From e590fa719b28a2d4daf14af45e6db1d0c9043f1f Mon Sep 17 00:00:00 2001 From: wvell Date: Wed, 6 Dec 2023 10:16:58 +0100 Subject: [PATCH] Improve wording of network requirements Signed-off-by: wvell --- docs/installation/requirements.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/installation/requirements.md b/docs/installation/requirements.md index a2d64b910..2123dde71 100644 --- a/docs/installation/requirements.md +++ b/docs/installation/requirements.md @@ -117,7 +117,7 @@ K3s performance depends on the performance of the database. To ensure optimal sp The K3s server needs port 6443 to be accessible by all nodes. -The nodes need to be able to reach other nodes over UDP port 8472 when Flannel VXLAN is used or over UDP ports 51820 and 51821 (when using IPv6) when Flannel Wireguard backend is used. The node should not listen on any other port. K3s uses reverse tunneling such that the nodes make outbound connections to the server and all kubelet traffic runs through that tunnel. However, if you do not use Flannel and provide your own custom CNI, then the ports needed by Flannel are not needed by K3s. +The nodes need to be able to reach other nodes over UDP port 8472 when using the Flannel VXLAN backend, or over UDP port 51820 (and 51821 if IPv6 is used) when using the Flannel WireGuard backend. The node should not listen on any other port. K3s uses reverse tunneling such that the nodes make outbound connections to the server and all kubelet traffic runs through that tunnel. However, if you do not use Flannel and provide your own custom CNI, then the ports needed by Flannel are not needed by K3s. If you wish to utilize the metrics server, all nodes must be accessible to each other on port 10250.