Prepare an Oracle Cloud Infrastructure Container Engine for Kubernetes (OKE) Cluster
Verrazzano can create network policies that can be used to limit the ports and protocols that pods use for network communication. Network policies provide additional security but they are enforced only if you install a Kubernetes Container Network Interface (CNI) plug-in that enforces them, such as Calico. For an example on OKE, see Installing Calico and Setting Up Network Policies.
NOTEOCI VCN-Native Pod Networking is now supported with Verrazzano for Kubernetes v1.26 and later. The pod network must be in a private subnet to enable egress. Either place the worker nodes in a private subnet, or place the pod network in a private subnet separate from the worker nodes. For Kubernetes v1.25 and earlier, you must use the flannel overlay network.
Create the OKE cluster using the Oracle Cloud Infrastructure Console or by some other means.
Follow the instructions provided by OKE to download the Kubernetes configuration file for your cluster, and set the following
$ export KUBECONFIG=<path to valid Kubernetes config>
Optional, if your organization requires the use of a private registry to the Docker images installed by Verrazzano, see Install Verrazzano in a Disconnected Environment.
To continue, see the Installation Guide.
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.