Romana is a network and security automation solution for cloud native applications.
- Romana automates the creation of isolated cloud native networks and secures applications with a distributed firewall that applies access control policies consistently across all endpoints (pods or VMs) and services, wherever they run.
- Through Romana's topology aware IPAM, endpoints receive natively routable addresses: No overlays or tunnels are required, increasing performance and providing operational simplicity.
- Because IP addresses are assigned with network topology in mind, routes within the network are highly aggregated, reducing the impact on networking hardware, and allowing more secure configurations.
- Supports Kubernetes and OpenStack clusters, on premise or on AWS.
To get started with Romana on Kubernetes, go here.
For OpenStack installations, please contact us by email or on Slack.
We are working on more detailed documentation to cover all the features and installation methods. Reach out to the team via email, Slack or GitHub if you need some help in the meantime.
- Romana core concepts and terminology: Find out how Romana is different and how it accomplishes simplified routing for endpoints.
- Romana's topology configuration: Explanation and examples of how to configure Romana for different networking environments.
- Romana VIPs: External IPs for Kubernetes clusters, managed by Romana with automatic failover.
- Romana DNS: How to setup DNS for Romana VIPs.
- Romana network policies: Introduction to Romana network policies.
- Romana route publisher: In routed L3 networks, the route publisher announces the necessary routes either via BGP or OSPF.
Visit http://romana.readthedocs.io/ for the complete documentation.
This repository contains the documentation and installation tools for the Romana project. You can find the application code in the core repository.
Latest stable release: 2.0
- By email: [email protected]
- On the Romana Slack. Please request an invite by email.
- On GitHub, just open an issue