Skip to content

Commit e021e42

Browse files
authored
Merge pull request #31667 from mk46/remove_kubenet
Removed kubenet reference from docs
2 parents 683fc53 + 7fc8963 commit e021e42

File tree

4 files changed

+9
-38
lines changed

4 files changed

+9
-38
lines changed

content/en/docs/concepts/extend-kubernetes/compute-storage-net/network-plugins.md

Lines changed: 5 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -11,17 +11,17 @@ weight: 10
1111

1212
<!-- overview -->
1313

14-
Network plugins in Kubernetes come in a few flavors:
14+
Kubernetes {{< skew currentVersion >}} supports [Container Network Interface](https://github.com/containernetworking/cni)
15+
(CNI) plugins for cluster networking. You must use a CNI plugin that is compatible with your cluster and that suits your needs. Different plugins are available (both open- and closed- source) in the wider Kubernetes ecosystem.
1516

16-
* CNI plugins: adhere to the [Container Network Interface](https://github.com/containernetworking/cni) (CNI) specification, designed for interoperability.
17-
* Kubernetes follows the [v0.4.0](https://github.com/containernetworking/cni/blob/spec-v0.4.0/SPEC.md) release of the CNI specification.
18-
* Kubenet plugin: implements basic `cbr0` using the `bridge` and `host-local` CNI plugins
17+
You must use a CNI plugin that is compatible with the
18+
[v0.4.0](https://github.com/containernetworking/cni/blob/spec-v0.4.0/SPEC.md) release of the CNI specification.
1919

2020
<!-- body -->
2121

2222
## Installation
2323

24-
The kubelet has a single default network plugin, and a default network common to the entire cluster. It probes for plugins when it starts up, remembers what it finds, and executes the selected plugin at appropriate times in the pod lifecycle (this is only true for Docker, as CRI manages its own CNI plugins). There are two Kubelet command line parameters to keep in mind when using plugins:
24+
The kubelet has a single default network plugin, and a default network common to the entire cluster.The CRI manages its own CNI plugins. There are two Kubelet command line parameters to keep in mind when using plugins:
2525

