Connect to an OKE Cluster using the local access option

From Iwan
Jump to: navigation, search

This tutorial will guide you through connecting to an Oracle Kubernetes Engine (OKE) cluster using the local access option. By the end of this guide, you'll be able to configure your local machine to interact with your OKE cluster securely and efficiently. This connection method is essential for managing your cluster resources, deploying applications, and troubleshooting issues from your local environment. Whether you're a beginner or experienced with Kubernetes, this step-by-step approach will ensure a smooth and straightforward setup.

When you look at the networking part of the Kubernetes cluster, you can see different Kubernetes OCI/OKE network architectures that can be used for deployment.

[Deploy a highly available Kubernetes cluster in a region with three availability domains with the use of Kubernetes Engine (OKE)].

In some cases, you want to deploy the API Endpoint with a PRIVATE IP address. When you do this, the Kubernetes cluster can not be managed using OCI's CLoudShell CLI application or from another machine connected to the Internet. You need to select the "Local Access" option here. But before we can connect with the local access option, we first need to set up an Instance that can act as a Bastion.

29a4a0c161fe3b0f1ab31cafb2833bb4.png

The Steps

  • [ ] STEP 01: Make sure a Kubernetes cluster is deployed on OKE
  • [ ] STEP 02: Create a new Linux Instance (acting as Bastion)
  • [ ] STEP 03: Create a new Bastion and Session
  • [ ] STEP 04: Setup OCI CLI
  • [ ] STEP 05: Configure OCI CLI
  • [ ] STEP 06: Access the Kubernetes cluster using Local CLI

STEP 01 - Make sure a Kubernetes cluster is deployed on OKE

Make sure you have a deployed Kubernetes Cluster on OCI's OKE.

If you have not deployed Kubernetes on OKE yet, use the following tutorials to do so first.

  • Navigate to Developer Services > Kubernetes Clusters (OKE).
  • Click on the cluster.

7c40c439d6cfa8f4b26979f06672061c.png

Click on the Access Cluster button.

5bf708bc9a693e4fe1541968a6800659.png

Select the Local Access option.

Notice that some commands are provided that you will need later once the Bastion has been created and configured correctly.

F6c2d62b81ba75b168bcf6bc2240dd7b.png

STEP 02 - Create a new Linux Instance acting as Bastion

Now that you have the Kubernetes Cluster on OKE ready, we need to create the Bastion, but before we do this, we first need to do a little bit of Infrastructure preparation.

  • STEP 2-1: Create a bastion-private-sec-list security with below Ingress and Egress Rule
  • STEP 2-2: Create a bastion-public-sec-list security with below Ingress and Egress Rules
  • STEP 2-3: Create the bastion-route-table with Internet Gateway so that we can add to the bastion instance for internet access
  • STEP 2-4: Next create a Regional Public Subnet for the bastion instance with the name bastion-subnet.
  • STEP 2-5: Add the bastion-private-sec-list to the Worker Private Subnet so that the bastion instance can access the Worker nodes
  • STEP 2-6: Create Compute Instance oke-bastion
  • STEP 2-7: Get the Public IP of the Bastion Instance BastionHost to SSH into the Bastion instance
  • STEP 2-8: Login to bastion host as below
Note

In this step, I am deploying a Bastion Instance in a PUBLIC SUBNET, but when using the Bastion Service and Session (later in this article), it is better to deploy the Bastion Instance on a PRIVATE SUBNET. I am not doing this in this tutorial because I want to showcase the flexibility and various options.

STEP 2-1 - Create a bastion-private-sec-list security with below Ingress and Egress Rule

Before we start, we will first determine that the new Subnet where the new Bastion Instance will be located will be 10.0.5.0/24. We need this to create the Security lists properly.

  • Navigate to Networking > Virtual Cloud Networks.
  • Select the VCN where your Kubernetes Cluster is deployed in.
  1. Click on Security Lists.
  2. Click on the Create Security List button.
  3. Specify a Security List Name.
  4. Click on the + Another Ingress Rule button.

7d19345796d92a4343ee356f797a4562.png

  1. Specify the source type to be: CIDR.
  2. Specify the source to be the Subnet of the Bastion Instance (10.0.5.0/24).
  3. Specify the IP Protocol to be: TCP
  4. Specify the Destination Port to be 22.
  5. Click on the + Another Ingress Rule button

59cfab3c42faeb585784ebae7b1c4081.png

  1. Specify the source type to be: CIDR.
  2. Specify the source to be the Subnet of the Bastion Instance (10.0.5.0/24).
  3. Specify the IP Protocol to be: ICMP
  4. Scroll down.

