- Quick Start
- Installation
- Multi-cluster Gateway Configuration
- Multi-cluster Service
- Multi-cluster Pod-to-Pod Connectivity
- Multi-cluster NetworkPolicy
- ClusterNetworkPolicy Replication
- Build Antrea Multi-cluster Controller Image
- Uninstallation
- Known Issue
Antrea Multi-cluster implements Multi-cluster Service API, which allows users to create multi-cluster Services that can be accessed cross clusters in a ClusterSet. Antrea Multi-cluster also extends Antrea-native NetworkPolicy to support Multi-cluster NetworkPolicy rules that apply to cross-cluster traffic, and ClusterNetworkPolicy replication that allows a ClusterSet admin to create ClusterNetworkPolicies which are replicated across the entire ClusterSet and enforced in all member clusters. Antrea Multi-cluster was first introduced in Antrea v1.5.0. In Antrea v1.7.0, the Multi-cluster Gateway feature was added that supports routing multi-cluster Service traffic through tunnels among clusters. The ClusterNetworkPolicy replication feature is supported since Antrea v1.6.0, and Multi-cluster NetworkPolicy rules are supported since Antrea v1.10.0.
Antrea v1.13 promoted the ClusterSet CRD version from v1alpha1 to v1alpha2. If you plan to upgrade from a previous version to v1.13 or later, please check the upgrade guide.
Please refer to the Quick Start Guide to learn how to build a ClusterSet with two clusters quickly.
In this guide, all Multi-cluster installation and ClusterSet configuration are
done by applying Antrea Multi-cluster YAML manifests. Actually, all operations
can also be done with antctl
Multi-cluster commands, which may be more
convenient in many cases. You can refer to the Quick Start Guide
and antctl Guide to learn how to use the Multi-cluster commands.
We assume an Antrea version >= v1.8.0
is used in this guide, and the Antrea
version is set to an environment variable TAG
. For example, the following
command sets the Antrea version to v1.8.0
.
export TAG=v1.8.0
To use the latest version of Antrea Multi-cluster from the Antrea main branch,
you can change the YAML manifest path to: https://github.com/antrea-io/antrea/tree/main/multicluster/build/yamls/
when applying or downloading an Antrea YAML manifest.
Multi-cluster Services and
multi-cluster Pod-to-Pod connectivity,
in particular configuration (please check the corresponding sections to learn more
information), requires an Antrea Multi-cluster Gateway to be set up in each member
cluster by default to route Service and Pod traffic across clusters. To support
Multi-cluster Gateways, antrea-agent
must be deployed with the Multicluster
feature enabled in a member cluster. You can set the following configuration parameters
in antrea-agent.conf
of the Antrea deployment manifest to enable the Multicluster
feature:
kind: ConfigMap
apiVersion: v1
metadata:
name: antrea-config
namespace: kube-system
data:
antrea-agent.conf: |
featureGates:
Multicluster: true
multicluster:
enableGateway: true
namespace: "" # Change to the Namespace where antrea-mc-controller is deployed.
In order for Multi-cluster features to work, it is necessary for enableGateway
to be set to true by
the user, except when Pod-to-Pod direct connectivity already exists (e.g., provided by the cloud provider)
and endpointIPType
is configured as PodIP
. Details can be found in Multi-cluster Services.
Please note that Multi-cluster NetworkPolicy always requires
Gateway.
Prior to Antrea v1.11.0, Multi-cluster Gateway only works with Antrea encap
traffic
mode, and all member clusters in a ClusterSet must use the same tunnel type. Since
Antrea v1.11.0, Multi-cluster Gateway also works with the Antrea noEncap
, hybrid
and networkPolicyOnly
modes. For noEncap
and hybrid
modes, Antrea Multi-cluster
deployment is the same as encap
mode. For networkPolicyOnly
mode, we need extra
Antrea configuration changes to support Multi-cluster Gateway. Please check
the deployment guide for more information. When using
Multi-cluster Gateway, it is not possible to enable WireGuard for inter-Node
traffic within the same member cluster. It is however possible to enable
WireGuard for cross-cluster traffic
between member clusters.
