Creating an OKE Control Plane Load Balancer Subnet (Flannel Overlay)
On Compute Cloud@Customer, part of configuring OKE requires creating a control plane security list and a control plane load balancer subnet.
Create the following resources in the order listed:
Create a Control Plane Load Balancer Security List
To create a security list, use the instructions in Creating a Security List. For Terraform input, see Example Terraform Scripts for Network Resources (Flannel Overlay).
The control plane load balancer accepts traffic on port 6443, which is also called
kubernetes_api_port
in these
instructions. Adjust this security list to only accept connections from where you
expect the network to run. Port 6443 must accept connections from the cluster
control plane instances and worker instances.
For this example, use the following input for the control plane load balancer subnet security list.
Compute Cloud@Customer Console property |
CLI property |
---|---|
|
|
Three ingress security rules: |
Three ingress security rules:
|
Ingress Rule 1:
|
Ingress Rule 1:
|
Ingress Rule 2:
|
Ingress Rule 2:
|
Ingress Rule 3:
|
Ingress Rule 3:
|
Create the Control Plane Load Balancer Subnet
To create a subnet, use the instructions in Creating a Subnet. For Terraform input, see Example Terraform Scripts for Network Resources (Flannel Overlay).
For this example, use the following input to create the control plane load balancer subnet. Use the OCID of the VCN that was created in Creating a VCN (Flannel Overlay). Create the control plane load balancer subnet in the same compartment where you created the VCN.
Create either a private or a public control plane load balancer subnet. Create a public control plane load balancer subnet to use with a public cluster. Create a private control plane load balancer subnet to use with a private cluster.
See Private Clusters for information about using Local Peering Gateways to connect a private cluster to other instances on the Compute Cloud@Customer and using Dynamic Routing Gateways to connect a private cluster to the on-premises IP address space. To create a private control plane load balancer subnet, specify one of the following route tables (see Creating a VCN (Flannel Overlay)):
-
vcn_private
-
lpg_rt
-
drg_rt
Compute Cloud@Customer Console property |
CLI property |
---|---|
|
|
The difference in the following private subnet is the VCN private route table is used instead of the public route table. Depending on your needs, you could specify the LPG route table or the DRG route table instead.
Compute Cloud@Customer Console property |
CLI property |
---|---|
|
|
What's Next: