[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-03。"],[],[],null,["# Dataplane V2\n============\n\nDataplane V2 is a data plane for GKE and GKE clusters that\nis optimized for Kubernetes networking. This page gives an overview of what\nDataplane V2 does and how it works.\n\nIntroduction\n------------\n\nDataplane V2 provides:\n\n- A consistent user experience for networking in GKE and all GKE cluster environments. See [Availability of Dataplane V2](/anthos/clusters/docs/dataplane-v2) for information about the environments that support Dataplane V2.\n- Real-time visibility of network activity.\n- Simpler architecture that makes it easier to manage and troubleshoot clusters.\n\nDataplane V2 is based on\n[eBPF](https://ebpf.io/)\nand Linux nodes to flexibly and efficiently process network packets\nin-kernel using Kubernetes-specific metadata.\n| **Note:** For Dataplane V2 to function correctly, GKE on Azure deploys Pods such as `anetd` with elevated [RBAC permissions](https://kubernetes.io/docs/reference/access-authn-authz/authorization/#determine-the-request-verb), to your nodes, such as the ability to update or patch all Pod objects on the same node as the `anetd` Pod. These permissions are required for Dataplane V2 to interpret Kubernetes objects and program network topologies in eBPF based on your configuration.\n\nAdvantages of Dataplane V2\n--------------------------\n\n### Security\n\nKubernetes\n[Network policy](https://kubernetes.io/docs/concepts/services-networking/network-policies/)\nis always on in clusters with Dataplane V2. You don't have to install and manage\nthird-party software add-ons such as Calico to enforce network policy.\n\n### Scalability\n\nDataplane V2 is designed to improve routing in large clusters. It doesn't use\n[kube-proxy](https://kubernetes.io/docs/concepts/overview/components/#kube-proxy)\nor iptables.\n\n### Operations\n\nWhen you create a cluster with Dataplane V2, network policy logging is built in.\nTo see when your Pod objects allow and deny connections, configure the\n[logging CRD](/kubernetes-engine/docs/how-to/network-policy-logging)\non your cluster.\n\n### Consistency\n\nDataplane V2 is available and provides the same features on GKE\nand on other GKE clusters environments. See\n[Availability of Dataplane V2](/anthos/clusters/docs/dataplane-v2)\nfor more details.\n\nHow Dataplane V2 works\n----------------------\n\nAs packets arrive at a node, eBPF programs installed in the kernel decide how to\nroute and process the packets. Unlike packet processing with iptables, eBPF\nprograms can use Kubernetes-specific metadata in the packet. This lets Dataplane\nV2 efficiently process network packets in the kernel and report annotated\nactions back to user space for logging. The following diagram shows the path of\na packet through a node using Dataplane V2:\n\nThe Dataplane V2 controller on the node is called `anetd`. `anetd` is deployed\nas a [DaemonSet](https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/)\nto each node and is responsible for interpreting Kubernetes objects and\nprogramming network topologies in eBPF. The `anetd` controller replaces the\nservice routing kube-proxy and the routing it would perform in the kube-system\nnamespace.\n\nDataplane V2 on GKE clusters runs in\n[Overlay Network mode](https://en.wikipedia.org/wiki/Overlay_network). In\nthis mode, all cluster nodes form a mesh of tunnels using the\n[Geneve encapsulation protocol](https://www.redhat.com/en/blog/what-geneve).\nAll container-to-container network traffic is routed through these tunnels. The\nmain advantage of this model is that the cluster's nodes don't need to be aware\nof the underlying Azure network configuration.\n\nWhat's next\n-----------\n\n- [Configuring Network Policies on GKE Multi-Cloud](/kubernetes-engine/multi-cloud/docs/azure/how-to/network-policy)\n- Use [network policy logging](/kubernetes-engine/multi-cloud/docs/azure/how-to/network-policy-logging) to record when your cluster's [network policies](https://kubernetes.io/docs/concepts/services-networking/network-policies/) allow or deny connections to a Pod."]]