Skip to content

Commit da849b4

Browse files
committed
tweak line wrappings in addons.md
1 parent 0be8d82 commit da849b4

File tree

1 file changed

+77
-23
lines changed
  • content/en/docs/concepts/cluster-administration

1 file changed

+77
-23
lines changed

content/en/docs/concepts/cluster-administration/addons.md

Lines changed: 77 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -10,42 +10,95 @@ weight: 120
1010

1111
Add-ons extend the functionality of Kubernetes.
1212

13-
This page lists some of the available add-ons and links to their respective installation instructions. The list does not try to be exhaustive.
13+
This page lists some of the available add-ons and links to their respective
14+
installation instructions. The list does not try to be exhaustive.
1415

1516
<!-- body -->
1617

1718
## Networking and Network Policy
1819

19-
* [ACI](https://www.github.com/noironetworks/aci-containers) provides integrated container networking and network security with Cisco ACI.
20-
* [Antrea](https://antrea.io/) operates at Layer 3/4 to provide networking and security services for Kubernetes, leveraging Open vSwitch as the networking data plane. Antrea is a [CNCF project at the Sandbox level](https://www.cncf.io/projects/antrea/).
21-
* [Calico](https://www.tigera.io/project-calico/) is a networking and network policy provider. Calico supports a flexible set of networking options so you can choose the most efficient option for your situation, including non-overlay and overlay networks, with or without BGP. Calico uses the same engine to enforce network policy for hosts, pods, and (if using Istio & Envoy) applications at the service mesh layer.
22-
* [Canal](https://projectcalico.docs.tigera.io/getting-started/kubernetes/flannel/flannel) unites Flannel and Calico, providing networking and network policy.
23-
* [Cilium](https://github.com/cilium/cilium) is a networking, observability, and security solution with an eBPF-based data plane. Cilium provides a simple flat Layer 3 network with the ability to span multiple clusters in either a native routing or overlay/encapsulation mode, and can enforce network policies on L3-L7 using an identity-based security model that is decoupled from network addressing. Cilium can act as a replacement for kube-proxy; it also offers additional, opt-in observability and security features. Cilium is a [CNCF project at the Incubation level](https://www.cncf.io/projects/cilium/).
24-
* [CNI-Genie](https://github.com/cni-genie/CNI-Genie) enables Kubernetes to seamlessly connect to a choice of CNI plugins, such as Calico, Canal, Flannel, or Weave. CNI-Genie is a [CNCF project at the Sandbox level](https://www.cncf.io/projects/cni-genie/).
25-
* [Contiv](https://contivpp.io/) provides configurable networking (native L3 using BGP, overlay using vxlan, classic L2, and Cisco-SDN/ACI) for various use cases and a rich policy framework. Contiv project is fully [open sourced](https://github.com/contiv). The [installer](https://github.com/contiv/install) provides both kubeadm and non-kubeadm based installation options.
26-
* [Contrail](https://www.juniper.net/us/en/products-services/sdn/contrail/contrail-networking/), based on [Tungsten Fabric](https://tungsten.io), is an open source, multi-cloud network virtualization and policy management platform. Contrail and Tungsten Fabric are integrated with orchestration systems such as Kubernetes, OpenShift, OpenStack and Mesos, and provide isolation modes for virtual machines, containers/pods and bare metal workloads.
27-
* [Flannel](https://github.com/flannel-io/flannel#deploying-flannel-manually) is an overlay network provider that can be used with Kubernetes.
28-
* [Knitter](https://github.com/ZTE/Knitter/) is a plugin to support multiple network interfaces in a Kubernetes pod.
29-
* [Multus](https://github.com/k8snetworkplumbingwg/multus-cni) is a Multi plugin for multiple network support in Kubernetes to support all CNI plugins (e.g. Calico, Cilium, Contiv, Flannel), in addition to SRIOV, DPDK, OVS-DPDK and VPP based workloads in Kubernetes.
30-
* [OVN-Kubernetes](https://github.com/ovn-org/ovn-kubernetes/) is a networking provider for Kubernetes based on [OVN (Open Virtual Network)](https://github.com/ovn-org/ovn/), a virtual networking implementation that came out of the Open vSwitch (OVS) project. OVN-Kubernetes provides an overlay based networking implementation for Kubernetes, including an OVS based implementation of load balancing and network policy.
31-
* [Nodus](https://github.com/akraino-edge-stack/icn-nodus) is an OVN based CNI controller plugin to provide cloud native based Service function chaining(SFC).
32-
* [NSX-T](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/index.html) Container Plug-in (NCP) provides integration between VMware NSX-T and container orchestrators such as Kubernetes, as well as integration between NSX-T and container-based CaaS/PaaS platforms such as Pivotal Container Service (PKS) and OpenShift.
33-
* [Nuage](https://github.com/nuagenetworks/nuage-kubernetes/blob/v5.1.1-1/docs/kubernetes-1-installation.rst) is an SDN platform that provides policy-based networking between Kubernetes Pods and non-Kubernetes environments with visibility and security monitoring.
34-
