Using Antrea

This section lists the security rules that must be implemented in the Network Security Groups (NSGs) in order to use Antrea as a CNI provider.

Control plane endpoint NSG

The Control plane Endpoint NSG will be attached to the OCI Load Balancer. The egress and ingress rules are listed below.

Control plane endpoint NSG egress rules

Destination TypeDestinationDestination PortProtocolDescription
CIDR Block10.0.0.0/296443TCPAllow HTTPS Traffic to Control plane for Kubernetes API Server access

Control plane endpoint NSG ingress rules

Source TypeSourceDestination PortProtocolDescription
CIDR Block0.0.0.0/06443TCPAllow public access to endpoint OCI Load Balancer

Control plane NSG

The OCI Compute instances running the Kubernetes Control plane components will be attached to this NSG.

Control plane NSG egress rules

Destination TypeDestinationDestination PortProtocolDescription
CIDR Block0.0.0.0/0AllALLControl plane access to Internet to pull images

Control plane NSG ingress rules

Source TypeSourceDestination PortProtocolDescription
CIDR Block10.0.0.8/296443TCPKubernetes API endpoint to Kubernetes Control plane communication
CIDR Block10.0.0.0/296443TCPControl plane to Control plane (API Server port) communication
CIDR Block10.0.64.0/206443TCPWorker Node to Kubernetes Control plane (API Server port)communication
CIDR block10.0.0.0/2910250TCPControl Plane to Control Plane Kubelet Communication
CIDR Block10.0.0.0/292379TCPetcd client communication
CIDR Block10.0.0.0/292380TCPetcd peer communication
CIDR Block10.0.0.0/2910349TCPAntrea Service
CIDR Block10.0.64.0/2010349TCPAntrea Service
CIDR Block10.0.0.0/296081UDPGeneve Service
CIDR Block10.0.64.0/206081UDPGeneve Service
CIDR Block10.0.0.0/16ICMP Type 3, Code 4Path discovery
CIDR Block0.0.0.0/022TCPInbound SSH traffic to Control plane nodes

Worker NSG

The OCI Compute instances which running as Kubernetes worker nodes will be attached to this NSG.

Worker NSG egress rules

Destination TypeDestinationDestination PortProtocolDescription
CIDR Block0.0.0.0/0AllAllWorker Nodes access to Internet to pull images

Worker NSG ingress rules

Source TypeSourceDestination PortProtocolDescription
CIDR Block10.0.0.32/2732000-32767TCPAllow incoming traffic from service load balancers (NodePort Communication)
CIDR Block10.0.0.0/2910250TCPControl plane to worker node (Kubelet Communication)
CIDR Block10.0.64.0/2010250TCPWorker nodes to worker node (Kubelet Communication)
CIDR Block10.0.0.0/2910349TCPAntrea Service
CIDR Block10.0.64.0/2010349TCPAntrea Service
CIDR Block10.0.0.0/296081UDPGeneve Service
CIDR Block10.0.64.0/206081UDPGeneve Service
CIDR Block10.0.0.0/16ICMP Type 3, Code 4Path discovery
CIDR Block0.0.0.0/022TCPInbound SSH traffic to worker nodes

Service load balancers NSG

OCI load balancers created as part of Kubernetes Services of type LoadBalancer will be attached to this NSG.

Service load balancers NSG egress rules

Destination TypeDestinationDestination PortProtocolDescription
CIDR Block10.0.64.0/2032000-32767TCPAllow access to NodePort services from Service Load balancers

Service load balancers NSG ingress rules

Source TypeSourceDestination PortProtocolDescription
CIDR Block0.0.0.0/080, 443TCPAllow incoming traffic to services