A Multi-cluster ClusterSet is comprised of a single leader cluster and at least two member clusters. Antrea Multi-cluster Controller needs to be deployed in the leader and all member clusters. A cluster can serve as the leader, and meanwhile also be a member cluster of the ClusterSet. To deploy Multi-cluster Controller in a dedicated leader cluster, please refer to Deploy in a Dedicated Leader cluster. To deploy Multi-cluster Controller in a member cluster, please refer to Deploy in a Member Cluster. To deploy Multi-cluster Controller in a dual-role cluster, please refer to Deploy Leader and Member in One Cluster.
Since Antrea v1.14.0, you can run the following command to install Multi-cluster Controller in the leader cluster. Multi-cluster Controller is deployed into a Namespace. You must create the Namespace first, and then apply the deployment manifest in the Namespace.
For a version older than v1.14, please check the user guide document of the version:
https://github.com/antrea-io/antrea/blob/release-$version/docs/multicluster/user-guide.md
,
where $version
can be 1.12
, 1.13
etc.
kubectl create ns antrea-multicluster
kubectl apply -f https://github.com/antrea-io/antrea/releases/download/$TAG/antrea-multicluster-leader.yml
The Multi-cluster Controller in the leader cluster will be deployed in Namespace antrea-multicluster
by default. If you'd like to use another Namespace, you can change antrea-multicluster
to the desired
Namespace in antrea-multicluster-leader-namespaced.yml
, for example:
kubectl create ns '<desired-namespace>'
curl -L https://github.com/antrea-io/antrea/releases/download/$TAG/antrea-multicluster-leader-namespaced.yml > antrea-multicluster-leader-namespaced.yml
sed 's/antrea-multicluster/<desired-namespace>/g' antrea-multicluster-leader-namespaced.yml | kubectl apply -f -
You can run the following command to install Multi-cluster Controller in a
member cluster. The command will run the controller in the "member" mode in the
kube-system
Namespace. If you want to use a different Namespace other than
kube-system
, you can edit antrea-multicluster-member.yml
and change
kube-system
to the desired Namespace.
kubectl apply -f https://github.com/antrea-io/antrea/releases/download/$TAG/antrea-multicluster-member.yml
We need to run two instances of Multi-cluster Controller in the dual-role cluster, one in leader mode and another in member mode.
- Follow the steps in section Deploy in a Dedicated Leader Cluster to deploy the leader controller and import the Multi-cluster CRDs.
- Follow the steps in section Deploy in a Member Cluster to deploy the member controller.
An Antrea Multi-cluster ClusterSet should include at least one leader cluster
and two member clusters. As an example, in the following sections we will create
a ClusterSet test-clusterset
which has two member clusters with cluster ID
test-cluster-east
and test-cluster-west
respectively, and one leader cluster
with ID test-cluster-north
. Please note that the name of a ClusterSet CR must
match the ClusterSet ID. In all the member and leader clusters of a ClusterSet,
the ClusterSet CR must use the ClusterSet ID as the name, e.g. test-clusterset
in the example of this guide.
We first need to set up access to the leader cluster's API server for all member clusters. We recommend creating one ServiceAccount for each member for fine-grained access control.
The Multi-cluster Controller deployment manifest for a leader cluster also creates
a default member cluster token. If you prefer to use the default token, you can skip
step 1 and replace the Secret name member-east-token
to the default token Secret
antrea-mc-member-access-token
in step 2.
