LogoLogo
HI GIO User Guide EN
HI GIO User Guide EN
  • HI GIO Cloud Help Center
    • HI GIO Cloud Website
    • HI GIO Cloud Sales Portfolio
  • COMPUTE
    • 1. Working with VM
      • Create a New Virtual Machine from ISO
      • Create a Virtual Machine from a Template
      • Install VMware Tools in a Virtual Machine
      • View VM
      • Performing Power Operations on Virtual Machines
      • Editing the properties of a new VM
      • Create VM's Template
      • Force change root/administrator's password
      • Safely remove Disk in Windows OS
    • 2. Working with vAPP
      • Create a vAPP
      • Start and Stop Order of Virtual Machines in a vApp
    • 3. HI GIO Auto Scale
    • 4. HI GIO API
      • API creates VM from Template
      • API reconfigures VM's Disk
      • API reconfigures VM's Networks
      • API token login
      • API reconfigures VM's Memory
      • API reconfigures VM's CPU
      • API power on/off VM
    • 5. HI GIO KMS Service
    • 6. Encryption Management Service
  • HI GIO S3 STORAGE
    • Login to HI GIO S3 Storage Portal
    • How to get the S3 Key
    • Mount HI GIO S3 Storage into Windows
    • Bucket Management
      • How to create the new Bucket
      • Setup Public or Private ACL for Bucket
      • Versioning
      • Lifecycle Rule
      • Bucket Policy
    • Management File, Folder
      • Create the Folder
      • Upload Folder/File
      • Download Folder/Files
      • Get the link Download of Files
      • File Versioning
    • Connect S3 Services with Veeam Backup
      • Connect HI GIO S3 with Veeam Backup
    • Backup DATA from NAS to HI GIO S3 Service
      • Backup Data from Synology NAS with ClouSync
      • Backup Data from Synology NAS with Hyper Backup
    • S3 Data Encryption – SSE-C and SSE-S3
  • BACK-UP AS A SERVICE
    • 1. HI GIO BaaS
      • BaaS Support Matrix
      • Install Veeam Agent for Linux
      • Install Veeam Agent for Windows
      • Update Veeam Service Provider Console Management Agent v.7 & Backup Agent v.6
      • Create backup job on Linux OS via Veeam agent console
      • Create backup job on Windows OS via Veeam agent console
      • Create backup job for Linux via Portal
      • Create backup job for Windows via Portal
      • Restore Linux VM on HIGIO Cloud via Media file (ISO file)
      • Restore Windows VM on HI GIO Cloud via Media file (ISO file)
      • How to configure receive Alarm from BaaS
      • Workaround
        • Veeam Agent Installation for CentOS 9 Stream
        • Veeam Agent Installation for CentOS 8 Stream
        • Veeam Agent Installation for RHEL 9.2
    • 2. HI GIO Backup
      • Restore Entire VM via vCD's portal
      • Instant Recovery
    • 3. HI GIO M365 BaaS
  • HI GIO DRaaS
    • How To Install vCDA On-Premises appliance
    • How To Use vCDA On-Premises
    • Stretching layer 2 networks for HI GIO's DRaaS
      • Preparing the configure
      • Deploy NSX Autonomous Edge (on-premises site)
      • Register & configure the Networks of the NSX Autonomous Edge On-Premises
      • Create a L2 VPN server session (HI GIO site).
      • Create a L2 VPN - Client session (on-premises site)
      • (Optional) Deploy the secondary NSX Autonomous Edge in HA mode (on-premises site)
    • FAILOVER SCENARIO
      • ENVIRONMENT
      • FAILOVER
        • Step 1: Create a protection job (from on-premises site)
        • Step 2: Configure the Network Settings for On-Premises to Cloud Replications
        • Step 3P - Partial failover VMs (VM - APP1) from on-premise site to HI GIO site
        • Step 3F - Full failover vAPP1 (VM - APP1 & VM - DB1) from on-premise site to HI GIO
        • Step 4: Reverse replication of the VM from HI GIO Cloud to On-Premises
        • Step 5: Migrate the VMs back from HI GIO Cloud to On-Premises
        • Step 6: Reprotect the VMs from On-Premises to HI GIO Cloud
        • FAQs
  • NETWORK
    • 1. Working with Network
      • Working with Organization VDC Networks
      • How to create NAT rules on Edge Gateway
      • Using Edge Gateway Firewall
      • Using Distributed Firewall in a Data Center Group
    • 2. VPN
      • IPSec parameters
      • IPSec VPN
      • IPSec Remote Access VPN Clients on Windows
    • 3. Load Balancer
      • Import SSL Certificate
      • Create Pools on Load Balancing
      • Create Virtual Service (VS) on Load Balancing
      • Open Firewall Rule To Public Service To Internet
      • Monitor Traffic Analytics
      • How to Use WAF on HI GIO Portal
  • MANAGEMENT
    • 1. IAM Portal
      • Activate HI GIO - IAM account
      • HI GIO Portal – Tenant User Guide
      • Setup Password Lifetime
      • Setup Passkey
      • HI GIO's VM monitoring
      • HI GIO's Monitoring Alert - Email notification channel
      • HI GIO's Monitoring Alert - Telegram notification channel
    • 2. Create a Catalog
  • HI GIO Kubernetes
    • 1. Steps To Create Kubernetes Cluster on HI GIO Portal
    • 2. How to resize Kubernetes Cluster on HI GIO portal
    • 3. Extending disk size for nodes in Kubernetes Cluster on HI GIO Portal
    • 4. How to upgrade Kubernetes Cluster in HI GIO Portal
    • 05. Deploy demo app with persistence volume and publish app via ingress controller
    • 06. How to configure HI GIO Kunernetes cluster autoscale
Powered by GitBook
On this page
  • Overview
  • Procedure
Export as PDF
  1. HI GIO Kubernetes

1. Steps To Create Kubernetes Cluster on HI GIO Portal

PreviousHI GIO KubernetesNext2. How to resize Kubernetes Cluster on HI GIO portal

Last updated 4 months ago

Overview

This document explains creating a Kubernetes cluster on HI GIO, including selecting configurations, deploying nodes, and initializing the control plane.

Procedure

  • Create a network for the cluster with available Static IP Pools.

  • Create firewall and SNAT rules to ensure VMs in the cluster can access the internet.

  • Make sure HI GIO Load Balancing is enabled.

  • Make sure there is at least one available public IP.

Step 1: Log in to the HI GIO portal with tenant account > Click More > Kubernetes Container Clusters

Step 2: Click NEW and follow the creation steps to complete the creation process to create a new HI GIO Kubernetes cluster.

  • Click NEXT

  • Enter the name of the cluster and select a Kubernetes version > NEXT.

  • Click NEXT in step 3.

Attaching clusters to Tanzu Mission Control is currently not supported.

  • Select oVDC and Network for nodes > NEXT.

  • In the Control Plane window, select the number of nodes and disk size, and optionally select a sizing policy, a placement policy, and a storage profile, and click NEXT.

Configuration field

Description

Number of Nodes

  • Non-HA: 1

  • HA: 3

Disk Size (GB)

The minimum allowed is 20 GB

Sizing Policy

  • TKG medium: If the number of Worker nodes is less than or equal to 10 nodes.

  • TKG large​: If the number of Worker nodes exceeds 10 nodes.

Placement Policy

Leave blank. We do not apply a placement policy for the HI GIO Kubernetes cluster.

Storage Policy

Select an available storage policy.

  • Configure worker pools setting > NEXT

Configuration field

Description

Name

Enter the worker pool name.

Number of Nodes

Enter the number of nodes of the worker pool.

Disk Size (GB)

The minimum allowed is 20 GB

Sizing Policy

  • TKG small: Small VM sizing policy for a Kubernetes cluster node (2 CPU, 4GB memory)

  • TKG medium: Medium VM sizing policy for a Kubernetes cluster node (2 CPU, 8GB memory)

  • TKG large​: Large VM sizing policy for a Kubernetes cluster node (4 CPU, 16GB memory)

  • TKG extra-large: Extra-large VM sizing policy for a Kubernetes cluster node (8 CPU, 32GB memory)

Placement Policy

Leave blank. We do not apply a placement policy for HI GIO Kubernetes cluster.

Storage Policy

Select an available storage policy.

(Optional) To create additional worker node pools, click Add New Worker Node Pool and configure worker node pool settings.

  • Configure storage class > NEXT

Configuration field

Description

Select a Storage Profile

Select one of the available storage profiles.

Storage Class Name

The name of the default Kubernetes storage class. This field can be any user-specified name with the following constraints based on Kubernetes requirements:

  • Contain a maximum of 63 characters

  • Contain only lowercase alphanumeric characters or hyphens

  • Start with an alphabetic character

  • End with an alphanumeric character

Reclaim Policy

  • Delete policy: This policy deletes the PersistentVolume object when the PersistentVolumeClaim is deleted.

  • Retain policy: This policy does not delete the volume when the PersistentVolumeClaim is deleted; the volume can be reclaimed manually.

Filesystem

  • xfs

  • ext4: This is the default filesystem used for the storage class.

  • Configure Kubernetes network > NEXT

Option

Description

Pods CIDR

Specifies a range of IP addresses to use for Kubernetes pods. The default value is 100.96.0.0/11. The pod subnet size must be equal to or larger than /24.

Services CIDR

Specifies a range of IP addresses to use for Kubernetes services. The default value is 100.64.0.0/13.

Control Plane IP

You can specify your own IP address as the control plane endpoint. You can use an external IP from the gateway or an internal IP from a subnet different from the routed IP range.

Virtual IP Subnet

You can specify a subnet CIDR from which one unused IP address is assigned as a Control Plane Endpoint. The subnet must represent a set of addresses in the gateway. The same CIDR is also propagated as the subnet CIDR for the ingress services on the cluster.

You should enter the available public IP into the Control Plane IP

  • Enable Auto Repair on Errors and Node Health Check > NEXT

Auto Repair on Errors: If errors occur before this cluster becomes available, the CSE Server will automatically attempt to repair the cluster.

Node Health Check: Unhealthy nodes will be remediated after this cluster becomes available according to unhealthy node conditions and remediation rules.

  • Review all cluster information and click FINISH to create the cluster.

Step 3: Wait until the cluster status is Available, then click DOWNLOAD KUBE CONFIG to download the kubeconfig file

Please configure the VPC firewall to allow access to the Control Plane IP using port 6443.