Skip to content

Commit

Permalink
Clarify pod and service CIDR in firwall docs
Browse files Browse the repository at this point in the history
Mention that podCIDR and serviceCIDR networks needs to be enabled in
the firewall rules.

Signed-off-by: Natanael Copa <ncopa@mirantis.com>
  • Loading branch information
ncopa committed Nov 23, 2023
1 parent aa66a2e commit 8d25ae1
Showing 1 changed file with 4 additions and 0 deletions.
4 changes: 4 additions & 0 deletions docs/networking.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,6 +57,10 @@ One goal of k0s is to allow for the deployment of an isolated control plane, whi
| TCP | 9443 | k0s-api | controller <-> controller | k0s controller join API, TLS with token auth
| TCP | 8132 | konnectivity | worker <-> controller | Konnectivity is used as "reverse" tunnel between kube-apiserver and worker kubelets

You also need enable all traffic to and from the [podCIDR and serviceCIDR] subnets on nodes with a worker role.

[podCIDR and serviceCIDR]: configuration.md#specnetwork

## iptables

`iptables` can work in two distinct modes, `legacy` and `nftables`. k0s autodetects the mode and prefers `nftables`. To check which mode k0s is configured with check `ls -lah /var/lib/k0s/bin/`. The `iptables` link target reveals the mode which k0s selected. k0s has the same logic as other k8s components, but to ensure al component have picked up the same mode you can check via:
Expand Down

0 comments on commit 8d25ae1

Please sign in to comment.