Cloud Native 14 min read

Building Multi‑Tenant VPC Container Networks with Kube‑OVN on Edge Computing

This article explains why multi‑tenant VPC networks are essential for modern cloud‑native environments, outlines typical use cases such as public‑cloud container services, virtual‑machine workloads and finance, discusses the challenges of implementing tenant isolation in Kubernetes, and describes how the Kube‑OVN‑based solution was enhanced and deployed on edge‑computing platforms to provide strong VPC isolation, flexible IP management, and integrated load‑balancing services.

Cloud Native Technology Community
Cloud Native Technology Community
Cloud Native Technology Community
Building Multi‑Tenant VPC Container Networks with Kube‑OVN on Edge Computing

The presentation introduces the need for multi‑tenant VPC container networks, noting that early public‑cloud networks used a shared L2 model which exhausted address space and offered limited isolation, leading providers to adopt VPCs for better logical separation and address flexibility.

Key use cases driving multi‑tenant networking include public‑cloud container services that require isolated address spaces, enterprises delivering virtual‑machine workloads on Kubernetes, and financial scenarios demanding fine‑grained security, traffic control, and compliance.

Core tenant requirements are overlapping IP address spaces, independent network services per tenant (LB, NAT, EIP, DNS), and granular QoS, bandwidth, and billing controls.

Kubernetes faces several challenges for multi‑tenant networking: lack of a definitive multi‑tenant design in upstream SIGs, IP uniqueness checks, host‑to‑container communication issues with overlapping IPs, limitations of ClusterIP allocation, and the need to isolate tenant‑level services such as LB, DNS, and ACL.

In the edge‑computing context, resources are limited and a single‑cluster, hyper‑converged architecture is required. The team selected Kube‑OVN, an OVN‑based CNI, for its rich feature set and SDN capabilities, and extended it to support custom VPCs with independent three‑layer routing for strong tenant isolation.

Network isolation is enforced using Kubernetes NetworkPolicy for ACLs, while Ingress handles L7 traffic and MetalLB provides L4 load‑balancing with per‑tenant public IPs, though MetalLB cannot reuse the same IP for outbound traffic.

The enhanced solution adds VPC‑level routing, custom VPC creation, and containerized implementations of gateway, SLB, VPN, and dedicated IP services, enabling seamless migration of public‑cloud network capabilities to edge environments.

Overall, the Kube‑OVN‑based multi‑tenant VPC implementation demonstrates how cloud‑native networking can be adapted for edge scenarios, delivering strong isolation, flexible address management, and integrated load‑balancing while contributing improvements back to the open‑source project.

Cloud Nativeedge computingKubernetesmulti-tenantnetwork isolationVPCKube-OVN
Cloud Native Technology Community
Written by

Cloud Native Technology Community

The Cloud Native Technology Community, part of the CNBPA Cloud Native Technology Practice Alliance, focuses on evangelizing cutting‑edge cloud‑native technologies and practical implementations. It shares in‑depth content, case studies, and event/meetup information on containers, Kubernetes, DevOps, Service Mesh, and other cloud‑native tech, along with updates from the CNBPA alliance.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.