Deployment requirements¶
When deploying DCE 5.0, software planning, hardware planning, and network planning need to be done well.
Operating System Requirements¶
Note
For Unicom UOS V20 (1020a) installation guidance document, please refer to Deploy DCE 5.0 Enterprise Package on UOS V20 (1020a) Operating System
Other operating systems in the table below use a unified installation guide document, please refer to Offline installation of DCE 5.0 commercial version
Please refer to Other Linux Offline Deployment of DCE 5.0 Enterprise Package
Architecture | Operating System | Kernel Version | Remarks |
---|---|---|---|
AMD 64 | centos 7.X | Kernel 3.10.0-1127.el7.x86_64 on an x86_64 | Operating system recommended CentOS 7.9 |
Redhat 8.X | 4.18.0-305.el8.x86_64 | Recommended operating system Redhat 8.4 | |
Redhat 7.X | 3.10.0-1160.e17.x86 | Recommended Operating System Redhat 7.9 | |
Ubuntu 20.04 | 5.10.104 | Recommended operating system Ubuntu20.04 | |
Unicom UOS V20 | 5.4.0-125-generic | Recommended operating system Unicom UOS V20 (1020a) | |
openEuler 22.03 | 5.10.0-60.18.0.50.oe2203.x86_64 | Recommended operating system openEuler 22.03 | |
ARM 64 | Galaxy Kirin OS V10 SP2 | 4.19.90-24.4.v2101.ky10.aarch64 | - |
Hardware Requirements¶
Type | Specific Requirements |
---|---|
CPU | No Oversubscription |
Memory | No Oversold |
HDD | IOPS > 500 Throughput >200 MB/s |
For resource requirements, please refer to Preparation
Network Requirements¶
Network topology¶
Assuming that VIP is used as the load balancing method of the global cluster:
Network Requirements¶
Resources | Requirements | Instructions |
---|---|---|
istioGatewayVip | 1 | If the load balancing mode is metallb, you need to specify a VIP for DCE UI and OpenAPI access |
insightVip | 1 | If the load balancing mode is metallb, you need to specify a VIP for the insight data collection portal of the GLobal cluster, and the insight-agent of the sub-cluster can report data to this VIP |
Network speed | 1000 M/s | Not less than Gigabit, 10 Gigabit is recommended. |
Protocol | - | IPv6 is supported. |
Reserved IP address segments | Two segments need to be reserved | for Pod (10.233.64.0/18 by default) and Service (10.233.0.0/18 by default). If it is already in use, you can customize other network segments to avoid IP address conflicts. |
Route | - | The server has a default or route to 0.0.0.0. |
NTP service address | 1~4 | Make sure your data center has an accessible NTP server IP address. |
DNS service address | 1~2 | If your application needs DNS service, please be prepared to access the DNS server IP address. |
Port requirements¶
In order To function properly, some ports need to be open. If your network is configured with firewall rules, you need to ensure that infrastructure components can communicate with each other over specific ports. Make sure the required following ports are open on the network and configured to allow access between hosts. Some ports are optional based on configuration and usage.
bootstrapping node¶
Protocol | Port | Description |
---|---|---|
TCP | 443 | Docker Registry |
TCP | 8081 | |
TCP | 9000 | Minio API |
TCP | 9001 | Minio UI |
Kube cluster (including global cluster and working cluster)¶
Both global and worker clusters are deployed via Kubean, so they need to open the same ports In addition to standard k8s ports, ports also need to be opened for CNI and some network components.
k8s Control plane¶
Protocol | Port | Description |
---|---|---|
TCP | 2379 | etcd client port |
TCP | 2380 | etcd peer port |
TCP | 6443 | kubernetes-api |
TCP | 10250 | kubelet-api |
TCP | 10257 | kube-scheduler |
TCP | 10259 | kube-controller-manager |
All k8s nodes¶
Every node in the cluster needs to be turned on.
