 Rancher Kubernetes Engine 2, VMWare vSANwill be deployed. $ kubectl create ns Rancher Kubernetes Engine 2, VMWare vSANwill be deployed. $ kubectl create ns- $ kubectl get ns 5.1.2 Creating cert file to access the secure private registry Create a le named cert that contains the SSL certificate chain cert_with_cr > cert $ kubectl -n - create secret generic cmcertificates --from-file=cert 5.2 Downloading the SLC Bridge The SLC Bridge can be obtained: from the SAP software center and that is suitable for input to text formatters or for automatic translation to a variety of formats suitable for input to text formatters. A copy made in an otherwise Transparent le format whose 0 码力 | 29 页 | 213.09 KB | 1 年前3
 CIS 1.6 Benchmark - Self-Assessment Guide - Rancher v2.5.41.19 Ensure that the Kubernetes PKI directory and file ownership is set to root:root (Automated) 1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 644 or more restrictive (Automated) (Automated) 1.1.21 Ensure that the Kubernetes PKI key file permissions are set to 600 (Automated) 1.1.1 Ensure that the API server pod specification file permissions are set to 644 or more restrictive (Automated) Ensure that the API server pod specification file ownership is set to root:root (Automated) 1.1.3 Ensure that the controller manager pod specification file permissions are set to 644 or more restrictive0 码力 | 132 页 | 1.12 MB | 1 年前3 CIS 1.6 Benchmark - Self-Assessment Guide - Rancher v2.5.41.19 Ensure that the Kubernetes PKI directory and file ownership is set to root:root (Automated) 1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 644 or more restrictive (Automated) (Automated) 1.1.21 Ensure that the Kubernetes PKI key file permissions are set to 600 (Automated) 1.1.1 Ensure that the API server pod specification file permissions are set to 644 or more restrictive (Automated) Ensure that the API server pod specification file ownership is set to root:root (Automated) 1.1.3 Ensure that the controller manager pod specification file permissions are set to 644 or more restrictive0 码力 | 132 页 | 1.12 MB | 1 年前3
 CIS Benchmark Rancher Self-Assessment Guide - v2.4server pod specification file permissions are set to 644 or more restrictive (Scored) Result: Not Applicable Remediation: RKE doesn’t require or maintain a configuration file for the API server. All configuration the API server pod specification file ownership is set to root:root (Scored) Result: Not Applicable Remediation: RKE doesn’t require or maintain a configuration file for the API server. All configuration manager pod specification file permissions are set to 644 or more restrictive (Scored) Result: Not Applicable Remediation: RKE doesn’t require or maintain a configuration file for the controller manager0 码力 | 54 页 | 447.77 KB | 1 年前3 CIS Benchmark Rancher Self-Assessment Guide - v2.4server pod specification file permissions are set to 644 or more restrictive (Scored) Result: Not Applicable Remediation: RKE doesn’t require or maintain a configuration file for the API server. All configuration the API server pod specification file ownership is set to root:root (Scored) Result: Not Applicable Remediation: RKE doesn’t require or maintain a configuration file for the API server. All configuration manager pod specification file permissions are set to 644 or more restrictive (Scored) Result: Not Applicable Remediation: RKE doesn’t require or maintain a configuration file for the controller manager0 码力 | 54 页 | 447.77 KB | 1 年前3
 CIS 1.5 Benchmark - Self-Assessment Guide - Rancher v2.5server pod specification file permissions are set to 644 or more restrictive (Scored) Result: Not Applicable Remediation: RKE doesn’t require or maintain a configuration file for the API server. All configuration the API server pod specification file ownership is set to root:root (Scored) Result: Not Applicable Remediation: RKE doesn’t require or maintain a configuration file for the API server. All configuration manager pod specification file permissions are set to 644 or more restrictive (Scored) Result: Not Applicable Remediation: RKE doesn’t require or maintain a configuration file for the controller manager0 码力 | 54 页 | 447.97 KB | 1 年前3 CIS 1.5 Benchmark - Self-Assessment Guide - Rancher v2.5server pod specification file permissions are set to 644 or more restrictive (Scored) Result: Not Applicable Remediation: RKE doesn’t require or maintain a configuration file for the API server. All configuration the API server pod specification file ownership is set to root:root (Scored) Result: Not Applicable Remediation: RKE doesn’t require or maintain a configuration file for the API server. All configuration manager pod specification file permissions are set to 644 or more restrictive (Scored) Result: Not Applicable Remediation: RKE doesn’t require or maintain a configuration file for the controller manager0 码力 | 54 页 | 447.97 KB | 1 年前3
