Skip to content

Commit 303fd73

Browse files
authored
Merge pull request #81598 from johnwilkins/HCIDCOS-348
HCIDOCS-348: Requirement to accept queries both over UDP and TCP by upstream DNS servers missing
2 parents 1306a5a + 72a6acd commit 303fd73

File tree

1 file changed

+10
-8
lines changed

1 file changed

+10
-8
lines changed

modules/ipi-install-network-requirements.adoc

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="network-requirements_{context}"]
77
= Network requirements
88

9-
Installer-provisioned installation of {product-title} involves several network requirements. First, installer-provisioned installation involves an optional non-routable `provisioning` network for provisioning the operating system on each bare metal node. Second, installer-provisioned installation involves a routable `baremetal` network.
9+
Installer-provisioned installation of {product-title} involves multiple network requirements. First, installer-provisioned installation involves an optional non-routable `provisioning` network for provisioning the operating system on each bare-metal node. Second, installer-provisioned installation involves a routable `baremetal` network.
1010

1111
image::210_OpenShift_Baremetal_IPI_Deployment_updates_0122_2.png[Installer-provisioned networking]
1212

@@ -28,23 +28,23 @@ Certain ports must be open between cluster nodes for installer-provisioned insta
2828

2929
| `123` | The cluster nodes must access the NTP server on port `123` using the `baremetal` machine network.
3030

31-
|`5050`| The Ironic Inspector API runs on the control plane nodes and listens on port `5050`. The Inspector API is responsible for hardware introspection, which collects information about the hardware characteristics of the bare metal nodes.
31+
|`5050`| The Ironic Inspector API runs on the control plane nodes and listens on port `5050`. The Inspector API is responsible for hardware introspection, which collects information about the hardware characteristics of the bare-metal nodes.
3232

3333
|`5051`| Port `5050` uses port `5051` as a proxy.
3434

3535
|`6180`| When deploying with virtual media and not using TLS, the provisioner node and the control plane nodes must have port `6180` open on the `baremetal` machine network interface so that the baseboard management controller (BMC) of the worker nodes can access the {op-system} image. Starting with {product-title} 4.13, the default HTTP port is `6180`.
3636

3737
|`6183`| When deploying with virtual media and using TLS, the provisioner node and the control plane nodes must have port `6183` open on the `baremetal` machine network interface so that the BMC of the worker nodes can access the {op-system} image.
3838

39-
|`6385`| The Ironic API server runs initially on the bootstrap VM and later on the control plane nodes and listens on port `6385`. The Ironic API allows clients to interact with Ironic for bare metal node provisioning and management, including operations like enrolling new nodes, managing their power state, deploying images, and cleaning the hardware.
39+
|`6385`| The Ironic API server runs initially on the bootstrap VM and later on the control plane nodes and listens on port `6385`. The Ironic API allows clients to interact with Ironic for bare-metal node provisioning and management, including operations such as enrolling new nodes, managing their power state, deploying images, and cleaning the hardware.
4040

4141
|`6388`| Port `6385` uses port `6388` as a proxy.
4242

4343
|`8080`| When using image caching without TLS, port `8080` must be open on the provisioner node and accessible by the BMC interfaces of the cluster nodes.
4444

4545
|`8083`| When using the image caching option with TLS, port `8083` must be open on the provisioner node and accessible by the BMC interfaces of the cluster nodes.
4646

47-
|`9999`| By default, the Ironic Python Agent (IPA) listens on TCP port `9999` for API calls from the Ironic conductor service. This port is used for communication between the bare metal node where IPA is running and the Ironic conductor service.
47+
|`9999`| By default, the Ironic Python Agent (IPA) listens on TCP port `9999` for API calls from the Ironic conductor service. Communication between the bare-metal node where IPA is running and the Ironic conductor service uses this port.
4848

4949
|====
5050

@@ -90,6 +90,8 @@ test-cluster.example.com
9090

9191
{product-title} includes functionality that uses cluster membership information to generate A/AAAA records. This resolves the node names to their IP addresses. After the nodes are registered with the API, the cluster can disperse node information without using CoreDNS-mDNS. This eliminates the network traffic associated with multicast DNS.
9292

93+
CoreDNS requires both TCP and UDP connections to the upstream DNS server to function correctly. Ensure the upstream DNS server can receive both TCP and UDP connections from {product-title} cluster nodes.
94+
9395
In {product-title} deployments, DNS name resolution is required for the following components:
9496

9597
* The Kubernetes API
@@ -134,7 +136,7 @@ Network administrators must reserve IP addresses for each node in the {product-t
134136
[id="network-requirements-reserving-ip-addresses_{context}"]
135137
== Reserving IP addresses for nodes with the DHCP server
136138

137-
For the `baremetal` network, a network administrator must reserve a number of IP addresses, including:
139+
For the `baremetal` network, a network administrator must reserve several IP addresses, including:
138140

139141
. Two unique virtual IP addresses.
140142
+
@@ -162,7 +164,7 @@ External load balancing services and the control plane nodes must run on the sam
162164
The storage interface requires a DHCP reservation or a static IP.
163165
====
164166

165-
The following table provides an exemplary embodiment of fully qualified domain names. The API and Nameserver addresses begin with canonical name extensions. The hostnames of the control plane and worker nodes are exemplary, so you can use any host naming convention you prefer.
167+
The following table provides an exemplary embodiment of fully qualified domain names. The API and name server addresses begin with canonical name extensions. The hostnames of the control plane and worker nodes are exemplary, so you can use any host naming convention you prefer.
166168

167169
[width="100%", cols="3,5,2", options="header"]
168170
|=====
@@ -180,7 +182,7 @@ The following table provides an exemplary embodiment of fully qualified domain n
180182

181183
[NOTE]
182184
====
183-
If you do not create DHCP reservations, the installer requires reverse DNS resolution to set the hostnames for the Kubernetes API node, the provisioner node, the control plane nodes, and the worker nodes.
185+
If you do not create DHCP reservations, the installation program requires reverse DNS resolution to set the hostnames for the Kubernetes API node, the provisioner node, the control plane nodes, and the worker nodes.
184186
====
185187

186188
[id="network-requirements-provisioner_{context}"]
@@ -193,7 +195,7 @@ The provisioner node requires layer 2 connectivity for network booting, DHCP and
193195
[id="network-requirements-ntp_{context}"]
194196
== Network Time Protocol (NTP)
195197

196-
Each {product-title} node in the cluster must have access to an NTP server. {product-title} nodes use NTP to synchronize their clocks. For example, cluster nodes use SSL certificates that require validation, which might fail if the date and time between the nodes are not in sync.
198+
Each {product-title} node in the cluster must have access to an NTP server. {product-title} nodes use NTP to synchronize their clocks. For example, cluster nodes use SSL/TLS certificates that require validation, which might fail if the date and time between the nodes are not in sync.
197199

198200
[IMPORTANT]
199201
====

0 commit comments

Comments
 (0)