惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

WordPress大学
WordPress大学
T
Threat Research - Cisco Blogs
D
DataBreaches.Net
Microsoft Azure Blog
Microsoft Azure Blog
D
Docker
P
Proofpoint News Feed
小众软件
小众软件
博客园 - 聂微东
freeCodeCamp Programming Tutorials: Python, JavaScript, Git & More
人人都是产品经理
人人都是产品经理
J
Java Code Geeks
Martin Fowler
Martin Fowler
L
LangChain Blog
奇客Solidot–传递最新科技情报
奇客Solidot–传递最新科技情报
李成银的技术随笔
MongoDB | Blog
MongoDB | Blog
M
MIT News - Artificial intelligence
阮一峰的网络日志
阮一峰的网络日志
Hacker News: Ask HN
Hacker News: Ask HN
C
CERT Recently Published Vulnerability Notes
H
Help Net Security
The GitHub Blog
The GitHub Blog
S
Security Archives - TechRepublic
AWS News Blog
AWS News Blog
Project Zero
Project Zero
Security Latest
Security Latest
P
Privacy International News Feed
T
Troy Hunt's Blog
钛媒体:引领未来商业与生活新知
钛媒体:引领未来商业与生活新知
cs.CV updates on arXiv.org
cs.CV updates on arXiv.org
C
CXSECURITY Database RSS Feed - CXSecurity.com
I
Intezer
酷 壳 – CoolShell
酷 壳 – CoolShell
The Hacker News
The Hacker News
I
InfoQ
P
Proofpoint News Feed
C
Cisco Blogs
aimingoo的专栏
aimingoo的专栏
T
ThreatConnect
Recorded Future
Recorded Future
P
Palo Alto Networks Blog
Hacker News - Newest:
Hacker News - Newest: "LLM"
cs.CL updates on arXiv.org
cs.CL updates on arXiv.org
V
V2EX
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
G
GRAHAM CLULEY
F
Future of Privacy Forum
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
N
News and Events Feed by Topic
Engineering at Meta
Engineering at Meta

博客园_首页

Qt Bridges for C# 深度技术解析 - 张善友 被流量逼出来的架构:从一台服务器到云原生的 17 次蜕变 —— 集群、缓存、MQ、微服务、Docker、K8S 的前世今生 Claude Code安装全流程 Windows保姆级教程 awk 命令练习(从入门到进阶) Java + Spring实现Hermes Agent之龙虾、Skills、Mcp和沙箱代码执行环境思路 轨迹的蓝图:方程求解与交点计算 Agent新技术分享-Forge论文已被ACM接受 PowerMem 记忆系统的遗忘设计,从神经元到代码工程 我用了FastApiAdmin后,连夜把踩过的坑都整理出来了 一个程序员眼中的 AI 核心概念,讲透 LLM 、Agent 、MCP 、Skill 、RAG... 网络安全在线就能打的内网靶场推荐 & Dawn Breaker 单域靶场 WP CTF 中如何用提示词发挥大模型的最大实力:从聊天助手到大手子 PyTorch KernelAgent 源码解读 ---(6)--- Composer 高光谱拼接算法(一)扫推式成像和航带拼接算法 一文看懂fofa常用语法,告别混淆,精准打击! 从零搭建量化投资系统:用 Qlib 一行代码搞定均线分析 企业 AI 落地,第一件事不是买模型,而是建好企业知识库 如何在Oracle Agent Factory中配置国内厂商的LLM? Codex 换模型太麻烦?这个开源桌面工具帮你一键切换 Avalonia中的动画 2026软考|十大管理超全通俗笔记,备考闭眼记! rv1126b内置phy接hub交换机芯片 React 可拖拽列宽 + 点击行选中 ProTable 封装笔记 五大实锤证据:AI不会终结低代码,只会倒逼技术进化 【硬核脑洞】16位实模式最后的疯狂:我们能否在 640KB 常规内存里手搓一个 MD 模拟器? 基于.Net的NetCoreKevin框架中AgentFramework实现AI智能体Skill和工具动态管理和加载 PostgreSQL 高可用集群 patroni 自动故障转移测试 自己使用C++开发的仿OpenClaw、Hermes智能体工具 记一次 .NET 某集群管理软件 内存暴涨分析 StarBlog番外(5) 从1.6到1.10,基于Avalonia AOT 开发的 Publisher 半年进化之路 Anthropic 把 SOC 误报率从 33% 砍到 7%,真正在干活的不是 Claude SM2演示所有 PEM 功能(生成、加解密、签名/验签) 用 Solon AI 从零构建 MCP 工具服务:让 AI Agent 拥有真实世界的能力 完整学习LLM(一):为什么我要系统学习大模型 Agent Harness Runtime 架构深度解析:工具循环、状态外置与长程任务调度 [对比学习LangChain和MAF-03]完全不同的Agent设计哲学 毫不夸张地说,这将是目前最全的AI测试教程!测试必看! AI Coding 为什么选择 TUI ,前端的新机会在哪里? 无需安装cc switch,10行命令帮你配置Claude Code+deepseek Context Engineering 到 Harness Engineering —— 大模型时代软件工程的新范式 OpenClaw.NET 兼容性目录指南(Compatibility Catalog) Nginx 上游健康检查插件 nginx-healthcheck-module 三角形数 AScript异步执行与await关键字 - rockey627 Vector Quantization for Recommendation 笔记 21. “|”不只是按位或,90%的人不知道 这 3 年做教育相关项目,我把一些经验整理成了一个开源 Agent Skills 项目 2026 西安本土 GEO 测评:灵怡云凭差异化站稳第一梯队 PortSwigger SQL注入LAB7 & LAB8 & LAB9 Splay 学习笔记 这款爆款激光粒度仪凭何全球狂销5000台?揭秘百特Bettersize2600“常青树”背后的硬核实力 十分钟学习 TypeScript 【学习笔记】《Python编程 从入门到实践》第1章学习笔记:Python环境搭建与Hello World(完整版) 初试 vibe coding:Tauri + React + Rust 构建的 windows 本地番茄钟 从 Vibecoding 入门,到 Agent 差点入土 IDEA Maven 手动替换第三方Jar包完整教程 填充与积累:积分与面积的可视化 告别 Django Admin!这个 NodeJS 全栈框架让你在 DTO 中直接配置 Table/Form 渲染 重建 AI 认知第 1 篇:基础认知——一张地图看懂 AI Landscape VAPD AgentKit:可组合 Agent 前端通用库实践 SolonCode v2026.5.21 发布,Web 能看项目,IM 能找队友 从 LangGraph 回到 Model-Tool Loop:更聪明的模型,正在让 Agent 架构重新变简单 从人工同步到自动闭环:跨 Java/.NET 代码转换工具的工程化实践 你的显卡能跑多少算子?用 55 个检查项,给 PyTorch GPU 环境做一次冒烟测试 Claude Code 快速开始 2分钟搞定全网巡检:一个脚本+五大必备 Python 库,让你一天干别人一周的活 最近面完 30 个想转 AI 测试的人,我麻了:80% 都踩了这 4 个坑! 4.3、多体交叉存储器、Cache的基本原理、相联存储器、 Cache地址映射与变换方法 简译项目的项目落地 OpenClaw Dreaming 记忆流水线底层架构:状态分层、证据留痕与检索回流 .NET 10 桌面 UI 框架的范式演进:Jalium.UI 与 MewUI 架构深度对比 [对比学习LangChain和MAF-02]基本编程模式的差异(下篇) 我的编程经历,从天桥地摊Basic到西藏阿里的.Net AOT。(续二) House of botcake与IOFILE任意读写 Markdown锚点跳转失败的解决办法 力扣之路01—两数之和 "Sample Is Feature: Beyond Item-Level, Toward Sample-Level Tokens for Unified Large Recommender Models" 论文笔记 拒绝宕机!用 Python 优雅榨干百万级 GIS 点矢量的裁剪极限 PyTorch KernelAgent 源码解读 ---(5)--- Dispatcher LIS续:动态规划 Windows端安装perry.ts 20. AI大模型输出转JSON,原来这么简单! 龙芯2k0300 - 智能车走马观碑组目标检测算法(下) Windows 应用自动上架 Microsoft Store 的自动化实践 很多企业做了 SBOM,为什么依然管不住依赖? 近 3 年浙江事业单位进面分一览,查分前心里有数! 详解 Docker 环境变量技术,以及如何通过环境变量一键部署客服系统 Claude Code 扩展体系 别让AI再从零写一堆优美的屎山了 A 股回测中的复权与 Point-in-Time 偏差:一次数据泄露的工程复盘 一文理清 HarmonyOS 6.0.2 涵盖的十个升级点 深度学习进阶(二十四)Swin 的二维 RPE Codex CLI 完全使用手册:从入门到精通 一次线上故障带你看懂 MySQL InnoDB 缓冲池 Rocky9.3 UEFI 引导崩溃解决办法 盘古石2026计算机pc手搓复现wp(刘洋加黄志远) 告别 Typora 后的新欢:我把所有笔记迁移到了 Obsidian 这个“第二大脑” 2026 高效客户管理系统,提升企业管理效率实现翻倍增长 11.3、网络身份认证的过程、数字签名、秘钥分发中心(KDC)、公钥认证中心(CA)、安全电子邮件 智驾仿真测试团队必看:ADAS HiL测试引入3DGS的ROI测算与结论!
Multus 多网卡方案:IPVLAN 模式
怎么还在写代码 · 2026-05-23 · via 博客园_首页

模式介绍

Multus 项目地址:https://github.com/k8snetworkplumbingwg/multus-cni

Whereabouts 项目地址:https://github.com/k8snetworkplumbingwg/whereabouts

CNI(容器网络接口)是云原生计算基金会(CNCF)的一个项目,它包含一套规范及开发库。通过 CNI 编写网络插件用于配置容器网络,同时 CNI 本身也供了一系列现成的插件。CNI 仅专注于容器的网络连通性,以及在容器被删除时清理已分配的网络资源。正是由于这种专注性,它获得了广泛的支持和易于实现的规范。

IPVLAN 就是 CNI 自带的网络插件之一,它也对宿主机的网络接口进行了虚拟化,所有 IPVLAN 设备共享同一个 MAC 地址。

# 在 ns0 与 ns1 两个网络空间中,他们的网卡设备 ipvl0/ipvl1 ip 不一致,但 MAC 地址均与 host1 主机 eth0 相同

+=============================================================+
|  Host: host1                                                |
|                                                             |
|   +----------------------+      +----------------------+    |
|   |   NS:ns0             |      |  NS:ns1              |    |
|   |                      |      |                      |    |
|   |                      |      |                      |    |
|   |        ipvl0         |      |         ipvl1        |    |
|   +----------#-----------+      +-----------#----------+    |
|              #                              #               |
|              ################################               |
|                              #                              |
|                              #                              |
|                              # eth0                         |
+=============================================================+

image

Multus CNI 允许将多个网络接口连接到 K8s Pod 中。在安装他之前,K8s 集群必须安装一个默认的 CNI 插件,例如 Flannel、Calico 等。

部署流程

通过 Kind 快速生成集群并部署 Multus CNI + Whereabouts IPAM

主脚本

#!/bin/bash

set -v

# 1.kind 创建集群时关闭默认 CNI 部署
cat << EOF | HTTP_PROXY= HTTPS_PROXY= http_proxy= https_proxy= kind create cluster --name=cni-multus --image=kindest/node:v1.27.3 --config=-
kind: Cluster
apiVersion: kind.x-k8s.io/v1alpha4
networking:
  disableDefaultCNI: true
nodes:
  - role: control-plane
  - role: worker
  - role: worker
EOF

# 2.remove taints
kubectl taint nodes $(kubectl get nodes -o name | grep control-plane) node-role.kubernetes.io/control-plane:NoSchedule-

# 3. install CNI
kubectl apply -f ./k8snetworkplumbingwg

K8snetworkplumbingwg 目录内容

Calico CNI

部署 Calico v3.31.5 示例(IPIP)作为集群默认 CNI:

            # Cluster type to identify the deployment type
            - name: CLUSTER_TYPE 
              value: "k8s,bgp"
            # Auto-detect the BGP IP address.
            - name: IP
              value: "autodetect" 
            # Enable IPIP 
            - name: CALICO_IPV4POOL_IPIP
              value: "Always"
            # Enable or Disable VXLAN on the default IP pool.
            - name: CALICO_IPV4POOL_VXLAN
              value: "Never"
            # Enable or Disable VXLAN on the default IPv6 IP pool.
            - name: CALICO_IPV6POOL_VXLAN
              value: "Never"

Multus

使用"厚插件(Thick)"形式部署 Multus。与薄插件(Thin)两种部署方式对比:

  • 薄插件:每次创建/删除 Pod 时,直接调用 /opt/cni/bin/multus 二进制文件。每次调用都是一个独立进程,日志分散在 kubelet 中,不方便排查问题、且没有 Metrics 指标;
  • 厚插件:拆成了两个进程 shimdaemon。日志集中在 daemon 中统一管理、且通过 daemon 暴露 Metrics 指标。
    • Shim:客户端,k8s 调用 shim 后,会通过绑定挂载到主机文件系统的 Unix 域套接字与 daemon 通信;
    • Daemon:服务端,负责执行所有繁重的拉取操作,读取 CRD、计算配置、调用 delegate 插件等。
┌─────────┐             ┌───────┐           ┌────────┐             ┌──────────┐
│         │ cni ADD/DEL │       │ REST POST │        │ cni ADD/DEL │          │
│ runtime ├────────────►│ shim  │===========│ daemon ├────────────►│ delegate │
│         │<------------│       │           │        │<------------│          │
└─────────┘             └───────┘           └────────┘             └──────────┘

按照上面引用的 GitHub 仓库地址中提供的部署方式部署即可。

Whereabouts

Multus CNI 的 IPAM 地址管理插件。按照 GitHub 仓库中提供的一键部署方式部署即可

查看部署结果

root@network-demo:~# kubectl get node -o wide
NAME                       STATUS   ROLES           AGE     VERSION   INTERNAL-IP
cni-multus-control-plane   Ready    control-plane   4m56s   v1.27.3   172.18.0.4
cni-multus-worker          Ready    <none>          4m31s   v1.27.3   172.18.0.3
cni-multus-worker2         Ready    <none>          4m33s   v1.27.3   172.18.0.2

root@network-demo:~# kubectl get pods -A -o wide
NAMESPACE            NAME                                 READY   STATUS    RESTARTS   AGE     IP               NODE
kube-system          calico-kube-controllers-547c488cf5   1/1     Running   0          4m31s   10.244.226.132   cni-multus-control-plane
kube-system          calico-node-5lgrw                    1/1     Running   0          4m31s   172.18.0.4       cni-multus-control-plane
kube-system          calico-node-7fk72                    1/1     Running   0          4m31s   172.18.0.3       cni-multus-worker
kube-system          calico-node-t67s5                    1/1     Running   0          4m31s   172.18.0.2       cni-multus-worker2
kube-system          coredns-5d78c9869d-p874p             1/1     Running   0          4m40s   10.244.226.131   cni-multus-control-plane
kube-system          coredns-5d78c9869d-z6bcj             1/1     Running   0          4m40s   10.244.226.130   cni-multus-control-plane
kube-system          etcd-cni-multus                      1/1     Running   0          4m55s   172.18.0.4       cni-multus-control-plane
kube-system          kube-apiserver-cni-multus            1/1     Running   0          4m55s   172.18.0.4       cni-multus-control-plane
kube-system          kube-controller-manager-cni-multus   1/1     Running   0          4m56s   172.18.0.4       cni-multus-control-plane
kube-system          kube-multus-ds-6nvfz                 1/1     Running   0          4m31s   172.18.0.2       cni-multus-worker2
kube-system          kube-multus-ds-hn6gj                 1/1     Running   0          4m31s   172.18.0.3       cni-multus-worker
kube-system          kube-multus-ds-r8qfk                 1/1     Running   0          4m31s   172.18.0.4       cni-multus-control-plane
kube-system          kube-proxy-4vfdj                     1/1     Running   0          4m35s   172.18.0.2       cni-multus-worker2
kube-system          kube-proxy-cz8sl                     1/1     Running   0          4m40s   172.18.0.4       cni-multus-control-plane
kube-system          kube-proxy-q9hv5                     1/1     Running   0          4m33s   172.18.0.3       cni-multus-worker
kube-system          kube-scheduler-cni-multus            1/1     Running   0          4m55s   172.18.0.4       cni-multus-control-plane
kube-system          whereabouts-98fn6                    1/1     Running   0          4m31s   172.18.0.3       cni-multus-worker
kube-system          whereabouts-tqnqk                    1/1     Running   0          4m31s   172.18.0.4       cni-multus-control-plane
kube-system          whereabouts-xfbgj                    1/1     Running   0          4m31s   172.18.0.2       cni-multus-worker2

root@network-demo:~# kubectl get crd network-attachment-definitions.k8s.cni.cncf.io
NAME                                             CREATED AT
network-attachment-definitions.k8s.cni.cncf.io   2026-05-23T00:58:25Z

创建测试 Pod

先通过 Multus CNI 使用 NetworkAttachmentDefinition CRD 创建 Pod 附加网络模板后,在生成 Pod 时引用对应模板:

#!/bin/bash

set -v 

controller_node=`kubectl get nodes --no-headers  -o custom-columns=NAME:.metadata.name| grep control-plane`
worker_node=`kubectl get nodes --no-headers  -o custom-columns=NAME:.metadata.name| grep worker2`

cat <<EOF | kubectl apply -f -
apiVersion: "k8s.cni.cncf.io/v1"
kind: NetworkAttachmentDefinition
metadata:
  name: ipvlanl2-whereabouts-conf
spec:
  config: '{
      "cniVersion": "0.3.0",
      "name": "whereaboutsexample",
      "type": "ipvlan",
      "mode": "l2",
      "master": "eth0",
      "ipam": {
        "type": "whereabouts",
        "range": "172.18.0.200-172.18.0.205/24"
      }
    }'
EOF

cat << EOF | kubectl apply -f -
apiVersion: v1
kind: Pod
metadata:
  name: ipvlan-pod1
  annotations:
    k8s.v1.cni.cncf.io/networks: ipvlanl2-whereabouts-conf@eth1
spec:
  containers:
  - name: nettool
    image: burlyluo/nettool:latest
    securityContext:
      privileged: false
      capabilities:
        add: ["NET_ADMIN"]
  nodeName: ${controller_node}
EOF

cat << EOF | kubectl apply -f -
apiVersion: v1
kind: Pod
metadata:
  name: ipvlan-pod-x
  annotations:
    k8s.v1.cni.cncf.io/networks: ipvlanl2-whereabouts-conf@eth1
spec:
  containers:
  - name: nettool
    image: burlyluo/nettool:latest
    securityContext:
      privileged: false
      capabilities:
        add: ["NET_ADMIN"]
  nodeName: ${controller_node}
EOF

cat << EOF | kubectl apply -f -
apiVersion: v1
kind: Pod
metadata:
  name: ipvlan-pod2
  annotations:
    k8s.v1.cni.cncf.io/networks: ipvlanl2-whereabouts-conf@eth1
spec:
  containers:
  - name: nettool
    image: burlyluo/nettool:latest
    securityContext:
      privileged: false
      capabilities:
        add: ["NET_ADMIN"]
  nodeName: ${worker_node}
EOF

问题解决

创建测试 Pod 后,可能会一直卡在 ContainerCreating 状态,通过 describe pod 发现创建流程中的关键报错 failed to find plugin "ipvlan" in path [/opt/cni/bin],这是因为 kind 创建 k8s 集群时的基础镜像中没有包含 IPVLAN 这个 CNI 插件。在主机上手动拉一下 CNI 包解压到几个 k8s node 容器中即可修复:

root@network-demo:~# kubectl get pods -o wide
NAME           READY   STATUS              RESTARTS   AGE    IP       NODE
ipvlan-pod-x   0/1     ContainerCreating   0          103s   <none>   cni-multus-control-plane
ipvlan-pod1    0/1     ContainerCreating   0          103s   <none>   cni-multus-control-plane
ipvlan-pod2    0/1     ContainerCreating   0          102s   <none>   cni-multus-worker2

root@network-demo:~# kubectl describe pods ipvlan-pod-x | grep -A4 'Events'
Events:
  Type     Reason                  Age   From     Message
  ----     ------                  ----  ----     -------
  Normal   AddedInterface          110s  multus   Add eth0 [10.244.226.134/32] from k8s-pod-network
  Warning  FailedCreatePodSandBox  109s  kubelet  Failed to create pod sandbox: rpc error: code = Unknown desc = failed to setup network for sandbox "31265d3618de74e470e1a39c0670a463566a99176cbb3c7774d56589c81ba3a2": plugin type="multus-shim" name="multus-cni-network" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:"31265d3618de74e470e1a39c0670a463566a99176cbb3c7774d56589c81ba3a2" Netns:"/var/run/netns/cni-6db962c0-2e51-298e-9cbd-8599f6f18e71" IfName:"eth0" Args:"K8S_POD_NAME=ipvlan-pod-x;K8S_POD_INFRA_CONTAINER_ID=31265d3618de74e470e1a39c0670a463566a99176cbb3c7774d56589c81ba3a2;K8S_POD_UID=e8872b13-c212-4b3b-9158-794adf3a8527;IgnoreUnknown=1;K8S_POD_NAMESPACE=default" Path:"" ERRORED: error configuring pod [default/ipvlan-pod-x] networking: [default/ipvlan-pod-x/e8872b13-c212-4b3b-9158-794adf3a8527:whereaboutsexample]: error adding container to network "whereaboutsexample": failed to find plugin "ipvlan" in path [/opt/cni/bin]
': StdinData: {"capabilities":{"portMappings":true},"clusterNetwork":"/host/etc/cni/net.d/10-calico.conflist","cniVersion":"0.3.1","logLevel":"verbose","logToStderr":true,"name":"multus-cni-network","type":"multus-shim"}
root@network-demo:~# wget https://github.com/containernetworking/plugins/releases/download/v1.9.1/cni-plugins-linux-amd64-v1.9.1.tgz

root@network-demo:~# tar tf cni-plugins-linux-amd64-v1.9.1.tgz
./
./sbr
./tap
./dhcp
./dummy
./bridge
./host-device
./README.md
./LICENSE
./static
./portmap
./host-local
./firewall
./tuning
./vlan
./ptp
./macvlan
./loopback
./ipvlan
./vrf
./bandwidth

root@network-demo:~# for node in $(docker ps --format '{{.Names}}' | grep 'cni-multus'); do
  docker cp cni-plugins-linux-amd64-v1.9.1.tgz ${node}:/
  docker exec ${node} tar -C /opt/cni/bin/ -xzf /cni-plugins-linux-amd64-v1.9.1.tgz --no-same-owner ./ipvlan
  docker exec ${node} rm -rf /cni-plugins-linux-amd64-v1.9.1.tgz
  echo "${node} done"
done

验证效果

查看测试 Pod 创建流程

通过 Pod 事件信息看出,由集群默认 CNI Calico 生成了 eth0 网卡,然后 Multus CNI 通过 NetworkAttachmentDefinition CRD 配置生成了 IPVLAN 模式的 eth1 网卡:

root@network-demo:~# kubectl get pods -o wide
NAME           READY   STATUS    RESTARTS   AGE   IP               NODE
ipvlan-pod-x   1/1     Running   0          18m   10.244.228.174   cni-multus-control-plane
ipvlan-pod1    1/1     Running   0          18m   10.244.228.175   cni-multus-control-plane
ipvlan-pod2    1/1     Running   0          18m   10.244.4.89      cni-multus-worker2


root@network-demo:~# kubectl describe pods ipvlan-pod-x | grep -A8 'Events'
Events:
  Type    Reason          Age   From     Message
  ----    ------          ----  ----     -------
  ## 通过创建流程可以看出,eth0 网卡是通过集群默认 CNI Calico 生成的
  Normal  AddedInterface  10s   multus   Add eth0 [10.244.228.176/32] from k8s-pod-network
  ## 而 eth1 网卡则是通过 IPVLAN 读取 NetworkAttachmentDefinition 配置生成的
  Normal  AddedInterface  9s    multus   Add eth1 [172.18.0.200/24] from default/ipvlanl2-whereabouts-conf
  Normal  Pulling         9s    kubelet  Pulling image "burlyluo/nettool:latest"
  Normal  Pulled          9s    kubelet  Successfully pulled image "burlyluo/nettool:latest" in 205.281392ms (205.292364ms including waiting)
  Normal  Created         9s    kubelet  Created container nettool
  Normal  Started         9s    kubelet  Started container nettool

查看 Pod 子网卡与 Node 父网卡信息

以 control-plane 节点中的父网卡 eth0 与其上两个 Pod 子网卡信息为例,可以发现他们的 MAC 地址是一致的:

## Pod-x 子网卡信息
root@network-demo:~# kubectl exec -it ipvlan-pod-x -- ip address show eth1
4: eth1@if3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UNKNOWN group default qlen 1000
    link/ether a6:7c:81:af:f4:be brd ff:ff:ff:ff:ff:ff link-netnsid 0
    inet 172.18.0.200/24 brd 172.18.0.255 scope global eth1
       valid_lft forever preferred_lft forever
root@network-demo:~# kubectl exec -it ipvlan-pod-x -- ip -d link show eth1
4: eth1@if3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/ether a6:7c:81:af:f4:be brd ff:ff:ff:ff:ff:ff link-netnsid 0 promiscuity 0 minmtu 68 maxmtu 65535 
    ipvlan  mode l2 bridge addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535