* [Romana](https://github.com/romana) is a Layer 3 networking solution for pod networks that also supports the [NetworkPolicy](/docs/concepts/services-networking/network-policies/) API.
35-
* [Weave Net](https://www.weave.works/docs/net/latest/kubernetes/kube-addon/) provides networking and network policy, will carry on working on both sides of a network partition, and does not require an external database.
20+
* [ACI](https://www.github.com/noironetworks/aci-containers) provides integrated
21+
container networking and network security with Cisco ACI.
22+
* [Antrea](https://antrea.io/) operates at Layer 3/4 to provide networking and
23+
security services for Kubernetes, leveraging Open vSwitch as the networking
24+
data plane. Antrea is a [CNCF project at the Sandbox level](https://www.cncf.io/projects/antrea/).
25+
* [Calico](https://www.tigera.io/project-calico/) is a networking and network
26+
policy provider. Calico supports a flexible set of networking options so you
27+
can choose the most efficient option for your situation, including non-overlay
28+
and overlay networks, with or without BGP. Calico uses the same engine to
29+
enforce network policy for hosts, pods, and (if using Istio & Envoy)
30+
applications at the service mesh layer.
31+
* [Canal](https://projectcalico.docs.tigera.io/getting-started/kubernetes/flannel/flannel)
32+
unites Flannel and Calico, providing networking and network policy.
33+
* [Cilium](https://github.com/cilium/cilium) is a networking, observability,
34+
and security solution with an eBPF-based data plane. Cilium provides a
35+
simple flat Layer 3 network with the ability to span multiple clusters
36+
in either a native routing or overlay/encapsulation mode, and can enforce
37+
network policies on L3-L7 using an identity-based security model that is
38+
decoupled from network addressing. Cilium can act as a replacement for
39+
kube-proxy; it also offers additional, opt-in observability and security features.
40+
Cilium is a [CNCF project at the Incubation level](https://www.cncf.io/projects/cilium/).
41+
* [CNI-Genie](https://github.com/cni-genie/CNI-Genie) enables Kubernetes to seamlessly
42+
connect to a choice of CNI plugins, such as Calico, Canal, Flannel, or Weave.
43+
CNI-Genie is a [CNCF project at the Sandbox level](https://www.cncf.io/projects/cni-genie/).
44+
* [Contiv](https://contivpp.io/) provides configurable networking (native L3 using BGP,
45+
overlay using vxlan, classic L2, and Cisco-SDN/ACI) for various use cases and a rich
46+
policy framework. Contiv project is fully [open sourced](https://github.com/contiv).
47+
The [installer](https://github.com/contiv/install) provides both kubeadm and
48+
non-kubeadm based installation options.
49+
* [Contrail](https://www.juniper.net/us/en/products-services/sdn/contrail/contrail-networking/),
50+
based on [Tungsten Fabric](https://tungsten.io), is an open source, multi-cloud
51+
network virtualization and policy management platform. Contrail and Tungsten
52+
Fabric are integrated with orchestration systems such as Kubernetes, OpenShift,
53+
OpenStack and Mesos, and provide isolation modes for virtual machines, containers/pods
54+
and bare metal workloads.
55+
* [Flannel](https://github.com/flannel-io/flannel#deploying-flannel-manually) is
56+
an overlay network provider that can be used with Kubernetes.
57+
* [Knitter](https://github.com/ZTE/Knitter/) is a plugin to support multiple network
58+
interfaces in a Kubernetes pod.
59+
* [Multus](https://github.com/k8snetworkplumbingwg/multus-cni) is a Multi plugin for
60+
multiple network support in Kubernetes to support all CNI plugins
61+
(e.g. Calico, Cilium, Contiv, Flannel), in addition to SRIOV, DPDK, OVS-DPDK and
62+
VPP based workloads in Kubernetes.
63+
* [OVN-Kubernetes](https://github.com/ovn-org/ovn-kubernetes/) is a networking
64+
provider for Kubernetes based on [OVN (Open Virtual Network)](https://github.com/ovn-org/ovn/),
65+
a virtual networking implementation that came out of the Open vSwitch (OVS) project.
66+
OVN-Kubernetes provides an overlay based networking implementation for Kubernetes,
67+
including an OVS based implementation of load balancing and network policy.
68+
* [Nodus](https://github.com/akraino-edge-stack/icn-nodus) is an OVN based CNI
69+
controller plugin to provide cloud native based Service function chaining(SFC).
70+
* [NSX-T](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/index.html) Container Plug-in (NCP)
71+
provides integration between VMware NSX-T and container orchestrators such as
72+
Kubernetes, as well as integration between NSX-T and container-based CaaS/PaaS
73+
platforms such as Pivotal Container Service (PKS) and OpenShift.
74+
* [Nuage](https://github.com/nuagenetworks/nuage-kubernetes/blob/v5.1.1-1/docs/kubernetes-1-installation.rst)
75+
is an SDN platform that provides policy-based networking between Kubernetes
76+
Pods and non-Kubernetes environments with visibility and security monitoring.
77+
* [Romana](https://github.com/romana) is a Layer 3 networking solution for pod
78+
networks that also supports the [NetworkPolicy](/docs/concepts/services-networking/network-policies/) API.
79+
* [Weave Net](https://www.weave.works/docs/net/latest/kubernetes/kube-addon/)
80+
provides networking and network policy, will carry on working on both sides
81+
of a network partition, and does not require an external database.
3682

3783
## Service Discovery
3884

39-
* [CoreDNS](https://coredns.io) is a flexible, extensible DNS server which can be [installed](https://github.com/coredns/deployment/tree/master/kubernetes) as the in-cluster DNS for pods.
85+
* [CoreDNS](https://coredns.io) is a flexible, extensible DNS server which can
86+
be [installed](https://github.com/coredns/deployment/tree/master/kubernetes)
87+
as the in-cluster DNS for pods.
4088

4189
## Visualization &amp; Control
4290

43-
* [Dashboard](https://github.com/kubernetes/dashboard#kubernetes-dashboard) is a dashboard web interface for Kubernetes.
44-
* [Weave Scope](https://www.weave.works/documentation/scope-latest-installing/#k8s) is a tool for graphically visualizing your containers, pods, services etc. Use it in conjunction with a [Weave Cloud account](https://cloud.weave.works/) or host the UI yourself.
91+
* [Dashboard](https://github.com/kubernetes/dashboard#kubernetes-dashboard)
92+
is a dashboard web interface for Kubernetes.
93+
* [Weave Scope](https://www.weave.works/documentation/scope-latest-installing/#k8s)
94+
is a tool for graphically visualizing your containers, pods, services etc.
95+
Use it in conjunction with a [Weave Cloud account](https://cloud.weave.works/)
96+
or host the UI yourself.
4597

4698
## Infrastructure
4799

48-
* [KubeVirt](https://kubevirt.io/user-guide/#/installation/installation) is an add-on to run virtual machines on Kubernetes. Usually run on bare-metal clusters.
100+
* [KubeVirt](https://kubevirt.io/user-guide/#/installation/installation) is an add-on
101+
to run virtual machines on Kubernetes. Usually run on bare-metal clusters.
49102
* The
50103
[node problem detector](https://github.com/kubernetes/node-problem-detector)
51104
runs on Linux nodes and reports system issues as either
@@ -54,6 +107,7 @@ This page lists some of the available add-ons and links to their respective inst
54107

55108
## Legacy Add-ons
56109

57-
There are several other add-ons documented in the deprecated [cluster/addons](https://git.k8s.io/kubernetes/cluster/addons) directory.
110+
There are several other add-ons documented in the deprecated
111+
[cluster/addons](https://git.k8s.io/kubernetes/cluster/addons) directory.
58112

59113
Well-maintained ones should be linked to here. PRs welcome!

0 commit comments

Comments
 (0)