12d58e2776c13e53bcccbb2c66aec5bf.png

Click on the + Another Egress Rule button.

58da5fc432d1387d7239b687a3e86e6c.png

  1. Specify the destination type as: CIDR.
  2. Specify the source to be everything (0.0.0.0/0).
  3. Specify the IP Protocol to be: All Protocols
  4. Click on the Create Security List button.

883012698a89fcc2ec0a347221f05546.png

Notice the new security list has been created. Click on it to verify the rules.

7223c8313f373a57bcda2da880e6023d.png

  1. Click on Ingress Rules.
  2. Notice that the rules that we have just created are present.

00d4f8c97111c0c188d83a47fab0f536.png

  1. Click on Egress Rules.
  2. Notice that the rule that we have just created is present.

78c97a2d264fb3eb752901764b4264bc.png

STEP 2-2 - Create a bastion-public-sec-list security with below Ingress and Egress Rules

Click on the Create Security List button.

3eb755cfcf118aa9f2573e33b991bc02.png

  1. Specify a Security List Name.
  2. Click on the + Another Ingress Rule button.

Ccaf1b2f78be278a160c2e768595160f.png

  1. Specify the source type to be: CIDR.
  2. Specify the source to be the Subnet of the Bastion Instance (10.0.5.0/24).
  3. Specify the IP Protocol to be: ICMP
  4. Click on the + Another Ingress Rule button.

7517dc9efbd9eb346fea1bb1a0c30427.png

  1. Specify the source type to be: CIDR.
  2. Specify the source to be everything (0.0.0.0/0).
  3. Specify the IP Protocol to be: TCP
  4. Specify the Destination Port to be 22.
  5. Click on the + Another Ingress Rule button

852ca84563084664deefb6aa4a05d68a.png

  1. Specify the source type to be: CIDR.
  2. Specify the source to be everything (0.0.0.0/0).
  3. Specify the IP Protocol to be: ICMP
  4. Click on the + Another Egress Rule button.

Bfa66742c8d253f84c628c7e95f8b7a5.png

  1. Specify the destination type to be: CIDR.
  2. Specify the source to be everything (0.0.0.0/0).
  3. Specify the IP Protocol to be: All Protocols
  4. Click on the Create Security List button.

B10f6201283d63e8786ef64e2eaa9bb2.png

Notice the new security list has been created. Click on it to verify the rules.

A331e3833aa83b012ab6ba50eaf38359.png

  1. Click on Ingress Rules.
  2. Notice that the rules that we have just created are present.

8c8ffa083e756979f92d1d758bd24cb4.png

  1. Click on Egress Rules.
  2. Notice that the rule that we have just created is present.

6b2f66b207ae86bf2b2a3b5aa20cf688.png

STEP 2-3 - Create the bastion-route-table with Internet Gateway so that we can add to the bastion instance for internet access

Note

Make sure you have created an Internet Gateway in the VCN; if this is not there, please create one first.

>

  1. Click on Route Tables.
  2. Click on the Create Route Table button.

3561b8cdcac7ece2fc2c4e00e3cdcd83.png

  1. Specify a Name.
  2. Click on the + Another Route Rule button.

1bc7f7cb2215def57678a1dcdd0da218.png

  1. Specify the target type as Internet Gateway.
  2. Specify the destination to be: 0.0.0.0/0.
  3. Select the existing Internet Gateway.
  4. Click on the Create button.

111a01a2d24e5492c5b5eabfae21418e.png

Notice that the new route table is created. Click on it to verify the rules.

8b36d17a23c467b0be2365a495631b1f.png

  1. Notice that the rule that we have just created is present.
  2. Click on VCN to go back to the VCN page.

Dfc1dff8b3a48049707af837897d569c.png

STEP 2-4 - Next, create a Regional Public Subnet for the bastion instance with the name bastion-subnet

Click on Subnets.

