Replies: 1 comment 3 replies
-
@oasisvali |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I have created a multi-cloud cluster with k3s. The nodes are all on different private networks and cannot reach each other via their private IPs.
I was able to setup a working multicloud cluster using the flannel wireguard backend (https://docs.k3s.io/installation/network-options#distributed-hybrid-or-multicloud-cluster) which instructs flannel to use the nodes public IP.
However, due to certain networking requirements, we need to use cilium cni instead. To get the same multi cloud cluster working with cilium, I had to set both
node-ip
andnode-external-ip
to the nodes public IP for all nodes. This was the only way to ensure all nodes can reach each other as the private IPs are on different subnets.I have encryption enabled with wireguard in the cilium install and have confirmed all pod-to-pod communication is happening via the encrypted wireguard interface.
Is this a secure setup or is setting both
node-ip
andnode-external-ip
to the nodes public IP considered bad practice? My understanding is that since all control plane communication is using https and all inter-pod communication is using wireguard, the cluster should be secure, but I'd like to ask the community's opinion.Beta Was this translation helpful? Give feedback.
All reactions