Each method for configuring access to a virtual machine (VM) has advantages and limitations, depending on the traffic load and client requirements.
Services provide excellent performance and are recommended for applications that are accessed from outside the cluster.
If the internal cluster network cannot handle the traffic load, you can configure a secondary network.
virtctl ssh and virtctl port-forwarding commands
-
-
Simple to configure.
-
Recommended for troubleshooting VMs.
-
virtctl port-forwarding recommended for automated configuration of VMs with Ansible.
-
Not recommended for high-traffic applications like Rsync or Remote Desktop Protocol because of the burden on the API server.
-
The API server must be able to handle the traffic load.
-
The clients must be able to access the API server.
-
The clients must have access credentials for the cluster.
- Cluster IP service
-
- Node port service
-
- Load balancer service
-
- Secondary network
-
-
Excellent performance because traffic does not go through the internal cluster network.
-
Allows a flexible approach to network topology.
-
Guest operating system must be configured with appropriate security because the VM is exposed directly to the secondary network. If a VM is compromised, an intruder could gain access to the secondary network.