-
Apply the following YAML manifest in the leader cluster to set up access for
test-cluster-east
:apiVersion: v1 kind: ServiceAccount metadata: name: member-east namespace: antrea-multicluster --- apiVersion: v1 kind: Secret metadata: name: member-east-token namespace: antrea-multicluster annotations: kubernetes.io/service-account.name: member-east type: kubernetes.io/service-account-token --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: member-east namespace: antrea-multicluster roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: antrea-mc-member-cluster-role subjects: - kind: ServiceAccount name: member-east namespace: antrea-multicluster
-
Generate the token Secret manifest from the leader cluster, and create a Secret with the manifest in member cluster
test-cluster-east
, e.g.:# Generate the file 'member-east-token.yml' from your leader cluster kubectl get secret member-east-token -n antrea-multicluster -o yaml | grep -w -e '^apiVersion' -e '^data' -e '^metadata' -e '^ *name:' -e '^kind' -e ' ca.crt' -e ' token:' -e '^type' -e ' namespace' | sed -e 's/kubernetes.io\/service-account-token/Opaque/g' -e 's/antrea-multicluster/kube-system/g' > member-east-token.yml # Apply 'member-east-token.yml' to the member cluster. kubectl apply -f member-east-token.yml --kubeconfig=/path/to/kubeconfig-of-member-test-cluster-east
-
Replace all
east
towest
and repeat step 1/2 for the other member clustertest-cluster-west
.
In all clusters, a ClusterSet
CR must be created to define the ClusterSet and claim the
cluster is a member of the ClusterSet.
- Create
ClusterSet
in the leader clustertest-cluster-north
with the following YAML manifest (you can also refer to leader-clusterset-template.yml):
apiVersion: multicluster.crd.antrea.io/v1alpha2
kind: ClusterSet
metadata:
name: test-clusterset
namespace: antrea-multicluster
spec:
clusterID: test-cluster-north
leaders:
- clusterID: test-cluster-north
- Create
ClusterSet
in member clustertest-cluster-east
with the following YAML manifest (you can also refer to member-clusterset-template.yml):
apiVersion: multicluster.crd.antrea.io/v1alpha2
kind: ClusterSet
metadata:
name: test-clusterset
namespace: kube-system
spec:
clusterID: test-cluster-east
leaders:
- clusterID: test-cluster-north
secret: "member-east-token"
server: "https://172.18.0.1:6443"
namespace: antrea-multicluster
Note: update server: "https://172.18.0.1:6443"
in the ClusterSet
spec to the
correct leader cluster API server address.
- Create
ClusterSet
in member clustertest-cluster-west
:
apiVersion: multicluster.crd.antrea.io/v1alpha2
kind: ClusterSet
metadata:
name: test-clusterset
namespace: kube-system
spec:
clusterID: test-cluster-west
leaders:
- clusterID: test-cluster-north
secret: "member-west-token"
server: "https://172.18.0.1:6443"
namespace: antrea-multicluster
If you want to make the leader cluster test-cluster-north
also a member
cluster of the ClusterSet, make sure you follow the steps in Deploy Leader and
Member in One Cluster and repeat the
steps in Set up Access to Leader Cluster as
well (don't forget replace all east
to north
when you repeat the steps).
Then create the ClusterSet
CR in cluster test-cluster-north
in the
kube-system
Namespace (where the member Multi-cluster Controller runs):
apiVersion: multicluster.crd.antrea.io/v1alpha2
kind: ClusterSet
metadata:
name: test-clusterset
namespace: kube-system
spec:
clusterID: test-cluster-north
leaders:
- clusterID: test-cluster-north
secret: "member-north-token"
server: "https://172.18.0.1:6443"
namespace: antrea-multicluster
Multi-cluster Gateways are responsible for establishing tunnels between clusters. Each member cluster should have one Node serving as its Multi-cluster Gateway. Multi-cluster Service traffic is routed among clusters through the tunnels between Gateways.
Below is a table about communication support for different configurations.
Pod-to-Pod connectivity provided by underlay | Gateway Enabled | MC EndpointTypes | Cross-cluster Service/Pod communications |
---|---|---|---|
No | No | N/A | No |
Yes | No | PodIP | Yes |
No | Yes | PodIP/ClusterIP | Yes |
Yes | Yes | PodIP/ClusterIP | Yes |
After a member cluster joins a ClusterSet, and the Multicluster
feature is
enabled on antrea-agent
, you can select a Node of the cluster to serve as
the Multi-cluster Gateway by adding an annotation:
multicluster.antrea.io/gateway=true
to the K8s Node. For example, you can run
the following command to annotate Node node-1
as the Multi-cluster Gateway:
kubectl annotate node node-1 multicluster.antrea.io/gateway=true
You can annotate multiple Nodes in a member cluster as the candidates for
Multi-cluster Gateway, but only one Node will be selected as the active Gateway.
