mirror of https://github.com/docker/docs.git
Added commentary around Azure NSGs for UCP (#9612)
* Added commentary around Azure NSGs * Added reference to Pod CIDR * Adjusted for Peer Review
This commit is contained in:
parent
ac814e0344
commit
92759efdda
|
|
@ -56,6 +56,19 @@ You must meet the following infrastructure prerequisites to successfully deploy
|
||||||
needed as part of the UCP prerequisites. If you are using a separate Resource
|
needed as part of the UCP prerequisites. If you are using a separate Resource
|
||||||
Group for the networking components, the same Service Principal will need
|
Group for the networking components, the same Service Principal will need
|
||||||
`Network Contributor` access to this Resource Group.
|
`Network Contributor` access to this Resource Group.
|
||||||
|
- Kubernetes pods integrate into the underlying Azure networking stack, from
|
||||||
|
an IPAM and routing perspective with the Azure CNI IPAM module. Therefore
|
||||||
|
Azure Network Security Groups (NSG) impact pod to pod communication. End users
|
||||||
|
may expose containerized services on a range of underlying ports, resulting in
|
||||||
|
a manual process to open an NSG port every time a new containerized service is
|
||||||
|
deployed on to the platform. This would only affect workloads deployed on to
|
||||||
|
the Kubernetes orchestrator. It is advisable to have an "open" NSG between
|
||||||
|
all IPs on the Azure Subnet passed into UCP at [install time](#install-ucp).
|
||||||
|
To limit exposure, this Azure subnet should be locked down to only be used
|
||||||
|
for Container Host VMs and Kubernetes Pods. Additionally, end users can
|
||||||
|
leverage [Kubernetes Network
|
||||||
|
Policies](https://kubernetes.io/docs/concepts/services-networking/network-policies/)
|
||||||
|
to provide micro segmentation for containerized applications and services.
|
||||||
|
|
||||||
UCP requires the following information for the installation:
|
UCP requires the following information for the installation:
|
||||||
|
|
||||||
|
|
@ -207,7 +220,7 @@ addresses, from the same Azure Subnet as the hosts, for each Virtual Machine in
|
||||||
the cluster. However if you have manually attached additional IP addresses
|
the cluster. However if you have manually attached additional IP addresses
|
||||||
to the Virtual Machines (via an ARM Template, Azure CLI or Azure Portal) or you
|
to the Virtual Machines (via an ARM Template, Azure CLI or Azure Portal) or you
|
||||||
are deploying in to small Azure subnet (less than /16), an `--azure-ip-count`
|
are deploying in to small Azure subnet (less than /16), an `--azure-ip-count`
|
||||||
flag can be used at install time.
|
flag can be used at install time.
|
||||||
|
|
||||||
> Note: Do not set the `--azure-ip-count` variable to a value of less than 6 if
|
> Note: Do not set the `--azure-ip-count` variable to a value of less than 6 if
|
||||||
> you have not manually provisioned additional IP addresses for each Virtual
|
> you have not manually provisioned additional IP addresses for each Virtual
|
||||||
|
|
@ -216,7 +229,7 @@ flag can be used at install time.
|
||||||
> to the Virtual Machine's private IP address.
|
> to the Virtual Machine's private IP address.
|
||||||
|
|
||||||
Below are some example scenarios which require the `--azure-ip-count` variable
|
Below are some example scenarios which require the `--azure-ip-count` variable
|
||||||
to be defined.
|
to be defined.
|
||||||
|
|
||||||
**Scenario 1 - Manually Provisioned Addresses**
|
**Scenario 1 - Manually Provisioned Addresses**
|
||||||
|
|
||||||
|
|
@ -232,16 +245,16 @@ addresses to a custom value due to:
|
||||||
|
|
||||||
- Primarily using the Swarm Orchestrator
|
- Primarily using the Swarm Orchestrator
|
||||||
- Deploying UCP on a small Azure subnet (for example /24)
|
- Deploying UCP on a small Azure subnet (for example /24)
|
||||||
- Plan to run a small number of Kubernetes pods on each node.
|
- Plan to run a small number of Kubernetes pods on each node.
|
||||||
|
|
||||||
For example if you wanted to provision 16 addresses per virtual machine, then
|
For example if you wanted to provision 16 addresses per virtual machine, then
|
||||||
you would pass `--azure-ip-count 16` into the UCP installation command.