478dfaf292ffd40acee49797ad156de9.png

  1. Specify a Name.
  2. Select Regional.
  3. Specify an IPv4 CIDR Block: 10.0.5.0/24.
  4. Scroll down.

F662d954391401b036bbe8ca2110efee.png

  1. Select the route table we have created in the previous step.
  2. Select Public Subnet.
  3. Scroll down.

77c4405c67f60007002f899216d524fc.png

  1. Select the default DHCP Options.
  2. Select the Security List we created in one of the previous steps for the public subnet.
  3. Click on the Create Subnet button.

Bcb14a557494e72edd00527cc4d7b7b1.png

Notice that the new Subnet has been created.

76a425d384c6405128151de9f1c8c405.png

STEP 2-5: Add the bastion-private-sec-list to the Worker Private Subnet so that the bastion instance can access the Worker nodes

  1. Click on Subnets.
  2. Click on the Subnet to which your Kubernetes (Worker) Nodes are connected.

F6825e72a5f8e92248a864cc640e412c.png

  1. Click on Security Lists.
  2. Click on the Add Security List button.

1b30b34ee4613857536e90c18fece7c9.png

  1. Select the Security List for the Private Subnet we created in one of the previous steps.
  2. Click on the Add Security List button.

2544245ca34e5206d23950dfdbfc8532.png

Notice that the security list has been added to the (Kubernetes worker node) Subnet.

F540b8ff5613faa94bb474c61e4e9d41.png

STEP 2-6 - Create Compute Instance oke-bastion

Now that we have all the Security lists, subnets, and Routing Rules in place, we can create the Bastion Instance.

  • Navigate to Compute > Instances.
  • Click on the Create Instance button.

Cda94ec49b3257b985b29b5026c3105f.png

  1. Specify a Name.
  2. Scroll down.

36df68128b2d61a1eb4c7c9692b4a440.png

Scroll down.

E30ec69bb57a52829097f955882498c9.png

  1. Select the VCN you are using (the one you created the Subnet in the previous steps).
  2. Select the Subnet you just created.

Df5526e636f23ade67196cc89be3e1a1.png

Scroll down.

9271fb0a8d17a3c2fa90bed087e08f58.png

Note

In the example below, I used an existing public key. You can also choose to Generate the Key pair, but if you do this, save it because you will need it later. In [this] article I explain how you create an instance with the "Generate a key pair option".

  1. Select upload public key files.
  2. Click on Browse.
  3. Make sure an existing public key is selected.
  4. Scroll down.

1dfdb7cdbdf04d2bb8990fc1f5fedbe8.png

Click on the Create button.

2b72829e8c8a9b68fc4f9d64235e245a.png

Notice the Instance has the PROVISIONING state.

5c7f19dbf8b781eaa40712f8add8015e.png

STEP 2-7 - Get the Public IP of the Bastion Instance BastionHost to SSH into the Bastion instance

  1. When the Instance is fully deployed, It will be in the RUNNING state.
  2. Collect the Public IP address.

6ae2ba9baaf27a254fdf25b8208d573c.png

STEP 2-8 - Log in to Bastion host as below

Open a terminal (or another application that you can use to set up SSH connections)

  1. Change the directory to where your private and public key is stored.
  2. Issue the command to connect with SSH to the Instance Public IP address using the private key.
  3. Type yes to continue.
  4. Notice that you are now logged in to the Instance.
  5. Issue this command to get the private IP address of the Instance.
  6. Notice that the Instance has an IP address of 10.0.5.62/24 in the Subnet of 10.0.5.0/24.

F474465b62205c92ce2165f138f41684.png

STEP 03 - Create a new Bastion and Session

We can use the Bastion Instance as a standalone host or the Bastion Service (or Bastion Session).

To do this, we need to install the Bastion plugin and create a Bastion session.

> [!What are the benefits of a Bastion + Session?] >When you deploy an instance within a Private Subnet, it is not directly accessible from the Internet. > >However, setting up a Bastion and initiating a Bastion session can make the private Instance accessible. This allows the Instance to act as a stepping stone for managing other resources within your OCI environment.

Install the Bastion plugin on the Instance created in the previous step

Browse to the Instance that we created in the previous step.

  1. Click on the Oracle Cloud Agent tab.
  2. Scroll down.

4bde087706721f38d692d62cfaab891f.png

  1. Set the Bastion setting to Enabled.
  2. At first, you might see the service set to "stopped." This will change after a few minutes.
Note

To deploy the Bastion plugin, the Instance needs access to the Internet through a NAT gateway or Internet Gateway, as the plugin is downloaded from the Internet. When the plugin status remains Stopped, check your internet connectivity.

