace in which Linkerd control plane is installed. The control plane namespace must always have NetworkAttachmentDefinition for Linkerd CNI |
-cni-kubeconfig |
Path on Kubernetes hosts where Linkerd CNI DaemonSet Pods put Kubeconfig |
Mutating Webhook
Mutating webhook adds k8s.cni.cncf.io/v1=linkerd-cni
annotation to Pods which must be handled
by Linkerd CNI.
Before the decision is made, the webhook copies namespace annotations [linkerd.io/multus, linkerd.io/inject]
to a pod, if the pod does not have them defined.
The webhook adds the k8s.cni.cncf.io/v1=linkerd-cni
annotation if any of items below is true:
- A Pod has
linkerd.io/multus=enabled
annotation
- A Pod is in Linkerd control plane namespace and has not empty
linkerd.io/control-plane-component
label
If the controller is used on Openshift or other Kubernetes cluster which enforces user and group ID ranges
in namespaces, you should also annotate Pods with config.linkerd.io/proxy-uid
annotation and an allowed UID value.
Otherwise, Openshift will not allow the proxy container to start.
If a Pod's namespace has openshift.io/sa.scc.uid-range={{ first ID }}/{{ pool size }}
annotation, then the webhook will try to use it to annotate the Pod with the config.linkerd.io/proxy-uid={{ first ID }}
annotation.
Getting Started Helm and Linkerd-cli way
Install Linkerd
- Configure Openshift SCCs for Linkerd-CNI (necessary only for Openshift clusters):
# For Linkerd control plane. Maybe these privileges can be further reduced.
oc adm policy add-scc-to-user privileged -z linkerd-destination -n linkerd
oc adm policy add-scc-to-user privileged -z linkerd-proxy-injector -n linkerd
oc adm policy add-scc-to-user privileged -z linkerd-identity -n linkerd
#
# For Linkerd CNI must have root privileges to manipulate with netfilter.
oc adm policy add-scc-to-user privileged -z linkerd-cni -n linkerd-cni
#
# For Linkerd VIZ - do not add, if you are not planning to use the viz extension.
oc adm policy add-scc-to-user anyuid -z default -n linkerd-viz
oc adm policy add-scc-to-user anyuid -z metrics-api -n linkerd-viz
oc adm policy add-scc-to-user anyuid -z prometheus -n linkerd-viz
oc adm policy add-scc-to-user anyuid -z tap -n linkerd-viz
oc adm policy add-scc-to-user anyuid -z tap-injector -n linkerd-viz
oc adm policy add-scc-to-user anyuid -z web -n linkerd-viz
- Install Linkerd-CNI with Helm values (file paths are given for Openshift 4.10):
destCNIBinDir: /var/lib/cni/bin
destCNINetDir: /etc/cni/net.d
It can be done via linkerd-cli
as: linkerd install-cni --dest-cni-bin-dir=/var/lib/cni/bin --dest-cni-net-dir=/etc/cni/net.d | kubectl apply -f -
.
-
Install Linkerd CRDs: linkerd install --crds | kubectl apply -f -
-
Install Linkerd: linkerd install --linkerd-cni-enabled | kubectl apply -f -
-
Install the controller:
# Never install the controller in the same namespace as Linkerd and Linkerd-CNI
# as at least WebHook will ignore the controller's namespace which may cause unexpected behaviour.
kubectl create ns linkerd-multus-controller
helm install ld-controller ./helm/
-
Delete Linkerd control plane Pods: kubectl -n linkerd delete pod --all
to recreate them with the Multus attached Linkerd-CNI plugin.
-
Install Linkerd-viz, if necessary (don't forget to annotate the namespace with linkerd.io/multus: enabled
).
Getting Started with Kustomize and Make
You’ll need a Kubernetes cluster to run against. You can use KIND to get a local cluster for testing, or run against a remote cluster.
Note: Your controller will automatically use the current context in your kubeconfig file (i.e. whatever cluster kubectl cluster-info
shows).
Running on the cluster
-
Install cert-manager as it is necessary to generate webhook certificates
-
Install Instances of Custom Resources:
kubectl apply -f config/samples/
- Build and push your image to the location specified by
IMG
:
make docker-build docker-push IMG=<some-registry>/linkerd-multus-attach-operator:tag
- Deploy the controller to the cluster with the image specified by
IMG
:
make deploy IMG=<some-registry>/linkerd-multus-attach-operator:tag
Uninstall CRDs
To delete the CRDs from the cluster:
make uninstall
Undeploy controller
UnDeploy the controller to the cluster:
make undeploy
Contributing
// TODO(user): Add detailed information on how you would like others to contribute to this project
How it works
This project aims to follow the Kubernetes Operator pattern
It uses Controllers
which provides a reconcile function responsible for synchronizing resources untile the desired state is reached on the cluster
Test It Out
- Install the CRDs into the cluster:
make install
- Run your controller (this will run in the foreground, so switch to a new terminal if you want to leave it running):
make run
NOTE: You can also run this in one step by running: make install run
Modifying the API definitions
If you are editing the API definitions, generate the manifests such as CRs or CRDs using:
make manifests
NOTE: Run make --help
for more information on all potential make
targets
More information can be found via the Kubebuilder Documentation
License
Copyright 2022 ErmakovDmitriy.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.