Skip to content

Commit

Permalink
cni
Browse files Browse the repository at this point in the history
  • Loading branch information
vipulpathak113 committed Jun 10, 2023
1 parent b302799 commit 710db65
Showing 1 changed file with 20 additions and 0 deletions.
20 changes: 20 additions & 0 deletions Readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -533,3 +533,23 @@ We can secure the networking traffic by applying the ingress and egress rules to
- **Ingress** is incoming traffic to the pod.
- **Egress** is outgoing traffic from the pod.

---
**Container Network Interface(CNI):**

In Kubernetes, each Pod is assigned a unique IP address and can communicate with other Pods without requiring NAT. **To provide networking to Pods, Kubernetes uses Container Network Interface (CNI), a library for configuring network interfaces in Linux containers.**

**The kubelet is responsible for setting up the network for new Pods** using the CNI plugin specified in the configuration file located in the ***/etc/cni/net.d/*** directory on the node.

The required CNI plugins referenced by the configuration should be installed in the ***/opt/cni/bin*** directory, which is the directory used by Kubernetes to **store the CNI plugin binaries** that manage network connectivity for Pods.

**Pod Networking:**

Base on the Kubernetes network model, the key concepts for Pod networking in Kubernetes include:

- Each Pod has a unique cluster-wide IP address.
- Pods can communicate with all other Pods across nodes without NAT.
- Agents on a node can communicate with all Pods on that node.

![cni](https://miro.medium.com/v2/resize:fit:1100/format:webp/1*aTkYgjlco4w2Q2CptlSScA.png)


0 comments on commit 710db65

Please sign in to comment.