Requirements
RKE2 is very lightweight, but has some minimum requirements as outlined below.
Prerequisites
Two rke2 nodes cannot have the same node name. By default, the node name is taken from the machine's hostname.
If two or more of your machines have the same hostname, you must do one of the following:
- Update the hostname to a unique value
- Set the
node-name
parameter in the config file to a unique value - Set the
with-node-id
parameter in the config file totrue
to append a randomly generated ID number to the hostname.
The with-node-id
parameter is available starting with the 2023-05 releases (v1.27.2+rke2r1, v1.26.5+rke2r1, v1.25.10+rke2r1, v1.24.14+rke2r1).
Operating Systems
Linux
RKE2 has been tested and validated on the following operating systems, and their subsequent non-major releases:
Distro | Version |
---|---|
Ubuntu | 18.04, 20.04, 22.04 |
CentOS/RHEL | 7.8 |
Rocky/RHEL | 8.5, 9.1 |
Oracle Linux | 8.7 |
SLES | 15 SP3, SP4 |
OpenSUSE, SLE Micro | 5.1, 5.2, 5.3, 5.4 |
Windows
Experimental as of v1.21.3+rke2r1
Windows Support requires choosing Calico as the CNI for the RKE2 cluster
The RKE2 Windows Node (Worker) agent has been tested and validated on the following operating systems, and their subsequent non-major releases:
- Windows Server 2019 LTSC (amd64) (OS Build 17763.2061)
- Windows Server 2022 LTSC (amd64) (OS Build 20348.169)
Note The Windows Server Containers feature needs to be enabled for the RKE2 Windows agent to work.
Open a new Powershell window with Administrator privileges
powershell -Command "Start-Process PowerShell -Verb RunAs"
In the new Powershell window, run the following command.
Enable-WindowsOptionalFeature -Online -FeatureName Containers –All
This will require a reboot for the Containers
feature to properly function.
Hardware
Hardware requirements scale based on the size of your deployments. Minimum recommendations are outlined here.
Linux/Windows
- RAM: 4GB Minimum (we recommend at least 8GB)
- CPU: 2 Minimum (we recommend at least 4CPU)
Disks
RKE2 performance depends on the performance of the database, and since RKE2 runs etcd embeddedly and it stores the data dir on disk, we recommend using an SSD when possible to ensure optimal performance.
Networking
If your node has NetworkManager installed and enabled, ensure that it is configured to ignore CNI-managed interfaces.. If your node has Wicked installed and enabled, ensure that the forwarding sysctl config is enabled
The RKE2 server needs port 6443 and 9345 to be accessible by other nodes in the cluster.
All nodes need to be able to reach other nodes over UDP port 8472 when Flannel VXLAN is used.
If you wish to utilize the metrics server, you will need to open port 10250 on each node.
Important: The VXLAN port on nodes should not be exposed to the world as it opens up your cluster network to be accessed by anyone. Run your nodes behind a firewall/security group that disables access to port 8472.
Inbound Network Rules
Protocol | Port | Source | Destination | Description |
---|---|---|---|---|
TCP | 9345 | RKE2 agent nodes | RKE2 server nodes | RKE2 supervisor API |
TCP | 6443 | RKE2 agent nodes | RKE2 server nodes | Kubernetes API |
UDP | 8472 | All RKE2 nodes | All RKE2 nodes | Required only for Flannel VXLAN |
TCP | 10250 | All RKE2 nodes | All RKE2 nodes | kubelet metrics |
TCP | 2379 | RKE2 server nodes | RKE2 server nodes | etcd client port |
TCP | 2380 | RKE2 server nodes | RKE2 server nodes | etcd peer port |
TCP | 2381 | RKE2 server nodes | RKE2 server nodes | etcd metrics port |
TCP | 30000-32767 | All RKE2 nodes | All RKE2 nodes | NodePort port range |
UDP | 8472 | All RKE2 nodes | All RKE2 nodes | Cilium CNI VXLAN |
TCP | 4240 | All RKE2 nodes | All RKE2 nodes | Cilium CNI health checks |
ICMP | 8/0 | All RKE2 nodes | All RKE2 nodes | Cilium CNI health checks |
TCP | 179 | All RKE2 nodes | All RKE2 nodes | Calico CNI with BGP |
UDP | 4789 | All RKE2 nodes | All RKE2 nodes | Calico CNI with VXLAN |
TCP | 5473 | All RKE2 nodes | All RKE2 nodes | Calico CNI with Typha |
TCP | 9098 | All RKE2 nodes | All RKE2 nodes | Calico Typha health checks |
TCP | 9099 | All RKE2 nodes | All RKE2 nodes | Calico health checks |
TCP | 5473 | All RKE2 nodes | All RKE2 nodes | Calico CNI with Typha |
UDP | 8472 | All RKE2 nodes | All RKE2 nodes | Canal CNI with VXLAN |
TCP | 9099 | All RKE2 nodes | All RKE2 nodes | Canal CNI health checks |
UDP | 51820 | All RKE2 nodes | All RKE2 nodes | Canal CNI with WireGuard IPv4 |
UDP | 51821 | All RKE2 nodes | All RKE2 nodes | Canal CNI with WireGuard IPv6/dual-stack |
Windows Specific Inbound Network Rules
Protocol | Port | Source | Destination | Description |
---|---|---|---|---|
UDP | 4789 | All RKE2 nodes | All RKE2 nodes | Required for Calico and Flannel VXLAN |
TCP | 179 | All RKE2 nodes | All RKE2 nodes | Calico CNI with BGP |
Typically, all outbound traffic will be allowed.