Set Cluster ACG
    • PDF

    Set Cluster ACG

    • PDF

    Article Summary

    Available in VPC

    The cluster created by Ncloud Kubernetes Service uses the cluster named as nks-*-*, ACG (Access Control Group).
    nks-*-* ACG's cluster configuration nodes are applied to the network interface you use, and rules for cluster networking are configured.

    Basic ACG rules

    When creating a cluster, ACG's inbound and outbound rules are basically configured as below:

    • Inbound
    ProtocolAccess sourceAllowed portNotes
    ICMPnks-*-*automatically created, don't delete it
    TCPnks-*-*1-65535automatically created, don't delete it
    UDPnks-*-*1-65535automatically created, don't delete it
    • Outbound
    ProtocolDestinationAllowed portNotes
    ICMP0.0.0.0/0automatically created, don't delete it
    TCP0.0.0.0/01-65535automatically created, don't delete it
    UDP0.0.0.0/01-65535automatically created, don't delete it

    Required ACG rules

    Note
    • It applies when you select Cilium as the CNI plugin.

    Users can modify and use the cluster ACG when port limitations are needed between configuration nodes.
    As Kubernetes operates as various components interact, at least the following rules have to be permitted for cluster networking.

    Caution
    • You need to check the ports being used in the cluster other than the required ACG rules.
    • SLA does not apply to the errors occurring from cluster ACG modification, and technical support is not provided.
    • Inbound
    ProtocolAccess sourceAllowed portNotes
    ICMPnks-*-*host ping failure check
    TCPnks-*-*2379-2380etcd
    TCPnks-*-*4240cilium health check
    TCPnks-*-*4443metrics server
    TCPnks-*-*6443kube control
    TCPnks-*-*10250kubelet
    TCPnks-*-*30000-32768range for health checks on node ports
    UDPnks-*-*8472vxlan overlay
    • Outbound
    ProtocolDestinationAllowed portNotes
    ICMPnks-*-*host ping failure check
    TCPnks-*-*2379-2380etcd
    TCPnks-*-*4240cilium health check
    TCPnks-*-*4443metrics server
    TCPnks-*-*6443kube control
    TCPnks-*-*10250kubelet
    TCPnks-*-*30000-32768range for health checks on node ports
    UDPnks-*-*8472vxlan overlay

    Automatically configured ACG rules

    Ncloud Kubernetes Service automatically adds rules to ACG in the following circumstances.

    • When creating Network Load Balancer(NLB), it uses the TCP protocol as the inbound rules and allows the node port of the services that use 0.0.0.0/0 as the access source.
      • You can check the ACG update status and set the inbound access source through Annotation.
    • When creating Network Proxy Load Balancer(NPLB), it uses the TCP protocol as the inbound rules and allows 1-65535 port that uses load balancer subnet range as the access source.
      • You can set the ACG update status through Annotation.
    • When creating Application Load Balancer(ALB), it uses the TCP protocol as the inbound rules and allows 1-65535 port that uses load balancer subnet range as the access source.

    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.