Files
Billy Tat 24fc5a657c Merge release v2.13.0 to main (#2091)
* Sync main to v2.13.0 (#2065)

* It's bad form to ask users to pass something they just curled from the internet directly to sh

Updated the instructions for uninstalling the rancher-system-agent to use a temporary script file instead of piping directly to sh.

* doc(rancher-security): improve structure and content to latest, v2.13-preview and v2.12 (#2024)

- add Rancher Kubernetes Distributions (K3s/RKE2) Self-Assessment and Hardening Guide section
- add kubernetes cluster security best practices link to rancher-security section
- add k3s-selinux and update selinux-rpm details
- remove rhel/centos 7 support

Signed-off-by: Andy Pitcher <andy.pitcher@suse.com>

* Updating across supported versions and translations.

Signed-off-by: Sunil Singh <sunil.singh@suse.com>

---------

Signed-off-by: Andy Pitcher <andy.pitcher@suse.com>
Signed-off-by: Sunil Singh <sunil.singh@suse.com>
Co-authored-by: Tejeev <tj@rancher.com>
Co-authored-by: Andy Pitcher <andy.pitcher@suse.com>
Co-authored-by: Sunil Singh <sunil.singh@suse.com>

* Update roletemplate aggregation doc and version information

* Add versioned docs

* Remove ext token and kubeconfig feature flag sections and document bearer Token

* Update corresponding v2.13 pages

* update doc for pni in gke

* Adding reverted session idle information from PR 1653

Signed-off-by: Sunil Singh <sunil.singh@suse.com>

* [2.13.0] Add versions table entry

* [2.13.0] Add webhook version

* [2.13.0] Add CSP Adapter version

* [2.13.0] Add deprecated feature table entry

* [2.13.0] Update CNI popularity stats

* Update GKE Cluster Configuration for Project Network Isolation instructions

* Fix link and port to 2.13

* [2.13.0] Add Swagger JSON

* [v2.13.0] Add info about Azure AD Roles claims (#2079)

* Add info about Azure AD roles claims compatibility

* Apply suggestions from code review

Co-authored-by: Sunil Singh <sunil.singh@suse.com>

* Add suggestions to v2.13

---------

Co-authored-by: Sunil Singh <sunil.singh@suse.com>

* [2.13.0] Remove preview designation

* user public api docs (#2069)

* user public api docs

* Apply suggestions from code review

Co-authored-by: Andreas Kupries <akupries@suse.com>

* Apply suggestions from code review

Co-authored-by: Peter Matseykanets <pmatseykanets@gmail.com>

* explain plaintext is never stored

* add users 2.13 versioned docs

* remove extra ```

* Apply suggestions from code review

Co-authored-by: Lucas Saintarbor <lucas.saintarbor@suse.com>

* add space before code block

---------

Co-authored-by: Andreas Kupries <akupries@suse.com>
Co-authored-by: Peter Matseykanets <pmatseykanets@gmail.com>
Co-authored-by: Lucas Saintarbor <lucas.saintarbor@suse.com>

* support IPv6 (#2041)

* [v2.13.0] Add Configure GitHub App page (#2081)

* Add Configure GitHub App page

* Apply suggestions from code review

Co-authored-by: Billy Tat <btat@suse.com>

* Fix header/GH URL & add suggestions to v2.13

* Apply suggestions from code review

Co-authored-by: Petr Kovar <pknbe@volny.cz>

* Apply suggestions from code review to v2.13

* Add note describing why to use Installation ID

* Apply suggestions from code review

Co-authored-by: Billy Tat <btat@suse.com>

---------

Co-authored-by: Billy Tat <btat@suse.com>
Co-authored-by: Petr Kovar <pknbe@volny.cz>

* [v2.13.0] Add info about Generic OIDC Custom Mapping (#2080)

* Add info about Generic OIDC Custom Mapping

* Apply suggestions from code review

Co-authored-by: Sunil Singh <sunil.singh@suse.com>
Co-authored-by: Billy Tat <btat@suse.com>

* Apply suggestions from code review

Co-authored-by: Sunil Singh <sunil.singh@suse.com>
Co-authored-by: Billy Tat <btat@suse.com>

* Add suggestions to v2.13

* Remove repetitive statement in intro

* Move Prereq intro/note to appropriate section

* Fix formatting, UI typo, add Custom Claims section under Configuration Reference section

* Add section about how a custom groups claim works / note about search limitations for groups in RBAC

---------

Co-authored-by: Sunil Singh <sunil.singh@suse.com>
Co-authored-by: Billy Tat <btat@suse.com>

* [v2.13.0] Add info about OIDC SLO support (#2086)

