|
| 1 | +// Module included in the following assemblies: |
| 2 | +// |
| 3 | +// * installing/installing_gcp/installing-gcp-vpc.adoc |
| 4 | + |
| 5 | +:_content-type: CONCEPT |
| 6 | +[id="installation-custom-gcp-vpc_{context}"] |
| 7 | += About using a custom VPC |
| 8 | + |
| 9 | +In {product-title} {product-version}, you can deploy a cluster into existing subnets in an existing Virtual Private Cloud (VPC) in Google Cloud Platform (GCP). By deploying {product-title} into an existing GCP VPC, you might be able to avoid limit constraints in new accounts or more easily abide by the operational constraints that your company's guidelines set. If you cannot obtain the infrastructure creation permissions that are required to create the VPC yourself, use this installation option. You must configure networking for the subnets. |
| 10 | + |
| 11 | +[id="installation-custom-gcp-vpc-requirements_{context}"] |
| 12 | +== Requirements for using your VPC |
| 13 | + |
| 14 | +The union of the VPC CIDR block and the machine network CIDR must be non-empty. The subnets must be within the machine network. |
| 15 | + |
| 16 | +The installation program does not create the following components: |
| 17 | + |
| 18 | +* NAT gateways |
| 19 | +* Subnets |
| 20 | +* Route tables |
| 21 | +* VPC network |
| 22 | + |
| 23 | +[id="installation-custom-gcp-vpc-validation_{context}"] |
| 24 | +== VPC validation |
| 25 | + |
| 26 | +To ensure that the subnets that you provide are suitable, the installation program confirms the following data: |
| 27 | + |
| 28 | +* All the subnets that you specify exist. |
| 29 | +* You provide one subnet for control-plane machines and one subnet for compute machines. |
| 30 | +* The subnet's CIDRs belong to the machine CIDR that you specified. |
| 31 | + |
| 32 | +[id="installation-about-custom-gcp-permissions_{context}"] |
| 33 | +== Division of permissions |
| 34 | + |
| 35 | +Some individuals can create different resource in your clouds than others. For example, you might be able to create application-specific items, like instances, buckets, and load balancers, but not networking-related components such as VPCs, subnets, or ingress rules. |
| 36 | + |
| 37 | +[id="installation-custom-gcp-vpc-isolation_{context}"] |
| 38 | +== Isolation between clusters |
| 39 | + |
| 40 | +If you deploy {product-title} to an existing network, the isolation of cluster services is reduced in the following ways: |
| 41 | + |
| 42 | +* You can install multiple {product-title} clusters in the same VPC. |
| 43 | + |
| 44 | +* ICMP ingress is allowed to the entire network. |
| 45 | + |
| 46 | +* TCP 22 ingress (SSH) is allowed to the entire network. |
| 47 | + |
| 48 | +* Control plane TCP 6443 ingress (Kubernetes API) is allowed to the entire network. |
| 49 | + |
| 50 | +* Control plane TCP 22623 ingress (MCS) is allowed to the entire network. |
0 commit comments