Before Antrea v1.9.0, the Gateway Node is just randomly selected and will never
change unless the Node or its gateway
annotation is deleted. Starting with
Antrea v1.9.0, Antrea Multi-cluster Controller will guarantee a "ready" Node
is selected as the Gateway, and when the current Gateway Node's status changes
to not "ready", Antrea will try selecting another "ready" Node from the
candidate Nodes to be the Gateway.
Once a Gateway Node is decided, Multi-cluster Controller in the member cluster
will create a Gateway
CR with the same name as the Node. You can check it with
command:
$ kubectl get gateway -n kube-system
NAME GATEWAY IP INTERNAL IP AGE
node-1 10.17.27.55 10.17.27.55 10s
internalIP
of the Gateway is used for the tunnels between the Gateway Node and
other Nodes in the local cluster, while gatewayIP
is used for the tunnels to
remote Gateways of other member clusters. Multi-cluster Controller discovers the
IP addresses from the K8s Node resource of the Gateway Node. It will always use
InternalIP
of the K8s Node as the Gateway's internalIP
. For gatewayIP
,
there are several possibilities:
- By default, the K8s Node's
InternalIP
is used asgatewayIP
too. - You can choose to use the K8s Node's
ExternalIP
asgatewayIP
, by changing the configuration optiongatewayIPPrecedence
to value:external
, when deploying the member Multi-cluster Controller. The configration option is defined in ConfigMapantrea-mc-controller-config
inantrea-multicluster-member.yml
. - When the Gateway Node has a separate IP for external communication or is
associated with a public IP (e.g. an Elastic IP on AWS), but the IP is not added
to the K8s Node, you can still choose to use the IP as
gatewayIP
, by adding an annotation:multicluster.antrea.io/gateway-ip=<ip-address>
to the K8s Node.
When choosing a candidate Node for Multi-cluster Gateway, you need to make sure
the resulted gatewayIP
can be reached from the remote Gateways. You may need
to configure firewall or security groups properly
to allow the tunnels between Gateway Nodes. As of now, only IPv4 Gateway IPs are
supported.
After the Gateway is created, Multi-cluster Controller will be responsible
for exporting the cluster's network information to other member clusters
through the leader cluster, including the cluster's Gateway IP and Service
CIDR. Multi-cluster Controller will try to discover the cluster's Service CIDR
automatically, but you can also manually specify the serviceCIDR
option in
ConfigMap antrea-mc-controller-config
. In other member clusters, a
ClusterInfoImport CR will be created for the cluster which includes the
exported network information. For example, in cluster test-cluster-west
, you
you can see a ClusterInfoImport CR with name test-cluster-east-clusterinfo
is created for cluster test-cluster-east
:
$ kubectl get clusterinfoimport -n kube-system
NAME CLUSTER ID SERVICE CIDR AGE
test-cluster-east-clusterinfo test-cluster-east 110.96.0.0/20 10s
Make sure you repeat the same step to assign a Gateway Node in all member
clusters. Once you confirm that all Gateway
and ClusterInfoImport
are
created correctly, you can follow the Multi-cluster Service
section to create multi-cluster Services and verify cross-cluster Service
access.
Since Antrea v1.12.0, Antrea Multi-cluster supports WireGuard tunnel between member clusters. If WireGuard is enabled, the WireGuard interface and routes will be created by Antrea Agent on the Gateway Node, and all cross-cluster traffic will be encrypted and forwarded to the WireGuard tunnel.
Please note that WireGuard encryption requires the wireguard
kernel module be
present on the Kubernetes Nodes. wireguard
module is part of mainline kernel
since Linux 5.6. Or, you can compile the module from source code with a kernel
version >= 3.10. This WireGuard installation guide
documents how to install WireGuard together with the kernel module on various
operating systems.