* Add shared file covering OIDC SLO support to OIDC auth pages

* Ad How to get the End Session Endpoint steps

* Add generic curl exampleto retrieve end_session_endpoint

* [2.13.0] Bump release date

---------

Signed-off-by: Andy Pitcher <andy.pitcher@suse.com>
Signed-off-by: Sunil Singh <sunil.singh@suse.com>
Co-authored-by: Lucas Saintarbor <lucas.saintarbor@suse.com>
Co-authored-by: Tejeev <tj@rancher.com>
Co-authored-by: Andy Pitcher <andy.pitcher@suse.com>
Co-authored-by: Sunil Singh <sunil.singh@suse.com>
Co-authored-by: Jonathan Crowther <jonathan.crowther@suse.com>
Co-authored-by: Peter Matseykanets <peter.matseykanets@suse.com>
Co-authored-by: Petr Kovar <petr.kovar@suse.com>
Co-authored-by: Krunal Hingu <krunal.hingu222@gmail.com>
Co-authored-by: Raul Cabello Martin <raul.cabello@suse.com>
Co-authored-by: Andreas Kupries <akupries@suse.com>
Co-authored-by: Peter Matseykanets <pmatseykanets@gmail.com>
Co-authored-by: Jack Luo <jiaqi.luo@suse.com>
Co-authored-by: Petr Kovar <pknbe@volny.cz>
2025-11-25 10:51:39 -08:00

5.0 KiB
Raw Permalink Blame History

title
title
IPv4/IPv6 Dual-stack
<head> </head>

Kubernetes supports IPv4-only, IPv6-only, and dual-stack networking configurations. For more details, refer to the official Kubernetes documentation.

Installing Rancher on IPv6-Only or Dual-Stack Clusters

Rancher can run on clusters using:

  • IPv4-only
  • IPv6-only
  • Dual-stack (IPv4 + IPv6)

When you install Rancher on an IPv6-only cluster, it can communicate externally only over IPv6. This means it can provision:

  • IPv6-only clusters
  • Dual-stack clusters
    (IPv4-only downstream clusters are not possible in this case)

When you install Rancher on a dual-stack cluster, it can communicate over both IPv4 and IPv6, and can therefore provision:

  • IPv4-only clusters
  • IPv6-only clusters
  • Dual-stack clusters

For installation steps, see the guide: Installing and Upgrading Rancher.

Requirement for the Rancher Server URL

When provisioning IPv6-only downstream clusters, the Rancher Server URL must be reachable over IPv6 because downstream nodes connect back to the Rancher server using IPv6.

Provisioning IPv6-Only or Dual-Stack Clusters

You can provision RKE2 and K3s Node driver (machine pools) or Custom cluster (existing hosts) clusters using IPv4-only, IPv6-only, or dual-stack networking.

Network Configuration

To enable IPv6-only or dual-stack networking, you must configure:

  • Cluster CIDR
  • Service CIDR
  • Stack Preference

Configuration references:

Support for Windows

Kubernetes on Windows:

Feature Support Status
IPv6-only clusters Not supported
Dual-stack clusters Supported
Services Limited to a single IP family

For more information, see the Kubernetes Documentation.

K3s does not support Windows (FAQ)

RKE2 supports Windows, but requires using either Calico or Flannel as the CNI.
Note that Windows installations of RKE2 do not support dual-stack clusters using BGP. For more details, see RKE2 Network Options.

Provisioning Node Driver Clusters

Rancher currently supports assigning IPv6 addresses in node driver clusters with:

Support for additional providers will be introduced in future releases.

:::note DigitalOcean Limitation

Creating an IPv6-only cluster using the DigitalOcean node driver is currently not supported. For more details, please see rancher/rancher#52523.

:::

Infrastructure Requirements

Cluster nodes must meet the requirements listed in the Node Requirements for Rancher Managed Clusters.

Machine pool configuration guides:

Provisioning Custom Clusters

To provision on your own nodes, follow the instructions in Provision Kubernetes on Existing Nodes.

:::note

  • Node Public IP and Node Private IP fields accept IPv4, IPv6, or both (comma-separated).

    Example: 10.0.0.5,2001:db8::1

  • In IPv6-only and dual-stack clusters, specify the nodes IPv6 address as the Private IP.

:::

Infrastructure Requirements

Infrastructure requirements are the same as above for node-driver clusters.

Other Limitations

GitHub.com

GitHub.com does not support IPv6. As a result:

  • Any application repositories ( ClusterRepo.catalog.cattle.io/v1 CR) hosted on GitHub.com will not be reachable from IPv6-only clusters.
  • Similarly, any non-builtin node drivers hosted on GitHub.com will also not be accessible in IPv6-only environments.