Creating a Worker Subnet (Flannel Overlay)
On Compute Cloud@Customer, part of configuring OKE requires external and internal access security lists and a worker subnet.
Create the following resources in the order listed:
Create a Worker Security List
To create a security list, use the instructions in Creating a Security List. For Terraform input, see Example Terraform Scripts for Network Resources (Flannel Overlay).
This security list defines traffic that's allowed to contact worker nodes directly.
For this example, use the following input for the worker subnet security list.
Compute Cloud@Customer Console |
CLI property |
---|---|
|
|
Seven ingress security rules: |
Seven ingress security rules:
|
Ingress Rule 1
|
Ingress Rule 1
|
Ingress Rule 2
|
Ingress Rule 2
|
Ingress Rule 3
|
Ingress Rule 3
|
Ingress Rule 4
|
Ingress Rule 4
|
Ingress Rule 5
|
Ingress Rule 5
|
Create the Worker Subnet
To create a subnet, use the instructions in Creating a Subnet. For Terraform input, see Example Terraform Scripts for Network Resources (Flannel Overlay).
For this example, use the following input for the worker subnet security list. Use the OCID of the VCN that was created in Creating a VCN (Flannel Overlay). Create the worker subnet in the same compartment where you created the VCN.
Create either a NAT private worker subnet or a VCN private worker subnet. Create a NAT private worker subnet to communicate outside the VCN.
Compute Cloud@Customer Console property |
CLI property |
---|---|
|
|
The difference in the following private subnet is the VCN private route table is used instead of the NAT private route table.
Compute Cloud@Customer Console property |
CLI property |
---|---|
|
|
What's Next: