You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: asciidoc/product/atip-requirements.adoc
+19-3Lines changed: 19 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,9 +26,10 @@ The hardware requirements for SUSE Telco Cloud are as follows:
26
26
** SR-IOV: to attach VFs (Virtual Functions) in pass-through mode to CNFs/VNFs, the NIC must support SR-IOV and VT-d/AMD-Vi be enabled in the BIOS.
27
27
** CPU Processors: To run specific Telco workloads, the CPU Processor model should be adapted to enable most of the features available in this reference <<atip-features,table>>.
28
28
** Firmware requirements for installing with virtual media:
29
-
29
+
+
30
30
|===
31
31
| Server Hardware | BMC Model | Management
32
+
32
33
| Dell hardware
33
34
| 15th Generation
34
35
| iDRAC9
@@ -78,8 +79,12 @@ The following table lists the opened ports in nodes running the management clust
78
79
For CNI plug-in related ports, see <<cni-specific-port-requirements,CNI specific port requirements>>.
@@ -177,8 +185,11 @@ Following ports are expected to be exposed from the BMC (they could differ depen
177
185
178
186
* Once the IPA ramdisk image loaded on the BMC `virtual media` is used to bootup the downstream server image, the hardware inspection phase begins. The following table lists the ports exposed by a running IPA ramdisk image:
179
187
188
+
.Inbound Network Rules for Downstream Nodes - `Metal^3^/Ironic` Provisioning phase
@@ -255,16 +269,18 @@ For CNI plug-in related ports, see <<cni-specific-port-requirements,CNI specific
255
269
256
270
Each supported CNI variant comes with its own set of port requirements. For more details, refer https://docs.rke2.io/install/requirements#cni-specific-inbound-network-rules[CNI Specific Inbound Network Rules] in RKE2 documentation.
257
271
258
-
When `cilium` is set as default/primary CNI plug-in, following TCP port is additionally exposed when the cilium-operator workload is configured to expose metrics outside the Kubernetes cluster on which it is deployed. This ensures that an external `Prometheus` server instance running outside that Kubernetes cluster can still collect these metrics.
272
+
When `cilium` is set as default/primary CNI plug-in, following TCP port is additionally exposed when the `cilium-operator` workload is configured to expose metrics outside the Kubernetes cluster on which it is deployed. This ensures that an external `Prometheus` server instance running outside that Kubernetes cluster can still collect these metrics.
259
273
260
274
[NOTE]
261
275
====
262
276
This is the default option when deploying `cilium` via the rke2-cilium Helm chart.
263
277
====
264
278
265
-
279
+
.Inbound Network Rules for Management/Downstream Nodes - external metrics exposure from `cilium-operator` enabled
0 commit comments