Node networking
Addresses
Every MetaKube Node has one address of type InternalIP: the private IP in the OpenStack network of the cluster.
They have another address of type ExternalIP in case the MachineDeployment is configured to use floating IPs.
Pod traffic
Nodes act as gateways for in the Pod network.
Floating IPs
MetaKube can manage floating IPs for each server of a MachineDeployment.
This has certain implications you should consider:
-
Node acts as NAT gateway directly
The source IP of nodes and its Pods is distinct from other Nodes. This may be desirable e.g. to avoid certain IP based rate limits of certain APIs.
Secondly, it avoids port collision for egress at the shared NAT gateway (router).
-
Node ports are open to the public
This may be intentional and the reason to use floating IPs in the first place. But also consider other ports you may not want to expose.
-
Additional cost for floating IPs
Dedicated floating IP Pool
If you need all egress from your cluster to be from a well-known CIDR, you may consider a dedicated floating IP Pool.
Use free (unmanaged) floating IPs
Warning
This behavior is deprecated. We are looking to replace this functionality with a more explicit mechanism.
When there's free floating IPs in the project, MetaKube will first attempt to use these to associate with machine ports.
Network peers and required connections
The nodes must be able to communicate with the following peers.
Egress
Info
MetaKube does not restrict any egress by default.
- Apiserver
- Konnectivity
- DNS resolvers
- OpenStack API
- Various container image registries & package repositories
Ingress
Info
Traffic from the following peers are enabled by default through security group rules:
- Other Nodes to facilitate Pod networking
- (Optional) Node ports (30000-32767) from Node subnet for ports of OpenStack Octavia Load Balancers
- (Optional) Node ports (30000-32767) from external networks if used