> You can also try to [manually install the Oracle Cloud Agent Software].

961a1b81025eddbe1256589582fafc84.png

When the Oracle Cloud Agent Software is installed successfully, the status will change to Running.

C5c0523719bdd97b4e37a2421d4fb558.png

Create the Bastion

Navigate to Identity Security > Bastion.

  1. Click on the Create bastion button.

9f062090359d34eb4417a546d57fbbce.png

  1. Specify a name.
  2. Select the VCN where the Bastion Instance is in (and the Kubernetes Cluster).
  3. Select the Subnet where your Bastion Instance is located.
  4. Specify an allowlist. To allow everything, use 0.0.0.0/0.
  5. Click on the Create bastion button.

5d3cc89c7f652ae88a70e3ddcf40da16.png

Notice the Bastion status is Creating.

2f7d2454ba5d0eb68c0eb821056ec8e7.png

  1. When the Bastion has been created successfully, the status will change to Active.
  2. Click on the Bastion.

F5038fc53ac24056679ac7a8230850dd.png

Click on the Create session button.

881294f752fb4a81501bc675dc4df94e.png

  1. Specify the session type to be: Managed SSH session.
  2. Provide a name.
  3. Provide the username of the Bastion Instance you created earlier.
  4. Select the Bastion Instance you created earlier
  5. Select: Choose SSH key file.
  6. Click browse.
  7. Make sure you select the public key of the Bastion Instance you created earlier.
  8. Click on the Create session button.
Note

In this example, I am using the SAME SSH keypair I used for the Bastion Instance for simplicity. In your case, I suggest you create (or use) a keypair different from the one you used for the Bastion Instance.

56cc84ace33293f24566a516c838f4e8.png

Get the SSH command of the bastion session

  1. Notice that the Bastion Session is created.
  2. Click on the three dots.
  3. Select Copy SSH command.

480d79a2a6d093a586d80d2fc610834e.png

Login to bastion host as below

Open a terminal (or another application that you can use to set up SSH connections)

  1. Paste in the copied SSH command in the terminal.
  2. Type yes to continue (for the Bastion SSH Session).
  3. Type yes to continue (for the Instance SSH Session).
  4. Notice that you are now logged in to the Instance (through a Bastion Session).
Note

This is a different way of connecting to the Bastion Instance that we showed earlier. Now, we are connecting to the Bastion Instance through a Bastion Session, and earlier, we connected directly with SSH to the Bastion Instance.


Cdca3f9803df744cccdf017e12722385.png

STEP 04 - Setup OCI CLI

Now that we have successfully set up the Bastion Instance, the Bastion, and the Bastion Session and verified connectivity, we need to set up OCI CLI so we can perform CRUD (create, read, update, and delete) operations inside our OCI environment.

Issue the following command to update the installed software.

[opc@oke-bastion-instanc ~]$ sudo dnf update

8c75b1df3bf6eddd10b5378df0a0c3a8.png

To confirm the update, type in: y

82cb49e77ee20f28a0bbb2e402c2d5f3.png

Notice that the update is completed.

9146b03b56fc881710146b5c748c770f.png

  1. Issue the following command to install Oracle Developer Release.
  2. In my case, this is already installed. If this is not installed for you, please continue with the installation.
[opc@oke-bastion-instanc ~]$ sudo dnf -y install oraclelinux-developer-release-el8

9b4116944153964a81a288d43b692cc1.png

  1. Issue the following command to install OCI CLI.
  2. To confirm the installation type in: y
[opc@oke-bastion-instanc ~]$ sudo dnf install python36-oci-cli

B335cd6c26ac7acbb5e26506bdcaff14.png

Notice that the installation is completed.

82c4583aba849dcaec3dcde2a800bec2.png

  1. Issue the following command to verify the installed OCI CLI version.
  2. Notice that the OCI CLI version is now 3.49.0.
[opc@oke-bastion-instanc ~]$ oci -v

42757775a089551135f5d3a1b56d9a90.png

STEP 05 - Configure OCI CLI

Now that the OCI CLI is installed, we need to add some configuration to ensure that the CLI can authenticate on your OCI tenant so you can perform CRUD operations.

Issue the following commands to create a new hidden directory inside your home folder.

[opc@oke-bastion-instanc ~]$ mkdir  ~/.oci/

Issue the following command to change the directory to the one you just created.

[opc@oke-bastion-instanc ~]$ cd  ~/.oci/

Issue the following command to generate a new key pair (public and private key). I am not using any passwords so that I will be typing "N/A" in the passphrase question.

[opc@oke-bastion-instanc .oci]$ oci setup keys

Issue the following command to verify if your keypair has been generated successfully.

[opc@oke-bastion-instanc .oci]$ ls -l

3eadf9b389e48c05f012a9470f72b820.png

Issue the following command to get the public key's content. Make sure you copy this, as you will need it later.

[opc@oke-bastion-instanc .oci]$ cat ~/.oci/oci_api_key_public.pem

312f9157e5015a3e49f954ad3293acfb.png

  1. Inside the OCI console, click on the profile button in the upper right corner.
  2. Click on My Profile.

23ee53c29eb5bfc4e991f20ce8b1bd20.png

Scroll down.

C54cdc00907e1ff7e99852d754d3db32.png

  1. Click on API keys.
  2. Click on the Add API key button.

1d68c88c9ed44d544831e5403478f2f7.png

  1. Select the Paste a public key option.
  2. Paste the public key you just collected from the Bastion (Instance).

1027498dc2ff32db8bb1821d8d101ef5.png

  1. Copy the configuration file.
  2. Click on the Close button.

8edaf5113701014383531682aaddba67.png

Below, you will find an output of the copied configuration. Note that the only thing that needs to be changed is the path to your private key file (the one you just generated).

[DEFAULT]
user=ocid1.user.oc1..aaaaaaaavgrv6wsnnzhtwpjmyqtdqbq7kacfdfooz5uta3ludvfuwibe23aq
fingerprint=a7:ff:fb:20:18:75:31:7d:b0:7c:04:8f:0c:cb:98:23
tenancy=ocid1.tenancy.oc1..aaaaaaaabh2affulc4dt4tqs7lbojyhqi6hzn5mjllxlnuqnletufsofoyvq
region=eu-frankfurt-1
key_file=<path to your private keyfile> # TODO

Issue the following command to create the (OCI CLI) config file.

[opc@oke-bastion-instanc .oci]$ nano ~/.oci/config
  1. Copy the content of the config provided by the OCI console in the config file
  2. Change the private key file location.
[DEFAULT]
user=ocid1.user.oc1..aaaaaaaavgrv6wsnnzhtwpjmyqtdqbq7kacfdfooz5uta3ludvfuwibe23aq
fingerprint=a7:ff:fb:20:18:75:31:7d:b0:7c:04:8f:0c:cb:98:23
tenancy=ocid1.tenancy.oc1..aaaaaaaabh2affulc4dt4tqs7lbojyhqi6hzn5mjllxlnuqnletufsofoyvq
region=eu-frankfurt-1
key_file=~/.oci/oci_api_key.pem

Make sure you save and exit the config file correctly.

5af777dd67b7f88e4dd2ef677dd9dc58.png

Issue the following command to make sure the config file is created.

[opc@oke-bastion-instanc .oci]$ ls -l

Fcade04e487a58c1cbfbbb448d0569e8.png

The [Oracle Cloud Infrastructure CLI Command Reference] is a good place to start and look up some commands you can use.

  1. Issue the following command to review all resource types that are configured in your tenant.
[opc@oke-bastion-instanc .oci]$ oci search resource-type list --all --output table --query "data [*].{Name:name}"
  1. Notice the warning that the permissions on the config file are too open; we will fix this later.
  2. Notice the output of all the resource types configured in your tenant.

Ec01aee08f44fd923aa96d626dc950ae.png

861db314e2b33294459fca033cbf62fa.png

Issue the following command to fix the file permissions of the config file.

[opc@oke-bastion-instanc .oci]$ oci setup repair-file-permissions --file /home/opc/.oci/config

C37dc5c0ca8ee4d5a4cd657376b83e20.png

  1. Issue the following command to retrieve a list of all the Regions to which your tenant is subscribed.
[opc@oke-bastion-instanc .oci]$ oci iam region list
  1. Notice the output of all the Regions your tenant is subscribed to.

D9329e74888b38989e148ba09b09feb9.png

  1. Issue the following command to list your tenant's configured compartments.
[opc@oke-bastion-instanc .oci]$ oci iam compartment list
  1. Notice the output of all the Compartments of your tenant.

F3a9be321e9b7a71c440e4c56513769c.png

Using OCI CLI in Interactive Mode

You can also use OCI CLI in [Interactive Mode]. This way, OCI CLI will provide you the commands and following keywords in the command that you can use to get your full command that you require eventually.

  1. Issue the following command to start OCI CLI in interactive mode.
[opc@oke-bastion-instanc .oci]$ oci -i
  1. Notice the OCI CLI interactive mode prompt.
  2. Notice the message to use Tab to autocomplete commands, and Enter to execute command, or the CTRL + D to quit the interactive mode.

701fd68cd55f12e80add1230f857611d.png

  1. Press Tab to get the first level of commands.
  2. Notice the available first level of commands.

2db726134603c96bb766534ca1f4fc3a.png

Type in ia and use Tab to show the available command options.

002a34512dbe309c5b2a3c1ae97777fb.png

Type in iam compartment and use Tab to show the available command options.

E1c14de6e29e17922bf2489b7b689a42.png

Use Tab to autocomplete the word compartment. So you now have the command iam compartment.

Ac33da4c464e55727142742f7fb2e976.png

Use Tab to show the next available option for the iam compartment command.

E3f783c4d7eaf203a9a7848947b86ab4.png

  1. Type in the list and execute the full command iam compartment list
  2. Notice the output of all the Compartments of your tenant.

36a8582c8c8594e9d828c794b564af8e.png

STEP 06 - Access the Kubernetes cluster using Local CLI

If you are not sure if or what version of the OCI CLI you currently have installed, check with this command:

oci -v
If OCI CLI is not installed, use the previous steps to install and configure it.
  1. Create a directory to contain the kubeconfig file.
mkdir -p $HOME/.kube
  1. To access the kubeconfig for your cluster via the VCN-Native public endpoint, copy the following command:
oci ce cluster create-kubeconfig --cluster-id ocid1.cluster.oc1.eu-frankfurt-1.aaaaaaaagwiamspaz7h4prpgfn56boa7bgvobbicxj75gd7chc27su6o56kq --file $HOME/.kube/config --region eu-frankfurt-1 --token-version 2.0.0  --kube-endpoint PUBLIC_ENDPOINT
  1. To access the kubeconfig for your cluster via the VCN-Native private endpoint, copy the following command:
oci ce cluster create-kubeconfig --cluster-id ocid1.cluster.oc1.eu-frankfurt-1.aaaaaaaagwiamspaz7h4prpgfn56boa7bgvobbicxj75gd7chc27su6o56kq --file $HOME/.kube/config --region eu-frankfurt-1 --token-version 2.0.0  --kube-endpoint PRIVATE_ENDPOINT
  1. To set your KUBECONFIG environment variable to the file for this cluster, use:
export KUBECONFIG=$HOME/.kube/config

88b44e7e131b1dd4c61516576e4352b9.png

  1. Download the latest Kubernetes release with the command:
[opc@oke-bastion-instanc ~]$ curl -LO "https://storage.googleapis.com/kubernetes-release/release/$(curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt)/bin/linux/amd64/kubectl"
  1. Make the kubectl application executable with the command:
[opc@oke-bastion-instanc ~]$ chmod +x ./kubectl
  1. Move the kubectl application to a location where the $PATH variable is active so you can execute the kubectl command from anywhere.
[opc@oke-bastion-instanc ~]$ sudo mv ./kubectl /usr/local/bin/kubectl

447a4de056c0ed72e73b69709c2f321d.png

  1. Issue this command to get your Kubernetes Cluster Information:
[opc@oke-bastion-instanc ~]$ kubectl cluster-info
  1. Issue this command to get the Kubernetes Client and Server versions.
[opc@oke-bastion-instanc ~]$ kubectl version
  1. Issue this command to get all the worker nodes in the Kubernetes cluster.
[opc@oke-bastion-instanc ~]$ kubectl get nodes

E1ea7167c9ee1b269d3f68c61dbb3fdf.png

Conclusion

In conclusion, connecting to your Oracle Kubernetes Engine (OKE) cluster using the local access option allows you to easily manage and interact with your cluster resources from your local environment. Following the steps outlined in this tutorial, you've set up a secure connection and can now deploy, monitor, and maintain applications on your OKE cluster. With this setup, you can efficiently handle administrative tasks, troubleshoot issues, and optimize your workflows. Keep these configurations handy for future reference, and feel free to explore further customization options to suit your specific needs.