Creating OKE Network Resources
Learn about the required network resources for OCI Kubernetes Engine (OKE) on Compute Cloud@Customer.
The resource definitions in the following sections create a working example set of network resources for workload clusters. Use this configuration as a guide when you create these resources. You can change the values of properties such as CIDR blocks and IP addresses. Don't change the values of properties such as the network protocol, the stateful setting, or the private/public setting.
See Workload Cluster Network Ports for specific ports that must be open for specific purposes.
OKE Cluster Management Across Networks
Compute Cloud@Customer admin and data networks are configured for your environment by Oracle, when Oracle installs the Compute Cloud@Customer infrastructure in your data center.
The OKE service runs on the management nodes in the admin network, while the OKE clusters are deployed in the data network as shown in the following diagram.
The management interface of an OKE cluster is port 6443 on its load balancer public IP address. This address is assigned from the data center IP range you reserved and configured as public IPs during the Compute Cloud@Customer infrastructure installation.
Because of the network segregation, traffic from the OKE service must exit the infrastructure through the admin network, and reenter through the data network to reach the OKE cluster.
Your data center network infrastructure must allow traffic in both directions. Without the necessary firewall and routing rules, users can't deploy OKE clusters.
See Workload Cluster Network Ports for ports needed for OKE. For information about other network ports, see Network Port and Protocol Matrix.
Ways to Create the OKE Network Resources
Create the OKE network resources in one of the following ways:
- Use Terraform scripts, see Example Terraform Scripts for Network Resources.
- Configuring OKE Network Resources Individually
Both methods result in the creation of the following resources in the same compartment:
-
VCN
-
Internet gateway
-
NAT gateway
-
Route rules
-
Security lists
-
Four subnets:
-
Worker
-
Worker load balancer
-
Control plane
-
Control plane load balancer
-