Juniper/container-networking-ansible

Name: container-networking-ansible

Owner: Juniper Networks

Description: Ansible provisioning for container networking solutions using OpenContrail

Created: 2015-11-23 22:27:05.0

Updated: 2017-05-20 16:30:10.0

Pushed: 2016-04-21 18:27:59.0

Homepage: null

Size: 143

Language: Python

GitHub Committers

UserMost Recent Commit# Commits

Other Committers

UserEmailMost Recent Commit# Commits

README

container-networking-ansible

Ansible provisioning for container networking solutions using OpenContrail

This repository contains provisioning instructions to install OpenContrail as a network overlay for container based cluster management solutions.

The test directory defines a jenkins workflow that creates and installs a test cluster and executes an application within the cluster.

For support/questions:

The opencontrail playbook consists of the following:

The playbooks are designed to be addons to the existing ansible provisioning for kubernetes and openshift.

Kubernetes
Network segmentation and access control

When opencontrail is used as the kubernetes network plugin, it defaults to isolate all pods according to namespace and a user defined tag. External traffic is restricted to services that are annotated with a ExternalIP address or have “type” set to “LoadBalancer”. This causes the opencontrail public to allocate an address on the public network and assign it to all the pods in this service.

Services in the kube-system namespace are also available to all Pods, irrespective of the namespace of the pod. This is configured via the cluster-service option in /etc/kubernetes/network.conf. The cluster-service network is also connected to the underlay network where masters and nodes are present.

Pods are expected to communicate with the master via its ClusterIP address.

Deployment

The kubernetes ansible playbook at https://github.com/kubernetes/contrib.

[opencontrail:vars] opencontrail_public_subnet=192.0.2.0/24 opencontrail_kube_release=1.1

tch ansible/cluster.yml according to:
s://github.com/kubernetes/contrib/pull/261

n the ansible/cluster.yml playbook (e.g. via ansible/setup.sh)

OpenShift

 Network segmentation and access control

e are several differences in design from a plain-vanilla kubernetes cluster deployment and an openshift deployment:
enShift expects all external traffic to be delivered through the router service. The openshift router pod is a TCP load-balancer (ha-proxy by default) that performs SSL termination and delivers traffic to the pods that implement the service.
enShift pods (builder/deployer) have the nasty habbit of trying to reach the master through its infrastructure IP address (rather than using the ClusterIP).
enShift STI builder pods expect to be able to access external git repositories as well as package repositories for popular languages (python, ruby, etc...).
enShift builder pods use the docker daemon in the node and expect it to be able to talk to the docker-repository service running as a pod (in the overlay).
ployer pods expect to be able to pull images from the docker-repository into the node docker daemon.

 current test scripts, we expect the builder pods to use an http proxy in order to fetch software packages. The builder pods are spawned in the namespace of the user `project`. To provide direct external access, one would need to do so for all pods currently. Future versions of the contrail-kubernetes plugin should support source-nat for outbound access to the public network. It is also possible to add a set of prefixes that contain the software and artifact repositories used by the builder to the global `cluster-service` network.
l the traffic between underlay and overlay is expected to occur based on the `cluster-service` gateway configured for ```default:default```

 Deployment
ventory file:

[OSEv3:children] masters nodes etcd

Set variables common for all OSEv3 hosts

[OSEv3:vars]

use_openshift_sdn = false sdn_network_plugin_name = opencontrail

[opencontrail:children] masters nodes gateways

[opencontrail:vars] opencontrail_public_subnet=192.0.2.0/24 opencontrail_kube_release=origin-1.1

ovision opencontrail with the following playbook:

This work is supported by the National Institutes of Health's National Center for Advancing Translational Sciences, Grant Number U24TR002306. This work is solely the responsibility of the creators and does not necessarily represent the official views of the National Institutes of Health.