|
you would pass `--azure-ip-count 16` into the UCP installation command.
|
||||||
|
|
||||||
If you need to adjust this value post-installation, see
|
If you need to adjust this value post-installation, see
|
||||||
[instructions](https://docs.docker.com/ee/ucp/admin/configure/ucp-configuration-file/) on how to download the UCP
|
[instructions](https://docs.docker.com/ee/ucp/admin/configure/ucp-configuration-file/) on how to download the UCP
|
||||||
configuration file, change the value, and update the configuration via the API.
|
configuration file, change the value, and update the configuration via the API.
|
||||||
If you reduce the value post-installation, existing virtual machines will not
|
If you reduce the value post-installation, existing virtual machines will not
|
||||||
be reconciled, and you will have to manually edit the IP count in Azure.
|
be reconciled, and you will have to manually edit the IP count in Azure.
|
||||||
|
|
||||||
### Install UCP
|
### Install UCP
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -16,7 +16,7 @@ You can install UCP on-premises or on a cloud provider. Common requirements:
|
||||||
* [Docker Engine - Enterprise](/ee/supported-platforms.md) version {{ site.docker_ee_version }}
|
* [Docker Engine - Enterprise](/ee/supported-platforms.md) version {{ site.docker_ee_version }}
|
||||||
* Linux kernel version 3.10 or higher
|
* Linux kernel version 3.10 or higher
|
||||||
* [A static IP address for each node in the cluster](/ee/ucp/admin/install/plan-installation/#static-ip-addresses)
|
* [A static IP address for each node in the cluster](/ee/ucp/admin/install/plan-installation/#static-ip-addresses)
|
||||||
|
|
||||||
### Minimum requirements
|
### Minimum requirements
|
||||||
|
|
||||||
* 8GB of RAM for manager nodes
|
* 8GB of RAM for manager nodes
|
||||||
|
|
@ -59,6 +59,15 @@ indicated as the "Scope" of that port. The three scopes are:
|
||||||
- Internal: Traffic arrives from other hosts in the same cluster.
|
- Internal: Traffic arrives from other hosts in the same cluster.
|
||||||
- Self: Traffic arrives to that port only from processes on the same host.
|
- Self: Traffic arrives to that port only from processes on the same host.
|
||||||
|
|
||||||
|
> Note
|
||||||
|
>
|
||||||
|
> When installing UCP on Microsoft Azure, an overlay network is not used for
|
||||||
|
> Kubernetes; therefore, any containerized service deployed onto Kubernetes and
|
||||||
|
> exposed as a Kubernetes Service may need its corresponding port to be opened
|
||||||
|
> on the underlying Azure Network Security Group. For more information see
|
||||||
|
> [Installing on
|
||||||
|
> Azure](/ee/ucp/admin/install/cloudproviders/install-on-azure/#azure-prerequisites).
|
||||||
|
|
||||||
Make sure the following ports are open for incoming traffic on the respective
|
Make sure the following ports are open for incoming traffic on the respective
|
||||||
host types:
|
host types:
|
||||||
|
|
||||||
|
|
@ -87,10 +96,10 @@ host types:
|
||||||
| managers | TCP 12388 | Internal | Internal Port for the Kubernetes API Server |
|
| managers | TCP 12388 | Internal | Internal Port for the Kubernetes API Server |
|
||||||
|
|
||||||
## Disable `CLOUD_NETCONFIG_MANAGE` for SLES 15
|
## Disable `CLOUD_NETCONFIG_MANAGE` for SLES 15
|
||||||
For SUSE Linux Enterprise Server 15 (SLES 15) installations, you must disable `CLOUD_NETCONFIG_MANAGE`
|
For SUSE Linux Enterprise Server 15 (SLES 15) installations, you must disable `CLOUD_NETCONFIG_MANAGE`
|
||||||
prior to installing UCP.
|
prior to installing UCP.
|
||||||
|
|
||||||
1. In the network interface configuration file, `/etc/sysconfig/network/ifcfg-eth0`, set
|
1. In the network interface configuration file, `/etc/sysconfig/network/ifcfg-eth0`, set
|
||||||
```
|
```
|
||||||
CLOUD_NETCONFIG_MANAGE="no"
|
CLOUD_NETCONFIG_MANAGE="no"
|
||||||
```
|
```
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue