@@ -338,17 +338,15 @@ brctl delbr docker0
338338```
339339
340340The way you configure docker will depend in whether you have chosen the routable-vip or overlay-network approaches for your network.
341- Some docker options will want to think about :
342- - create your own bridge for the per-node CIDR ranges, and set ` --bridge=cbr0 ` and ` --bip=false ` . Or let docker do it with ` --bip=true ` .
343- - ` --iptables=false ` so docker will not manipulate iptables for host-ports (too coarse on older docker versions, may be fixed in newer versions)
341+ Some suggested docker options:
342+ - create your own bridge for the per-node CIDR ranges, call it cbr0, and set ` --bridge=cbr0 ` option on docker.
343+ - set ` --iptables=false ` so docker will not manipulate iptables for host-ports (too coarse on older docker versions, may be fixed in newer versions)
344344so that kube-proxy can manage iptables instead of docker.
345345 - ` --ip-masq=false `
346346 - if you have setup PodIPs to be routable, then you want this false, otherwise, docker will
347347 rewrite the PodIP source-address to a NodeIP.
348348 - some environments (e.g. GCE) still need you to masquerade out-bound traffic when it leaves the cloud environment. This is very environment specific.
349349 - if you are using an overlay network, consult those instructions.
350- - ` --bip= `
351- - should be the CIDR range for pods for that specific node.
352350 - ` --mtu= `
353351 - may be required when using Flannel, because of the extra packet size due to udp encapsulation
354352 - ` --insecure-registry $CLUSTER_SUBNET `
@@ -401,7 +399,7 @@ Arguments to consider:
401399
402400### Networking
403401Each node needs to be allocated its own CIDR range for pod networking.
404- Call this ` NODE_X_POD_CIDR ` .
402+ Call this ` NODE_X_POD_CIDR ` .
405403
406404A bridge called ` cbr0 ` needs to be created on each node. The bridge is explained
407405further in the [ networking documentation] ( ../admin/networking.md ) . The bridge itself
0 commit comments