1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00
Files
openshift-docs/microshift_networking/microshift-networking-settings.adoc

41 lines
1.7 KiB
Plaintext
Raw Normal View History

:_mod-docs-content-type: ASSEMBLY
2023-03-10 06:54:43 -05:00
[id="microshift-understanding-networking-settings"]
= Understanding networking settings
include::_attributes/attributes-microshift.adoc[]
:context: microshift-networking
toc::[]
Learn how to apply networking customization and default settings to {microshift-short} deployments. Each node is contained to a single machine and single {microshift-short}, so each deployment requires individual configuration, pods, and settings.
Cluster Administrators have several options for exposing applications that run inside a cluster to external traffic and securing network connections:
* A service such as NodePort
* API resources, such as `Ingress` and `Route`
By default, Kubernetes allocates each pod an internal IP address for applications running within the pod. Pods and their containers can have traffic between them, but clients outside the cluster do not have direct network access to pods except when exposed with a service such as NodePort.
2023-03-10 06:54:43 -05:00
[NOTE]
====
To troubleshoot connection problems with the NodePort service, read about the known issue in the Release Notes.
2023-03-10 06:54:43 -05:00
====
include::modules/microshift-configuring-ovn.adoc[leveloffset=+1]
include::modules/microshift-restart-ovnkube-master.adoc[leveloffset=+1]
include::modules/microshift-http-proxy.adoc[leveloffset=+1]
include::modules/microshift-rpm-ostree-https.adoc[leveloffset=+1]
include::modules/microshift-cri-o-container-runtime.adoc[leveloffset=+1]
include::modules/microshift-ovs-snapshot.adoc[leveloffset=+1]
include::modules/microshift-deploying-a-load-balancer.adoc[leveloffset=+1]
include::modules/microshift-blocking-nodeport-access.adoc[leveloffset=+1]
include::modules/microshift-mDNS.adoc[leveloffset=+1]