2626
* `cni-bin-dir`: Kubelet probes this directory for plugins on startup
2727
* `network-plugin`: The network plugin to use from `cni-bin-dir`. It must match the name reported by a plugin probed from the plugin directory. For CNI plugins, this is `cni`.
@@ -129,37 +129,8 @@ metadata:
129129
...
130130
```
131131

132-
### kubenet
133-
134-
Kubenet is a very basic, simple network plugin, on Linux only. It does not, of itself, implement more advanced features like cross-node networking or network policy. It is typically used together with a cloud provider that sets up routing rules for communication between nodes, or in single-node environments.
135-
136-
Kubenet creates a Linux bridge named `cbr0` and creates a veth pair for each pod with the host end of each pair connected to `cbr0`. The pod end of the pair is assigned an IP address allocated from a range assigned to the node either through configuration or by the controller-manager. `cbr0` is assigned an MTU matching the smallest MTU of an enabled normal interface on the host.
137-
138-
The plugin requires a few things:
139-
140-
* The standard CNI `bridge`, `lo` and `host-local` plugins are required, at minimum version 0.2.0. Kubenet will first search for them in `/opt/cni/bin`. Specify `cni-bin-dir` to supply additional search path. The first found match will take effect.
141-
* Kubelet must be run with the `--network-plugin=kubenet` argument to enable the plugin
142-
* Kubelet should also be run with the `--non-masquerade-cidr=<clusterCidr>` argument to ensure traffic to IPs outside this range will use IP masquerade.
143-
* The node must be assigned an IP subnet through either the `--pod-cidr` kubelet command-line option or the `--allocate-node-cidrs=true --cluster-cidr=<cidr>` controller-manager command-line options.
144-
145-
### Customizing the MTU (with kubenet)
146-
147-
The MTU should always be configured correctly to get the best networking performance. Network plugins will usually try
148-
to infer a sensible MTU, but sometimes the logic will not result in an optimal MTU. For example, if the
149-
Docker bridge or another interface has a small MTU, kubenet will currently select that MTU. Or if you are
150-
using IPSEC encapsulation, the MTU must be reduced, and this calculation is out-of-scope for
151-
most network plugins.
152-
153-
Where needed, you can specify the MTU explicitly with the `network-plugin-mtu` kubelet option. For example,
154-
on AWS the `eth0` MTU is typically 9001, so you might specify `--network-plugin-mtu=9001`. If you're using IPSEC you
155-
might reduce it to allow for encapsulation overhead; for example: `--network-plugin-mtu=8873`.
156-
157-
This option is provided to the network-plugin; currently **only kubenet supports `network-plugin-mtu`**.
158-
159132
## Usage Summary
160133

161134
* `--network-plugin=cni` specifies that we use the `cni` network plugin with actual CNI plugin binaries located in `--cni-bin-dir` (default `/opt/cni/bin`) and CNI plugin configuration located in `--cni-conf-dir` (default `/etc/cni/net.d`).
162-
* `--network-plugin=kubenet` specifies that we use the `kubenet` network plugin with CNI `bridge`, `lo` and `host-local` plugins placed in `/opt/cni/bin` or `cni-bin-dir`.
163-
* `--network-plugin-mtu=9001` specifies the MTU to use, currently only used by the `kubenet` network plugin.
164135

165136
## {{% heading "whatsnext" %}}

content/en/docs/concepts/services-networking/dual-stack.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ The following prerequisites are needed in order to utilize IPv4/IPv6 dual-stack
4343
Kubernetes versions, refer to the documentation for that version
4444
of Kubernetes.
4545
* Provider support for dual-stack networking (Cloud provider or otherwise must be able to provide Kubernetes nodes with routable IPv4/IPv6 network interfaces)
46-
* A network plugin that supports dual-stack (such as Kubenet or Calico)
46+
* A [network plugin](/docs/concepts/extend-kubernetes/compute-storage-net/network-plugins/) that supports dual-stack networking.
4747

4848
## Configure IPv4/IPv6 dual-stack
4949

content/en/docs/setup/best-practices/node-conformance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,8 @@ To run the node conformance test, perform the following steps:
3030
Because the test framework starts a local control plane to test the kubelet,
3131
use `http://localhost:8080` as the URL of the API server.
3232
There are some other kubelet command line parameters you may want to use:
33-
* `--pod-cidr`: If you are using `kubenet`, you should specify an arbitrary CIDR
34-
to Kubelet, for example `--pod-cidr=10.180.0.0/24`.
33+
* `--pod-cidr`: The CIDR to use for pod IP addresses, only used in standalone mode.
34+
In cluster mode, this is obtained from the master. For IPv6, the maximum number of IP's allocated is 65536. For example `--pod-cidr=10.180.0.0/24`.
3535
* `--cloud-provider`: If you are using `--cloud-provider=gce`, you should
3636
remove the flag to run the test.
3737

content/en/docs/tasks/network/validate-dual-stack.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ This document shares how to validate IPv4/IPv6 dual-stack enabled Kubernetes clu
1616

1717

1818
* Provider support for dual-stack networking (Cloud provider or otherwise must be able to provide Kubernetes nodes with routable IPv4/IPv6 network interfaces)
19-
* A [network plugin](/docs/concepts/extend-kubernetes/compute-storage-net/network-plugins/) that supports dual-stack (such as Calico, Cilium or Kubenet)
19+
* A [network plugin](/docs/concepts/extend-kubernetes/compute-storage-net/network-plugins/) that supports dual-stack networking.
2020
* [Dual-stack enabled](/docs/concepts/services-networking/dual-stack/) cluster
2121

2222
{{< version-check >}}

0 commit comments

Comments
 (0)