Network Architecture

This section provides detailed information about the network topology, subnet allocation, and security configuration for the LogScale OCI infrastructure.

Multi-Region DR Deployment: When deploying a DR pair, each cluster (primary and secondary) has its own independent Virtual Cloud Network (VCN). The suggested CIDR allocation is:

  • Primary: 10.0.0.0/16

  • Secondary: 10.1.0.0/16

VCN CIDRs must be unique per cluster within the same compartment. Cross-cluster communication happens via OCI DNS steering policies and remote Terraform state, not VCN peering.

Network Components Summary

The infrastructure uses a single VCN with carefully planned subnet allocation to separate public and private resources:

ComponentSubnet NameCIDR BlockTypePurposeAvailability
VCN${cluster_name}-vcn10.0.0.0/16RegionalPrimary network container for all resourcesAll ADs
Cluster Endpoint Subnet${cluster_name}-cluster-endpoint-subnet10.0.1.0/28PrivateOKE control plane API endpointRegional
Load Balancer Subnet${cluster_name}-lb-subnet10.0.2.0/24PublicExternal load balancers and ingressRegional
Worker Node Subnets${cluster_name}-node-pool-${AD}Configurable per ADPrivateOKE worker nodes (per AD)AD-specific
Pod Subnet${cluster_name}-pod-subnet10.0.64.0/18PrivateKubernetes pod networking (VCN-native)Regional
Bastion ServiceUses first worker node subnetN/APrivateOCI Bastion Service targetAD-specific

Note

Worker node subnet CIDR blocks are configurable through the ad_and_subnets variable. The example terraform.tfvars.example shows subnets like 10.0.160.0/20, 10.0.176.0/20, and 10.0.192.0/20 for different availability domains.

Network Security Groups

Network Security Groups (NSGs) provide granular traffic control for different components:

NSG Name Applied ToKey RulesPurpose
Worker Node NSGWorker nodesSSH from Bastion NSG, HTTPS from LB Subnet, K8s API (6443) from VCNControl worker node access
API Endpoint NSGControl planeK8s API (6443) from VCN, HTTPS (443) from VCNSecure API server access
Bastion NSGBastion serviceSSH (22) from allowed IPs, Outbound to Worker NSGEnable secure admin access
Load Balancer NSGLoad balancersHTTP/HTTPS from internet, Outbound to Worker NSGExternal traffic ingress

Gateway Configuration

The VCN uses three types of gateways for different traffic patterns:

Gateway TypePurposeRoute TargetAssociated Subnets
Internet GatewayInternet access for public resources0.0.0.0/0 to/from InternetPublic subnets (LB, Bastion)
NAT GatewayOutbound internet access for private resources0.0.0.0/0 to InternetPrivate subnets (Workers, Pods)
Service GatewayAccess to OCI servicesOCI service networksAll subnets

Required Ports

The following ports are configured in the network security rules:

Service PortProtocolDirectionPurpose
SSH Access22TCPBastion to WorkersAdministrative access
Kubernetes API6443TCPVCN to Control PlaneCluster management
Kubelet10250TCPControl Plane to WorkersNode management
HTTP Ingress80TCPInternet to Load BalancerWeb traffic
HTTPS Ingress443TCPInternet to Load BalancerSecure web traffic
NodePort Range30000-32767TCPLoad Balancer to WorkersService exposure

Network Flow

External Access (Internet to Public Subnets):

  • Users access the Load Balancer via HTTPS (port 443) for application traffic

  • Administrators connect to the OCI Bastion Service for secure SSH access to private resources

Internal Communication (Private Subnets):

  • Load Balancer forwards traffic to Worker Nodes using NodePort services (30000-32767)

  • OCI Bastion Service provides secure SSH access to Worker Nodes and Control Plane

  • Control Plane manages Worker Nodes via Kubernetes API (port 6443)

  • Worker Nodes communicate with Pods using VCN-native networking

Outbound Connectivity (Private to Internet):

  • Worker Nodes access internet through NAT Gateway for updates and external services

  • Worker Nodes store data in Object Storage using private OCI service endpoints

Security Boundaries

Zone Access LevelComponentsSecurity Controls
InternetPublicUsers, External ServicesDDoS Protection, WAF
Public SubnetsControlledLoad Balancer, BastionNSG Rules, IP Allowlists
Private SubnetsRestrictedControl Plane, Workers, PodsPrivate IPs, NSG Isolation
OCI ServicesInternalNAT, StorageService Gateway, IAM

Network CIDR Allocation

ComponentCIDR BlockAvailable IPsPurpose
VCN10.0.0.0/1665,536Primary network container
Load Balancer10.0.2.0/24256External traffic ingress
Control Plane10.0.1.0/2814Kubernetes API endpoint
Worker NodesDynamic /204,094 per ADCompute instances
Pod Network10.0.64.0/1816,382Container networking