To enable the WireGuard encryption, the TrafficEncryptMode
in Multi-cluster configuration should be set to wireGuard
and the enableGateway
field should be set to true
as follows:
kind: ConfigMap
apiVersion: v1
metadata:
name: antrea-config
namespace: kube-system
data:
antrea-agent.conf: |
featureGates:
Multicluster: true
multicluster:
enableGateway: true
trafficEncryptionMode: "wireGuard"
wireGuard:
port: 51821
When WireGuard encryption is enabled for cross-cluster traffic as part of the Multi-cluster feature, in-cluster encryption (for traffic within a given member cluster) is no longer supported, not even with IPsec.
After you set up a ClusterSet properly, you can create a ServiceExport
CR to
export a Service from one cluster to other clusters in the Clusterset, like the
example below:
apiVersion: multicluster.x-k8s.io/v1alpha1
kind: ServiceExport
metadata:
name: nginx
namespace: default
For example, once you export the default/nginx
Service in member cluster
test-cluster-west
, it will be automatically imported in member cluster
test-cluster-east
. A Service and an Endpoints with name
default/antrea-mc-nginx
will be created in test-cluster-east
, as well as
a ServcieImport CR with name default/nginx
. Now, Pods in test-cluster-east
can access the imported Service using its ClusterIP, and the requests will be
routed to the backend nginx
Pods in test-cluster-west
. You can check the
imported Service and ServiceImport with commands:
$ kubectl get serviceimport antrea-mc-nginx -n default
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
antrea-mc-nginx ClusterIP 10.107.57.62 <none> 443/TCP 10s
$ kubectl get serviceimport nginx -n default
NAME TYPE IP AGE
nginx ClusterSetIP ["10.19.57.62"] 10s
As part of the Service export/import process, in the leader cluster, two ResourceExport CRs will be created in the Multi-cluster Controller Namespace, for the exported Service and Endpoints respectively, as well as two ResourceImport CRs. You can check them in the leader cluster with commands:
$ kubectl get resourceexport -n antrea-multicluster
NAME CLUSTER ID KIND NAMESPACE NAME AGE
test-cluster-west-default-nginx-endpoints test-cluster-west Endpoints default nginx 30s
test-cluster-west-default-nginx-service test-cluster-west Service default nginx 30s
$ kubectl get resourceimport -n antrea-multicluster
NAME KIND NAMESPACE NAME AGE
default-nginx-endpoints Endpoints default nginx 99s
default-nginx-service ServiceImport default nginx 99s
When there is any new change on the exported Service, the imported multi-cluster
Service resources will be updated accordingly. Multiple member clusters can
export the same Service (with the same name and Namespace). In this case, the
imported Service in a member cluster will include endpoints from all the export
clusters, and the Service requests will be load-balanced to all these clusters.
Even when the client Pod's cluster also exported the Service, the Service
requests may be routed to other clusters, and the endpoints from the local
cluster do not take precedence. A Service cannot have conflicted definitions in
different export clusters, otherwise only the first export will be replicated to
other clusters; other exports as well as new updates to the Service will be
ingored, until user fixes the conflicts. For example, after a member cluster
exported a Service: default/nginx
with TCP Port 80
, other clusters can only
export the same Service with the same Ports definition including Port names. At
the moment, Antrea Multi-cluster supports only IPv4 multi-cluster Services.
By default, a multi-cluster Service will use the exported Services' ClusterIPs (the
original Service ClusterIPs in the export clusters) as Endpoints. Since Antrea
v1.9.0, Antrea Multi-cluster also supports using the backend Pod IPs as the
multi-cluster Service endpoints. You can change the value of configuration option
endpointIPType
in ConfigMap antrea-mc-controller-config
from ClusterIP
to PodIP
to use Pod IPs as endpoints. All member clusters in a ClusterSet should
use the same endpoint type. Existing ServiceExports should be re-exported after
changing endpointIPType
. ClusterIP
type requires that Service CIDRs (ClusterIP
ranges) must not overlap among member clusters, and always requires Multi-cluster
Gateways to be configured. PodIP
type requires Pod CIDRs not to overlap among
clusters, and it also requires Multi-cluster Gateways when there is no direct Pod-to-Pod
connectivity across clusters. Also refer to Multi-cluster Pod-to-Pod Connectivity
for more information.
Since Antrea v1.9.0, Multi-cluster supports routing Pod traffic across clusters
through Multi-cluster Gateways. Pod IPs can be reached in all member clusters
within a ClusterSet. To enable this feature, the cluster's Pod CIDRs must be set
in ConfigMap antrea-mc-controller-config
of each member cluster and
multicluster.enablePodToPodConnectivity
must be set to true
in the antrea-agent
configuration.
Note, Pod CIDRs must not overlap among clusters to enable cross-cluster
Pod-to-Pod connectivity.
apiVersion: v1
kind: ConfigMap
metadata:
labels:
app: antrea
name: antrea-mc-controller-config
namespace: kube-system
data:
controller_manager_config.yaml: |
apiVersion: multicluster.crd.antrea.io/v1alpha1
kind: MultiClusterConfig
podCIDRs:
- "10.10.1.1/16"
kind: ConfigMap
apiVersion: v1
metadata:
name: antrea-config
namespace: kube-system
data:
antrea-agent.conf: |
featureGates:
Multicluster: true
multicluster:
enablePodToPodConnectivity: true
You can edit antrea-multicluster-member.yml,
or use kubectl edit
to change the ConfigMap:
kubectl edit configmap -n kube-system antrea-mc-controller-config
Normally, podCIDRs
should be the value of kube-controller-manager
's
cluster-cidr
option. If it's left empty, the Pod-to-Pod connectivity feature
will not be enabled. If you use kubectl edit
to edit the ConfigMap, then you
need to restart the antrea-mc-controller
Pod to load the latest configuration.
Antrea-native policies can be enforced on cross-cluster traffic in a ClusterSet.
To enable Multi-cluster NetworkPolicy features, check the Antrea Controller and
Agent ConfigMaps and make sure that enableStretchedNetworkPolicy
is set to
true
in addition to enabling the multicluster
feature gate:
kind: ConfigMap
apiVersion: v1
metadata:
name: antrea-config
namespace: kube-system
data:
antrea-controller.conf: |
featureGates:
Multicluster: true
multicluster:
enableStretchedNetworkPolicy: true # required by both egress and ingres rules
antrea-agent.conf: |
featureGates:
Multicluster: true
multicluster:
enableGateway: true
enableStretchedNetworkPolicy: true # required by only ingress rules
namespace: ""
Restricting Pod egress traffic to backends of a Multi-cluster Service (which can be on the
same cluster of the source Pod or on a different cluster) is supported by Antrea-native
policy's toServices
feature in egress rules. To define such a policy, simply put the exported
Service name and Namespace in the toServices
field of an Antrea-native policy, and set scope
of the toServices
peer to ClusterSet
:
apiVersion: crd.antrea.io/v1beta1
kind: ClusterNetworkPolicy
metadata:
name: acnp-drop-tenant-to-secured-mc-service
spec:
priority: 1
tier: securityops
appliedTo:
- podSelector:
matchLabels:
role: tenant
egress:
- action: Drop
toServices:
- name: secured-service # an exported Multi-cluster Service
namespace: svcNamespace
scope: ClusterSet
The scope
field of toServices
rules is supported since Antrea v1.10. For earlier versions
of Antrea, an equivalent rule can be written by not specifying scope
and providing the
imported Service name instead (i.e. antrea-mc-[svcName]
).
Note that the scope of policy's appliedTo
field will still be restricted to the cluster
where the policy is created in. To enforce such a policy for all role=tenant
Pods in the
entire ClusterSet, use the ClusterNetworkPolicy Replication
feature described in the later section, and set the clusterNetworkPolicy
field of
the ResourceExport to the acnp-drop-tenant-to-secured-mc-service
spec above. Such
replication should only be performed by ClusterSet admins, who have clearance of creating
ClusterNetworkPolicies in all clusters of a ClusterSet.
Antrea-native policies now support selecting ingress peers in the ClusterSet scope (since v1.10.0). Policy rules can be created to enforce security postures on ingress traffic from all member clusters in a ClusterSet:
apiVersion: crd.antrea.io/v1beta1
kind: ClusterNetworkPolicy
metadata:
name: drop-tenant-access-to-admin-namespace
spec:
appliedTo:
- namespaceSelector:
matchLabels:
role: admin
priority: 1
tier: securityops
ingress:
- action: Deny
from:
# Select all Pods in role=tenant Namespaces in the ClusterSet
- scope: ClusterSet
namespaceSelector:
matchLabels:
role: tenant
apiVersion: crd.antrea.io/v1beta1
kind: NetworkPolicy
metadata:
name: db-svc-allow-ingress-from-client-only
namespace: prod-us-west
spec:
appliedTo:
- podSelector:
matchLabels:
app: db
priority: 1
tier: application
ingress:
- action: Allow
from:
# Select all Pods in Namespace "prod-us-west" from all clusters in the ClusterSet (if the
# Namespace exists in that cluster) whose labels match app=client
- scope: ClusterSet
podSelector:
matchLabels:
app: client
- action: Deny
As shown in the examples above, setting scope
to ClusterSet
expands the
scope of the podSelector
or namespaceSelector
of an ingress peer to the
entire ClusterSet that the policy is created in. Similar to egress rules, the
scope of an ingress rule's appliedTo
is still restricted to the local cluster.
To use the ingress cross-cluster NetworkPolicy feature, the enableStretchedNetworkPolicy
option needs to be set to true
in antrea-mc-controller-config
, for each antrea-mc-controller
running in the ClusterSet. Refer to the previous section
on how to change the ConfigMap:
controller_manager_config.yaml: |
apiVersion: multicluster.crd.antrea.io/v1alpha1
kind: MultiClusterConfig
enableStretchedNetworkPolicy: true
Note that currently ingress stretched NetworkPolicy only works with the Antrea encap
traffic mode.
Since Antrea v1.6.0, Multi-cluster admins can specify certain ClusterNetworkPolicies to be replicated and enforced across the entire ClusterSet. This is especially useful for ClusterSet admins who want all clusters in the ClusterSet to be applied with a consistent security posture (for example, all Namespaces in all clusters can only communicate with Pods in their own Namespaces). For more information regarding Antrea ClusterNetworkPolicy (ACNP), please refer to this document.
To achieve such ACNP replication across clusters, admins can, in the leader
cluster of a ClusterSet, create a ResourceExport
CR of kind
AntreaClusterNetworkPolicy
which contains the ClusterNetworkPolicy spec
they wish to be replicated. The ResourceExport
should be created in the
Namespace where the ClusterSet's leader Multi-cluster Controller runs.
apiVersion: multicluster.crd.antrea.io/v1alpha1
kind: ResourceExport
metadata:
name: strict-namespace-isolation-for-test-clusterset
namespace: antrea-multicluster # Namespace that Multi-cluster Controller is deployed
spec:
kind: AntreaClusterNetworkPolicy
name: strict-namespace-isolation # In each importing cluster, an ACNP of name antrea-mc-strict-namespace-isolation will be created with the spec below
clusterNetworkPolicy:
priority: 1
tier: securityops
appliedTo:
- namespaceSelector: {} # Selects all Namespaces in the member cluster
ingress:
- action: Pass
from:
- namespaces:
match: Self # Skip drop rule for traffic from Pods in the same Namespace
- podSelector:
matchLabels:
k8s-app: kube-dns # Skip drop rule for traffic from the core-dns components
- action: Drop
from:
- namespaceSelector: {} # Drop from Pods from all other Namespaces
The above sample spec will create an ACNP in each member cluster which implements strict Namespace isolation for that cluster.
