Creating an OKE Control Plane Subnet (Flannel Overlay)
On Compute Cloud@Customer, part of configuring OKE requires creating external and internal access security lists and a control plane subnet.
Create the following resources in the order listed:
Create a Control Plane Security List
To create a security list, use the instructions in Creating a Security List. For Terraform input, see Example Terraform Scripts for Network Resources (Flannel Overlay).
For this example, use the following input for the control plane subnet security list. Use this configuration as a guide when you create these resources. You can change the values of properties such as CIDR blocks and IP addresses. You should not change the values of properties such as the network protocol, the stateful setting, or the private/public setting.
Compute Cloud@Customer Console property |
CLI property |
---|---|
|
|
Six ingress security rules: |
Six ingress security rules:
|
Ingress Rule 1
|
Ingress Rule 1
|
Ingress Rule 2
|
Ingress Rule 2
|
Ingress Rule 3
|
Ingress Rule 3
|
Ingress Rule 4
|
Ingress Rule 4
|
Create the Control Plane Subnet
To create a subnet, use the instructions in Creating a Subnet. For Terraform input, see Example Terraform Scripts for Network Resources (Flannel Overlay).
Use the following input to create the control plane subnet. Use the OCID of the VCN that was created in Creating a VCN (Flannel Overlay). Create the control plane subnet in the same compartment where you created the VCN.
Create either a NAT private control plane subnet or a VCN private control plane subnet. Create a NAT private control plane subnet to communicate outside the VCN.
The name of this subnet must be exactly control-plane
.
Compute Cloud@Customer Console property |
CLI property |
---|---|
|
|
Compute Cloud@Customer Console property |
CLI property |
---|---|
|
|
What's Next:
Creating an OKE Control Plane Load Balancer Subnet (Flannel Overlay)