The diagram below depicts the networking architecture for a public workload cluster created in a region such as US West (Phoenix).
Each workload cluster requires an OCI Virtual Cloud Network (VCN) which houses all the resources created for the workload cluster. The default VCN has the following resources:
- A public Control plane endpoint subnet which houses an OCI Load Balancer. The load balancer acts as a reverse proxy for the Kubernetes API Server.
- A private Control plane subnet which houses the Control plane nodes. The Control plane nodes run the Kubernetes Control plane components such as the API Server and the Control plane pods.
- A public subnet which houses the service load balancers.
- A private subnet which houses the worker nodes.
Network Security Groups (NSG):
- An NSG for the Control plane endpoint (Control plane Endpoint NSG)
- An NSG for the Kubernetes Control plane nodes (Control plane NSG)
- An NSG for the service load balancers (Worker NSG)
- An NSG for the Kubernetes worker nodes (Service Load Balancers NSG)
The sections below list the security rules required for the NSGs in each of the following CNI providers:
Currently, the following providers have been tested and verified to work:
|CNI||CNI Version||Kubernetes Version||CAPOCI Version|
If you have tested an alternative CNI provider and verified it to work, please send us a PR to add it to the list. Your PR for your tested CNI provider should include the following:
- CNI provider version tested
- Documentation of NSG rules required
- A YAML template for your tested provider. See the Antrea template as an example.