"Kubernetes imposes the following fundamental requirements on any networking implementation (barring any intentional network segmentation policies):
pods on a node can communicate with all pods on all nodes without NAT
agents on a node (e.g. system daemons, kubelet) can communicate with all pods on that node
Note: For those platforms that support Pods running in the host network (e.g. Linux):
pods in the host network of a node can communicate with all pods on all nodes without NAT"
It is clear that if the source is a hostNetwork pod, it should be able to communicate with any other pod without NAT, but is the reverse also true?
Does traffic from "normal" pods should be able to communicate with HostNetwork pods without NAT?
I realised we are not running tests to enforce the networking model, once we have clear the definition I'll add the tests to verify the behaviour, and once they are stable ask to promote them to Conformance.
[1]: https://kubernetes.io/docs/concepts/cluster-administration/networking/
[2]: https://github.com/kubernetes/kubernetes/pull/101445Hi,Quoting from the web the paragraph that describe the kubernetes networking model [1]:"Kubernetes imposes the following fundamental requirements on any networking implementation (barring any intentional network segmentation policies):
pods on a node can communicate with all pods on all nodes without NAT
agents on a node (e.g. system daemons, kubelet) can communicate with all pods on that node
Note: For those platforms that support Pods running in the host network (e.g. Linux):pods in the host network of a node can communicate with all pods on all nodes without NAT"
It is clear that if the source is a hostNetwork pod, it should be able to communicate with any other pod without NAT, but is the reverse also true?
Does traffic from "normal" pods should be able to communicate with HostNetwork pods without NAT?
I realised we are not running tests to enforce the networking model, once we have clear the definition I'll add the tests to verify the behaviour, and once they are stable ask to promote them to Conformance.
[1]: https://kubernetes.io/docs/concepts/cluster-administration/networking/
[2]: https://github.com/kubernetes/kubernetes/pull/101445
--
You received this message because you are subscribed to the Google Groups "kubernetes-sig-network" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-ne...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-network/5ef98c3a-a5ba-4e15-89f5-d68ab29fec1cn%40googlegroups.com.
Hi,Quoting from the web the paragraph that describe the kubernetes networking model [1]:"Kubernetes imposes the following fundamental requirements on any networking implementation (barring any intentional network segmentation policies):
pods on a node can communicate with all pods on all nodes without NAT
agents on a node (e.g. system daemons, kubelet) can communicate with all pods on that node
Note: For those platforms that support Pods running in the host network (e.g. Linux):pods in the host network of a node can communicate with all pods on all nodes without NAT"
It is clear that if the source is a hostNetwork pod, it should be able to communicate with any other pod without NAT, but is the reverse also true?
Does traffic from "normal" pods should be able to communicate with HostNetwork pods without NAT?
Is there a model you are thinking about where it's true in one direction and not in the other?
Although also, is "pods in the host network of a node can communicate
with all pods on all nodes without NAT" supposed to imply "when a node
connects to a pod, the pod will see that's node's 'primary node IP' as
the source IP"? (eg, more concretely, does it say that when a pod
receives a connection from its own node, that the source IP will be the
pod's pod.status.hostIP?) Because that's not true in many cases; the pod
will instead see the traffic as coming from the node's local IP on the
bridge associated with the pod network, or something like that.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-ne...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-network/678fa086-33ee-8519-f48b-3697613e1eca%40redhat.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-network/9a401b8f-385e-481b-a19a-d9fb6c879e99n%40googlegroups.com.