Skip to content

Commit 6ef8a4d

Browse files
authored
Merge pull request #41676 from xenolinux/vpc
[WIP][BZ2003276]: Create a "Requirements for using your VPC" section for the GCP page installing onto existing vpc
2 parents d60a35e + e509519 commit 6ef8a4d

File tree

2 files changed

+52
-0
lines changed

2 files changed

+52
-0
lines changed

installing/installing_gcp/installing-gcp-vpc.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,8 @@ parameters in the `install-config.yaml` file before you install the cluster.
1717
* If you use a firewall, you xref:../../installing/install_config/configuring-firewall.adoc#configuring-firewall[configured it to allow the sites] that your cluster requires access to.
1818
* If the cloud identity and access management (IAM) APIs are not accessible in your environment, or if you do not want to store an administrator-level credential secret in the `kube-system` namespace, you can xref:../../installing/installing_gcp/manually-creating-iam-gcp.adoc#manually-creating-iam-gcp[manually create and maintain IAM credentials].
1919

20+
include::modules/installation-custom-gcp-vpc.adoc[leveloffset=+1]
21+
2022
include::modules/cluster-entitlements.adoc[leveloffset=+1]
2123

2224
include::modules/ssh-agent-using.adoc[leveloffset=+1]
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * installing/installing_gcp/installing-gcp-vpc.adoc
4+
5+
:_content-type: CONCEPT
6+
[id="installation-custom-gcp-vpc_{context}"]
7+
= About using a custom VPC
8+
9+
In {product-title} {product-version}, you can deploy a cluster into existing subnets in an existing Virtual Private Cloud (VPC) in Google Cloud Platform (GCP). By deploying {product-title} into an existing GCP VPC, you might be able to avoid limit constraints in new accounts or more easily abide by the operational constraints that your company's guidelines set. If you cannot obtain the infrastructure creation permissions that are required to create the VPC yourself, use this installation option. You must configure networking for the subnets.
10+
11+
[id="installation-custom-gcp-vpc-requirements_{context}"]
12+
== Requirements for using your VPC
13+
14+
The union of the VPC CIDR block and the machine network CIDR must be non-empty. The subnets must be within the machine network.
15+
16+
The installation program does not create the following components:
17+
18+
* NAT gateways
19+
* Subnets
20+
* Route tables
21+
* VPC network
22+
23+
[id="installation-custom-gcp-vpc-validation_{context}"]
24+
== VPC validation
25+
26+
To ensure that the subnets that you provide are suitable, the installation program confirms the following data:
27+
28+
* All the subnets that you specify exist.
29+
* You provide one subnet for control-plane machines and one subnet for compute machines.
30+
* The subnet's CIDRs belong to the machine CIDR that you specified.
31+
32+
[id="installation-about-custom-gcp-permissions_{context}"]
33+
== Division of permissions
34+
35+
Some individuals can create different resource in your clouds than others. For example, you might be able to create application-specific items, like instances, buckets, and load balancers, but not networking-related components such as VPCs, subnets, or ingress rules.
36+
37+
[id="installation-custom-gcp-vpc-isolation_{context}"]
38+
== Isolation between clusters
39+
40+
If you deploy {product-title} to an existing network, the isolation of cluster services is reduced in the following ways:
41+
42+
* You can install multiple {product-title} clusters in the same VPC.
43+
44+
* ICMP ingress is allowed to the entire network.
45+
46+
* TCP 22 ingress (SSH) is allowed to the entire network.
47+
48+
* Control plane TCP 6443 ingress (Kubernetes API) is allowed to the entire network.
49+
50+
* Control plane TCP 22623 ingress (MCS) is allowed to the entire network.

0 commit comments

Comments
 (0)