Skip to content

Commit

Permalink
Update ROADMAP doc (#2079)
Browse files Browse the repository at this point in the history
Remove released features by version 1.0.0, and add a few new in roadmap.
  • Loading branch information
jianjuns authored Apr 13, 2021
1 parent de29b10 commit b791805
Showing 1 changed file with 33 additions and 23 deletions.
56 changes: 33 additions & 23 deletions ROADMAP.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,28 +14,24 @@ The following features are considered for the near future:

* **Windows support improvements**
Antrea [supports Windows K8s Node](docs/windows.md) since version 0.7.0.
However, a few features like network flow export are not supported for Windows
Node yet. We will continue to add more features for Windows, and improve Antrea
Agent and OVS installation on Windows Nodes.
However, a few features including: Egress, NodePortLocal, IPsec encryption are
not supported for Windows Node yet. We will continue to add more features for
Windows, and improve Antrea Agent and OVS installation on Windows Nodes.

* **IPv6 Pod network**
Support IPv6 and IPv4/IPv6 dual-stack for Pod network. Right now Antrea supports
only IPv4.

* **Antrea NetworkPolicy**
Antrea has started adding support for [Antrea native NetworkPolicy](docs/antrea-network-policy.md)
* **Antrea NetworkPolicy enhancements**
Antrea added support for [Antrea-native policies](docs/antrea-network-policy.md)
in addition to K8s NetworkPolicy since version 0.8.0. We already support
ClusterNetworkPolicy and tiering, and will continue to add more NetworkPolicy
extensions, like traffic logging, policy statistics, policy realization status,
more matching criteria and actions, and external endpoints.
Antrea (Namespace scoped) NetworkPolicy, ClusterNetworkPolicy, ClusterGroup, and
tiering, but will continue to add more advanced NetworkPolicy features.

* **Network diagnostics and observability**
Network diagnostics and observability is one area we want to focus on. Antrea
already implements some useful features on this front, including [Octant UI
plugin](docs/octant-plugin-installation.md), [CLI](docs/antctl.md),
[Traceflow](docs/traceflow-guide.md), [network flow export and visualization](docs/network-flow-visibility.md),
[Prometheus metrics](docs/prometheus-integration.md), [OVS flow dumping](docs/antctl.md#dumping-ovs-flows)
and [packet tracing](docs/antctl.md#ovs-packet-tracing). We will continue to
and [packet tracing](docs/antctl.md#ovs-packet-tracing), [NetworkPolicy
diagnostics](docs/antctl.md#networkpolicy-commands). We will continue to
enhance existing features and add new features to help diagnose K8s networking
and NetworkPolicy implementation, and to provide good visibility into the Antrea
network.
Expand All @@ -47,18 +43,32 @@ more IPAM strategies besides subnet per Node, like IP pool per Node or
per Namespace.

* **Egress policy**
Egress policy is to control the egress Nodes and SNAT IPs of traffic from Pods
to external network. For example, a user can request a dedicated SNAT IP per
Namespace, or for a particular set of Pods or Services. This feature is very
useful for services in the Node or external network to identify the source of
Pod traffic based on SNAT IP and enforce specific policies on the traffic. Also
check the [egress policy proposal](https://github.com/vmware-tanzu/antrea/issues/667)
to learn more.
Antrea released alpha support for [Egress](docs/feature-gates.md#egress) in
version 1.0.0. Users can choose a specific SNAT IP for a selected set of Pods
with an Egress CRD, and then the egress traffic from the Pods to external
network will be SNAT'd using the SNAT IP. This feature is very useful for
services in the Node or external network to identify the source of Pod traffic
based on SNAT IP and enforce specific policies on the traffic. However, the
Egress feature still has several major limitations which need to be addressed.
For example, today the SNAT IPs used in Egresses must be manually configured on
the Nodes, and there is no auto-failover of Egress Nodes. Also check the
[egress policy proposal](https://github.com/vmware-tanzu/antrea/issues/667) to
learn more.

* **NFV and Telco use cases**
We plan to explore and provide support for NFV and Telco use cases. Will support
Multus integration, Pod interfaces on SRIOV devices, and Network Service
Chaining.
We plan to explore and provide support for NFV and Telco use cases. We will add
native Pod multi-interface support in Antrea, and support Pod interfaces on
SRIOV devices, OVS DPDK bridge, overlay network, and Network Service Chaining.

* **K8s Node security**
So far Antrea focuses on K8s Pod networking and security, but we would like to
extend Antrea-native NetworkPolicies to cover protection of K8s Nodes too.

* **L7 security policy and visibility**
Enhance Antrea to provide application level security and visibility to K8s
workloads. This includes extending Antrea-native NetworkPolicies to support L7 /
application protocols (HTTP, DNS, etc.), and extending Antrea diagnostics and
observability features to get into application level visibility.

* **NetworkPolicy scale and performance tests**
Evaluate and benchmark the NetworkPolicy implementation performance at a large
Expand Down

0 comments on commit b791805

Please sign in to comment.