Protocol | Port | Description |
---|---|---|
TCP | 22 | ssh for ansible |
TCP | 9100 | node exporter(Insight-Agent) |
TCP | 10250 | kubelet-api |
TCP | 30000-32767 | kube nodePort range |
Reference: Kubernetes Docs
Calico (default)¶
By default, Calico will be used as CNI, so all k8s nodes need to be turned on.
Protocol | Port | Description |
---|---|---|
TCP | 179 | Calico networking (BGP) |
UDP | 4789 | Calico CNI with VXLAN enabled |
TCP | 5473 | Calico CNI with Typha enabled |
UDP | 51820 | Calico with IPv4 Wireguard enabled |
UDP | 51821 | Calico with IPv6 Wireguard enabled |
IPENCAP / IPIP | - | Calico CNI with IPIP enabled |
Reference: Calico Docs
MetalLB (default)¶
When enabling MetalLB to build a VIP, all k8s nodes need to be turned on.
Protocol | Port | Description |
---|---|---|
TCP/UDP | 7472 | metallb metrics ports |
TCP/UDP | 7946 | metallb L2 operating mode |
Cilium (optional)¶
If you use Cilium as CNI, so all k8s nodes need to be opened.
Protocol | Port | Description |
---|---|---|
TCP | 4240 | Cilium Health checks (cilium-health ) |
TCP | 4244 | Hubble server |
TCP | 4245 | Hubble Relay |
UDP | 8472 | VXLAN overlay |
TCP | 9962 | Cilium-agent Prometheus metrics |
TCP | 9963 | Cilium-operator Prometheus metrics |
TCP | 9964 | Cilium-proxy Prometheus metrics |
UDP | 51871 | WireGuard encryption tunnel endpoint |
ICMP | - | health checks |
Reference: Cilium Docs
SpiderPool (optional)¶
If SpiderPool is used as CNI, all k8s nodes need to be opened.
Protocol | Port | Description |
---|---|---|
TCP | 5710 | SpiderPool Agent HTTP Server |
TCP | 5711 | SpiderPool Agent Metrics |
TCP | 5712 | SpiderPool Agent gops enabled |
TCP | 5720 | SpiderPool Controller HTTP Server |
TCP | 5721 | SpiderPool Controller Metrics |
TCP | 5722 | SpiderPool Controller Webhook Port |
TCP | 5723 | Spiderpool-CLI HTTP server port. |
TCP | 5724 | SpiderPool Controller gops enabled |
Reference: SpiderPool Docs
KubeVIP - (optional)¶
When KubeVIP is enabled to create a Kube API VIP, all Control Plane nodes need to be opened.
Protocol | Port | Description |
---|---|---|
TCP | 2112 | kube-vip metrics ports |
Global cluster Other ports that need to be opened¶
Istio-Gateway VIP¶
Protocol | Port | Description | Used By |
---|---|---|---|
TCP | 80 | Istio-Gateway HTTP | Web Browser or API Client |
TCP | 443 | Istio-Gateway HTTPS | Web Browser or API Client |
Insight VIP¶
Protocol | Port | Description | Used By |
---|---|---|---|
TCP | 8480 | Insight VIP for Metrics | All Nodes |
TCP | 9200 | Insight VIP for Log | All Nodes |
TCP | 4317 | Insight VIP for Trace | All Nodes |
TCP | 8006 | Insight VIP for AduitLog | All Nodes |
Working cluster Other ports that need to be opened¶
The working cluster needs to open port 6443 of the k8s API to give access to the global management cluster. If you want to use the deployment function, you need to open port 22 for global cluster access.
Protocol | Port | Description | Used By |
---|---|---|---|
TCP | 22 | Each node SSH (for ansible) | Global management cluster |
TCP | 6443 | k8s API access entry (such as VIP) | global management cluster |
Other products need to open ports¶
Container registry¶
Protocol | Port | Description | Used By |
---|---|---|---|
TCP | 443 | Port of access portal (such as VIP) | All nodes |
Client browser requirements¶
- Firefox ≥ 49
- Chrome ≥ 54