## Control-plane 节点父网卡信息
root@network-demo:~# docker exec -it cni-multus-control-plane ip address show eth0
3: eth0@if26: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default 
    link/ether a6:7c:81:af:f4:be brd ff:ff:ff:ff:ff:ff link-netnsid 0
    inet 172.18.0.4/16 brd 172.18.255.255 scope global eth0
       valid_lft forever preferred_lft forever
root@network-demo:~# docker exec -it cni-multus-control-plane ip -d link show eth0
3: eth0@if26: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP mode DEFAULT group default 
    link/ether a6:7c:81:af:f4:be brd ff:ff:ff:ff:ff:ff link-netnsid 0 promiscuity 0 minmtu 68 maxmtu 65535 
    veth addrgenmode eui64 numtxqueues 8 numrxqueues 8 gso_max_size 65536 gso_max_segs 65535

## Pod-1 子网卡信息
root@network-demo:~# kubectl exec -it ipvlan-pod1 -- ip address show eth1
4: eth1@if3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UNKNOWN group default qlen 1000
    link/ether a6:7c:81:af:f4:be brd ff:ff:ff:ff:ff:ff link-netnsid 0
    inet 172.18.0.202/24 brd 172.18.0.255 scope global eth1
       valid_lft forever preferred_lft forever
root@network-demo:~# kubectl exec -it ipvlan-pod1 -- ip -d link show eth1
4: eth1@if3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/ether a6:7c:81:af:f4:be brd ff:ff:ff:ff:ff:ff link-netnsid 0 promiscuity 0 minmtu 68 maxmtu 65535 
    ipvlan  mode l2 bridge addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535

同节点 Pod 请求抓包

Pod-x(10.244.228.176)请求 Pod-1(10.244.228.175)

1.查询 Pod 路由表、ARP 邻居表

root@network-demo:~# kubectl exec -it ipvlan-pod-x -- ip route show
default via 169.254.1.1 dev eth0
169.254.1.1 dev eth0 scope link
172.18.0.0/24 dev eth1 proto kernel scope link src 172.18.0.200

## ARP 表是请求后看的
root@network-demo:~# kubectl exec -it ipvlan-pod-x -- ip neighbor show
169.254.1.1 dev eth0 lladdr ee:ee:ee:ee:ee:ee STALE
172.18.0.202 dev eth1 lladdr a6:7c:81:af:f4:be STALE
10.244.228.175 dev eth1 lladdr a6:7c:81:af:f4:be STALE
10.244.226.128 dev eth0 lladdr ee:ee:ee:ee:ee:ee STALE
root@network-demo:~#

2.查询 Node 节点路由表、ARP 邻居表

root@network-demo:~# docker exec cni-multus-control-plane ip route show
default via 172.18.0.1 dev eth0
10.244.2.64/26 via 172.18.0.2 dev tunl0 proto bird onlink
10.244.4.64/26 via 172.18.0.2 dev tunl0 proto bird onlink
10.244.171.0/26 via 172.18.0.3 dev tunl0 proto bird onlink
blackhole 10.244.226.128/26 proto bird
10.244.226.129 dev cali65d6a29e132 scope link
10.244.226.130 dev calibbcace8eb36 scope link
10.244.226.131 dev calife013ec3a25 scope link
10.244.226.132 dev cali36b0b7ed002 scope link
blackhole 10.244.228.128/26 proto bird
## 同节点 Pod 之间请求直接走 Pod-1 的 calic903a597e8b veth pair 设备转发了
10.244.228.175 dev calic903a597e8b scope link
10.244.228.176 dev calic46f11b893d scope link
172.18.0.0/16 dev eth0 proto kernel scope link src 172.18.0.4

root@network-demo:~# docker exec cni-multus-control-plane ip neighbor show
10.244.228.176 dev calic46f11b893d lladdr a2:6a:47:6d:d3:15 STALE
10.244.226.132 dev cali36b0b7ed002 lladdr be:9d:a8:51:65:77 REACHABLE
172.18.0.2 dev eth0 lladdr aa:18:7e:65:a2:af REACHABLE
10.244.226.130 dev calibbcace8eb36 lladdr ae:79:98:32:49:98 REACHABLE
10.244.226.129 dev cali65d6a29e132 lladdr f2:c1:bc:28:d4:7f REACHABLE
172.18.0.1 dev eth0 lladdr 46:e0:1c:d1:1e:e0 STALE
10.244.226.131 dev calife013ec3a25 lladdr 0a:35:d1:7b:bc:ba REACHABLE
172.18.0.3 dev eth0 lladdr ae:66:81:13:7d:ee REACHABLE
10.244.228.175 dev calic903a597e8b lladdr 0e:c0:f7:6e:35:63 STALE

3.同节点 Pod 请求

root@network-demo:~# kubectl exec -it ipvlan-pod-x -- ping -I eth1 -c2 10.244.228.175
PING 10.244.228.175 (10.244.228.175): 56 data bytes
64 bytes from 10.244.228.175: seq=0 ttl=64 time=0.137 ms
64 bytes from 10.244.228.175: seq=1 ttl=64 time=0.091 ms

--- 10.244.228.175 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max = 0.091/0.114/0.137 ms

这里可能会有疑问:eth1 并没有去 10.244.228.175 的路由,那他是怎么发出去的?

  1. 因为 eth1 是一个子网卡,挂在 Control-Plane 节点 eth0 父网卡下。创建 NetworkAttachmentDefinition 模板时使用 IPVLAN 模式,从子网卡 eth1 发出的包都会由 eth0 父网卡响应;
  2. 从下面抓包可以看出,ARP 广播怎么去 10.244.228.175 时,响应的 MAC 地址是父网卡 MAC。所以请求压根没走默认 CNI 的 eth0 --> calixxx 这条路,在 veth pair 上是抓不到包的;
  3. 请求由父网卡 eth0 进入主机后,再进行路由匹配 10.244.228.175 dev calic903a597e8b lladdr 0e:c0:f7:6e:35:63 STALE 由 Pod-1 的 veth pair 发给 Pod-1。
root@network-demo:~# kubectl exec -it ipvlan-pod-x -- tcpdump -pnei eth1

02:36:14.450486 a6:7c:81:af:f4:be > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: Request who-has 10.244.228.175 tell 172.18.0.200, length 28
02:36:14.450511 a6:7c:81:af:f4:be > a6:7c:81:af:f4:be, ethertype ARP (0x0806), length 42: Reply 10.244.228.175 is-at a6:7c:81:af:f4:be, length 28
02:36:14.450513 a6:7c:81:af:f4:be > a6:7c:81:af:f4:be, ethertype IPv4 (0x0800), length 98: 172.18.0.200 > 10.244.228.175: ICMP echo request, id 41, seq 0, length 64
02:36:14.450569 a6:7c:81:af:f4:be > a6:7c:81:af:f4:be, ethertype IPv4 (0x0800), length 98: 10.244.228.175 > 172.18.0.200: ICMP echo reply, id 41, seq 0, length 64
02:36:15.450654 a6:7c:81:af:f4:be > a6:7c:81:af:f4:be, ethertype IPv4 (0x0800), length 98: 172.18.0.200 > 10.244.228.175: ICMP echo request, id 41, seq 1, length 64
02:36:15.450708 a6:7c:81:af:f4:be > a6:7c:81:af:f4:be, ethertype IPv4 (0x0800), length 98: 10.244.228.175 > 172.18.0.200: ICMP echo reply, id 41, seq 1, length 64

如果在父网卡 eth0 抓包,会发现只有 request 没有 response。这是因为请求到了 Pod-1 响应时,直接走了 Pod-1 中的 eth1 网卡,没有再通过主机 eth0 这个父网卡转发

root@network-demo:~# docker exec -it cni-multus-control-plane tcpdump -pnei eth0 icmp

05:33:05.028947 a6:7c:81:af:f4:be > a6:7c:81:af:f4:be, ethertype IPv4 (0x0800), length 98: 172.18.0.200 > 10.244.228.175: ICMP echo request, id 150, seq 0, length 64
05:33:06.029084 a6:7c:81:af:f4:be > a6:7c:81:af:f4:be, ethertype IPv4 (0x0800), length 98: 172.18.0.200 > 10.244.228.175: ICMP echo request, id 150, seq 1, length 64
root@network-demo:~# kubectl exec -it pods/ipvlan-pod1 -- ip route show
default via 169.254.1.1 dev eth0 
169.254.1.1 dev eth0 scope link 
172.18.0.0/24 dev eth1 proto kernel scope link src 172.18.0.202 

root@network-demo:~# kubectl exec -it pods/ipvlan-pod1 -- ip neighbor show
169.254.1.1 dev eth0 lladdr ee:ee:ee:ee:ee:ee STALE
172.18.0.200 dev eth1 lladdr a6:7c:81:af:f4:be STALE
10.244.226.128 dev eth0 lladdr ee:ee:ee:ee:ee:ee STALE