 Rancher CIS Kubernetes v.1.4.0 Benchmark Self
AssessmentPass 1.1.2 - Ensure that the --basic-auth-file argument is not set (Scored) Audit docker inspect kube-apiserver | jq -e '.[0].Args[] | match("--basic-auth-file=.*").string' Returned Value: null Result: 1.1.20 - Ensure that the --token-auth-file parameter is not set (Scored) Audit docker inspect kube-apiserver | jq -e '.[0].Args[] | match("--token-auth-file=.*").string' Returned Value: null Result: that the --service-account-key-file argument is set as appropriate (Scored) Audit docker inspect kube-apiserver | jq -e '.[0].Args[] | match("--service-account-key-file=.*").string' Returned Value:0 码力 | 47 页 | 302.56 KB | 1 年前3 Rancher CIS Kubernetes v.1.4.0 Benchmark Self
AssessmentPass 1.1.2 - Ensure that the --basic-auth-file argument is not set (Scored) Audit docker inspect kube-apiserver | jq -e '.[0].Args[] | match("--basic-auth-file=.*").string' Returned Value: null Result: 1.1.20 - Ensure that the --token-auth-file parameter is not set (Scored) Audit docker inspect kube-apiserver | jq -e '.[0].Args[] | match("--token-auth-file=.*").string' Returned Value: null Result: that the --service-account-key-file argument is set as appropriate (Scored) Audit docker inspect kube-apiserver | jq -e '.[0].Args[] | match("--service-account-key-file=.*").string' Returned Value:0 码力 | 47 页 | 302.56 KB | 1 年前3
 Rancher Hardening Guide Rancher v2.1.xCreate a Kubernetes encryption configuration file on each of the RKE nodes that will be provisioned with the controlplane role: Rationale This configuration file will ensure that the Rancher RKE cluster run: stat /etc/kubernetes/encryption.yaml Ensure that: The file is present The file mode is 0600 The file owner is root:root The file contains: apiVersion: v1 kind: EncryptionConfig resources: and an empty configuration file: Rancher_Hardening_Guide.md 11/30/2018 4 / 24 head -c 32 /dev/urandom | base64 -i - touch /etc/kubernetes/encryption.yaml Set the file ownership to root:root and the0 码力 | 24 页 | 336.27 KB | 1 年前3 Rancher Hardening Guide Rancher v2.1.xCreate a Kubernetes encryption configuration file on each of the RKE nodes that will be provisioned with the controlplane role: Rationale This configuration file will ensure that the Rancher RKE cluster run: stat /etc/kubernetes/encryption.yaml Ensure that: The file is present The file mode is 0600 The file owner is root:root The file contains: apiVersion: v1 kind: EncryptionConfig resources: and an empty configuration file: Rancher_Hardening_Guide.md 11/30/2018 4 / 24 head -c 32 /dev/urandom | base64 -i - touch /etc/kubernetes/encryption.yaml Set the file ownership to root:root and the0 码力 | 24 页 | 336.27 KB | 1 年前3
 Deploying and ScalingKubernetes with Rancher
on right top corner. You can input all parameters one by one or simply upload a JSON/YAML format file with specifications of the object to be created. 2.4.3 GUI-Based CRUD Operations for Kubernetes frontend Open the Kubernetes Dashboard, click on “Create” and upload the newlymodified service file. Similarly also deploy other .yml files in the guestbook directory. After you have created 24 DEPLOYING AND SCALING KUBERNETES WITH RANCHER You can also generate the configuration file from “Generate config” button at the top – and along with a local executable of kubectl, interact0 码力 | 66 页 | 6.10 MB | 1 年前3 Deploying and ScalingKubernetes with Rancher
on right top corner. You can input all parameters one by one or simply upload a JSON/YAML format file with specifications of the object to be created. 2.4.3 GUI-Based CRUD Operations for Kubernetes frontend Open the Kubernetes Dashboard, click on “Create” and upload the newlymodified service file. Similarly also deploy other .yml files in the guestbook directory. After you have created 24 DEPLOYING AND SCALING KUBERNETES WITH RANCHER You can also generate the configuration file from “Generate config” button at the top – and along with a local executable of kubectl, interact0 码力 | 66 页 | 6.10 MB | 1 年前3
 Cloud Native Contrail Networking
Installation and Life Cycle ManagementGuide for Rancher RKE2
step 3 in "Before You Install" on page 18 and check that your DNS server is listed correctly in that file. d. If you run into a problem you can't solve or if you made a mistake during the installation, simply step 3 in "Before You Install" on page 18 and check that your DNS server is listed correctly in that file. d. If you run into a problem you can't solve or if you made a mistake during the installation, simply install this cluster. Name the ConfigMap deployer-yaml. kubectl create configmap deployer-yaml --from-file= Cloud Native Contrail Networking
Installation and Life Cycle ManagementGuide for Rancher RKE2
step 3 in "Before You Install" on page 18 and check that your DNS server is listed correctly in that file. d. If you run into a problem you can't solve or if you made a mistake during the installation, simply step 3 in "Before You Install" on page 18 and check that your DNS server is listed correctly in that file. d. If you run into a problem you can't solve or if you made a mistake during the installation, simply install this cluster. Name the ConfigMap deployer-yaml. kubectl create configmap deployer-yaml --from-file=- where - is the full path to the deployer manifest 0 码力 | 72 页 | 1.01 MB | 1 年前3
 SUSE Rancher and RKE Kubernetes cluster
using CSI Driver on DELL EMC PowerFlex the cluster, you must create a configuration file, ‘cluster.yml.’ Create the cluster.yml file by running "./rke config” and answer the questions. This file contains all information that is required to Kubernetes cluster successfully 7. Run the following command to configure the kubectl config file: $ ls bin cluster.rkestate cluster.yml kube_config_cluster.yml public_html rke $ mkdir .kube Driver on DELL EMC PowerFlex White Paper 8. Run the following command to create a configuration file (rancher- values.yaml) for SUSE Rancher server, specifying the hostname and other details. In the0 码力 | 45 页 | 3.07 MB | 1 年前3 SUSE Rancher and RKE Kubernetes cluster
using CSI Driver on DELL EMC PowerFlex the cluster, you must create a configuration file, ‘cluster.yml.’ Create the cluster.yml file by running "./rke config” and answer the questions. This file contains all information that is required to Kubernetes cluster successfully 7. Run the following command to configure the kubectl config file: $ ls bin cluster.rkestate cluster.yml kube_config_cluster.yml public_html rke $ mkdir .kube Driver on DELL EMC PowerFlex White Paper 8. Run the following command to create a configuration file (rancher- values.yaml) for SUSE Rancher server, specifying the hostname and other details. In the0 码力 | 45 页 | 3.07 MB | 1 年前3
 Rancher Kubernetes Cryptographic Library
FIPS 140-2 Non-Proprietary Security Policycryptographic boundary of the Rancher Kubernetes Cryptographic Library module is a single object file named bcm.o which is statically linked to BoringSSL. The module performs no communications other Once the above tools have been obtained, issue the following command to create a CMake toolchain file to specify the use of Clang: ● printf "set(CMAKE_C_COMPILER \"clang\")\nset(CMAKE_CXX_COMPILER additions, deletions, or alterations of this set as used during module build. The downloaded tarball file can be verified using the below SHA-256 digest value: b12ad676ee533824f698741bd127f6fbc82c46340 码力 | 16 页 | 551.69 KB | 1 年前3 Rancher Kubernetes Cryptographic Library
FIPS 140-2 Non-Proprietary Security Policycryptographic boundary of the Rancher Kubernetes Cryptographic Library module is a single object file named bcm.o which is statically linked to BoringSSL. The module performs no communications other Once the above tools have been obtained, issue the following command to create a CMake toolchain file to specify the use of Clang: ● printf "set(CMAKE_C_COMPILER \"clang\")\nset(CMAKE_CXX_COMPILER additions, deletions, or alterations of this set as used during module build. The downloaded tarball file can be verified using the below SHA-256 digest value: b12ad676ee533824f698741bd127f6fbc82c46340 码力 | 16 页 | 551.69 KB | 1 年前3
共 16 条
- 1
- 2