Note that because the Tier that an ACNP refers to must exist before the ACNP is applied, an importing
cluster may fail to create the ACNP to be replicated, if the Tier in the ResourceExport spec cannot be
found in that particular cluster. If there are such failures, the ACNP creation status of failed member
clusters will be reported back to the leader cluster as K8s Events, and can be checked by describing
the ResourceImport
of the original ResourceExport
:
$ kubectl describe resourceimport -A
Name: strict-namespace-isolation-antreaclusternetworkpolicy
Namespace: antrea-multicluster
API Version: multicluster.crd.antrea.io/v1alpha1
Kind: ResourceImport
Spec:
Clusternetworkpolicy:
Applied To:
Namespace Selector:
Ingress:
Action: Pass
Enable Logging: false
From:
Namespaces:
Match: Self
Pod Selector:
Match Labels:
k8s-app: kube-dns
Action: Drop
Enable Logging: false
From:
Namespace Selector:
Priority: 1
Tier: random
Kind: AntreaClusterNetworkPolicy
Name: strict-namespace-isolation
...
Events:
Type Reason Age From Message
---- ------ ---- ---- -------
Warning ACNPImportFailed 2m11s resourceimport-controller ACNP Tier random does not exist in the importing cluster test-cluster-west
In future releases, some additional tooling may become available to automate the creation of ResourceExports for ACNPs, and provide a user-friendly way to define Multi-cluster NetworkPolicies to be enforced in the ClusterSet.
If you'd like to build Multi-cluster Controller Docker image locally, you can follow the following steps:
- Go to your local
antrea
source tree, runmake build-antrea-mc-controller
, and you will get a new image namedantrea/antrea-mc-controller:latest
locally. - Run
docker save antrea/antrea-mc-controller:latest > antrea-mcs.tar
to save the image. - Copy the image file
antrea-mcs.tar
to the Nodes of your local cluster. - Run
docker load < antrea-mcs.tar
in each Node of your local cluster.
If you want to remove a member cluster from a ClusterSet and uninstall Antrea Multi-cluster, please follow the following steps.
Note: please replace kube-system
with the right Namespace in the example
commands and manifest if Antrea Multi-cluster is not deployed in
the default Namespace.
-
Delete all ServiceExports and the Multi-cluster Gateway annotation on the Gateway Nodes.
-
Delete the ClusterSet CR. Antrea Multi-cluster Controller will be responsible for cleaning up all resources created by itself automatically.
-
Delete the Antrea Multi-cluster Deployment:
kubectl delete -f https://github.com/antrea-io/antrea/releases/download/$TAG/antrea-multicluster-member.yml
If you want to delete a ClusterSet and uninstall Antrea Multi-cluster in a leader cluster, please follow the following steps. You should first remove all member clusters before removing a leader cluster from a ClusterSet.
Note: please replace antrea-multicluster
with the right Namespace in the
following example commands and manifest if Antrea Multi-cluster is not
deployed in the default Namespace.
-
Delete AntreaClusterNetworkPolicy ResourceExports in the leader cluster.
-
Verify that there is no remaining MemberClusterAnnounces.
kubectl get memberclusterannounce -n antrea-multicluster
-
Delete the ClusterSet CR. Antrea Multi-cluster Controller will be responsible for cleaning up all resources created by itself automatically.
-
Check there is no remaining ResourceExports and ResourceImports:
kubectl get resourceexports -n antrea-multicluster kubectl get resourceimports -n antrea-multicluster
Note: you can follow the Known Issue section to delete the left-over ResourceExports.
-
Delete the Antrea Multi-cluster Deployment:
kubectl delete -f https://github.com/antrea-io/antrea/releases/download/$TAG/antrea-multicluster-leader.yml
We recommend user to redeploy or update Antrea Multi-cluster Controller through
kubectl apply
. If you are using kubectl delete -f *
and kubectl create -f *
to redeploy Controller in the leader cluster, you might encounter a known issue
in ResourceExport
CRD cleanup. To avoid this issue, please delete any
ResourceExport
CRs in the leader cluster first, and make sure
kubectl get resourceexport -A
returns empty result before you can redeploy
Multi-cluster Controller.
All ResourceExports
can be deleted with the following command:
kubectl get resourceexport -A -o json | jq -r '.items[]|[.metadata.namespace,.metadata.name]|join(" ")' | xargs -n2 bash -c 'kubectl delete -n $0 resourceexport/$1'