Skip to content

Commit 9355784

Browse files
author
Jonas Arndt
committed
Addressed review comments
1 parent 352643f commit 9355784

File tree

2 files changed

+13
-16
lines changed

2 files changed

+13
-16
lines changed

asciidoc/components/metallb.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ SUSE Edge uses MetalLB in three key ways:
3232

3333
* As a Load Balancer Solution: MetalLB serves as the Load Balancer solution for bare-metal machines.
3434
* For an HA K3s/RKE2 Setup: MetalLB allows for load balancing the Kubernetes API using a Virtual IP address.
35-
* As a L3 BGP solution where MetalLB advertises routes to the service IPs to
35+
* As an L3 BGP solution where MetalLB advertises routes to the service IPs to
3636
nearby routers.
3737

3838
[NOTE]

asciidoc/guides/metallb-k3s_l3.adoc

Lines changed: 12 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -15,15 +15,15 @@ endif::[]
1515

1616
MetalLB is a load-balancer implementation for bare-metal Kubernetes clusters, using standard routing protocols.
1717

18-
In this guide, we demonstrate how to deploy MetalLB in layer 3 (L3) mode.
18+
In this guide, we demonstrate how to deploy MetalLB in layer 3 (L3) BGP mode.
1919

2020
== Why use MetalLB
2121

2222
MetalLB is a compelling choice for load balancing in bare-metal Kubernetes clusters for several reasons:
2323

2424
. Native Integration with Kubernetes: MetalLB seamlessly integrates with Kubernetes, making it easy to deploy and manage using familiar Kubernetes tools and practices.
2525
. Bare-Metal Compatibility: Unlike cloud-based load balancers, MetalLB is designed specifically for on-premises deployments where traditional load balancers might not be available or feasible.
26-
. Supports Multiple Protocols: MetalLB supports both Layer 2 and BGP (Border Gateway Protocol) modes, providing flexibility for different network architectures and requirements.
26+
. Supports Multiple Protocols: MetalLB supports both Layer 2 and Layer 3 BGP (Border Gateway Protocol) modes, providing flexibility for different network architectures and requirements.
2727
. High Availability: By distributing load-balancing responsibilities across multiple nodes, MetalLB ensures high availability and reliability for your services.
2828
. Scalability: MetalLB can handle large-scale deployments, scaling alongside your Kubernetes cluster to meet increasing demand.
2929

@@ -33,14 +33,14 @@ The major advantage of the layer 2 mode is its universality: it works on any Eth
3333

3434
== MetalLB on K3s (using L3)
3535

36-
In this quick start, L3 mode will be used.
36+
In this quick start, L3 mode is used.
3737
This means that we need to have neighboring router(s) with BGP capabilities within
3838
the network range.
3939

4040
== Prerequisites
4141

4242
* A K3s cluster where MetalLB is going to be deployed.
43-
* Router(s) on the network that support the BGP protocol
43+
* Router(s) on the network that support the BGP protocol.
4444
* A free IP address within the network range for the service. In this example
4545
`192.168.10.100`
4646

@@ -77,7 +77,7 @@ done
7777

7878
== Configuration
7979

80-
At this point, the installation is completed. Now it is time to create an
80+
. At this point, the installation is completed. Now it is time to create an
8181
IPAddressPool:
8282

8383
[,bash]
@@ -108,7 +108,8 @@ spec:
108108
EOF
109109
----
110110

111-
We will also configure a BGPPeer. Note that the FRR router has ASN 1000 while
111+
[start=2]
112+
. We will also configure a BGPPeer. Note that the FRR router has ASN 1000 while
112113
our BGPPeer will have 1001. We can also see that the FRR Router has an IP
113114
address that is 192.168.3.140.
114115

@@ -128,7 +129,8 @@ spec:
128129
EOF
129130
----
130131

131-
After this we will need to create the BGPAdvertisement (L3):
132+
[start=3]
133+
. After this we will need to create the BGPAdvertisement (L3):
132134

133135
[,bash]
134136
----
@@ -146,9 +148,7 @@ EOF
146148

147149
== Usage
148150

149-
At this point we can create an example application with a service. In our case
150-
that service will have the IP address from our IPAddressPool: 192.168.10.100.
151-
151+
Create an example application with a service. In this case, IP address from the `IPAddressPool` is `192.168.10.100` for that service.
152152

153153
[,bash]
154154
----
@@ -199,8 +199,7 @@ EOF
199199
----
200200

201201

202-
Let us see it in action: If you log onto the FRR Router you can see the routes
203-
created from the BGP advertisement
202+
To verify, log onto the FRR Router to can see the routes created from the BGP advertisement.
204203

205204
[,console]
206205
----
@@ -231,9 +230,7 @@ NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S)
231230
hello-kubernetes LoadBalancer 10.43.127.75 192.168.122.11 80:31461/TCP 8s
232231
----
233232

234-
If this router is the default gateway for your network, you can run a simple
235-
curl command from a box on that network to verify that they can reach the httpd
236-
sample app:
233+
If this router is the default gateway for your network, you can run the `curl` command from a box on that network to verify that they can reach the httpd sample app
237234

238235
[,console]
239236
----

0 commit comments

Comments
 (0)