Cilium v1.6 Documentationprepare generating the deployment artifacts based on the Helm templates. Generate the required YAML files and deploy them: helm template cilium \ --namespace cilium \ --set global.nodeinit.enabled=true prepare generating the deployment artifacts based on the Helm templates. Generate the required YAML files and deploy them: helm template cilium \ --namespace kube-system \ --set global.cni.chainingMode=aws-cni '_source': {'outpost': 'Endor', 'datetime': '33 ABY 4AM DST', 'title': 'Endor Corps 1: Morning Drill', \ 'notes': '5100 PRESENT; 15 ABSENT; 130 CODE-RED BELOW PAR PERFORMANCE'}} Now imagine0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 Documentationtransparent manner. Visit Hubble Github page [https://github.com/cilium/hubble]. Generate the deployment files using Helm and deploy it: git clone https://github.com/cilium/hubble.git --branch v0.5 cd hubble/install/kubernetes transparent manner. Visit Hubble Github page [https://github.com/cilium/hubble]. Generate the deployment files using Helm and deploy it: git clone https://github.com/cilium/hubble.git --branch v0.5 cd hubble/install/kubernetes transparent manner. Visit Hubble Github page [https://github.com/cilium/hubble]. Generate the deployment files using Helm and deploy it: git clone https://github.com/cilium/hubble.git --branch v0.5 cd hubble/install/kubernetes0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.8 DocumentationOpenShift OKD Cluster First, set cluster name: CLUSTER_NAME="cluster-1" Now, create configuration files: Note The sample output below is showing the AWS provider, but it should work the same way with following image describes the different files containing cryptographic data that are generated or copied, and what components in the system need access to those files: You can use openssl on your local system the cilium pods, and then run the resulting openssl commands. Use kubectl cp to copy the resulting files out of the cilium pod when it is time to use them to create Kubernetes secrets of copy them to the0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.10 Documentationhow to use ClusterConfig [https://eksctl.io/usage/creating- and-managing-clusters/#using-config-files] file to create the cluster: apiVersion: eksctl.io/v1alpha5 kind: ClusterConfig ... managedNodeGroups: how to use ClusterConfig [https://eksctl.io/usage/creating- and-managing-clusters/#using-config-files] file to create the cluster: apiVersion: eksctl.io/v1alpha5 kind: ClusterConfig ... managedNodeGroups: OpenShift OKD Cluster First, set the cluster name: CLUSTER_NAME="cluster-1" Now, create configuration files: Note The sample output below is showing the AWS provider, but it should work the same way with0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.9 DocumentationOpenShift OKD Cluster First, set cluster name: CLUSTER_NAME="cluster-1" Now, create configuration files: Note The sample output below is showing the AWS provider, but it should work the same way with rkload-certs.sh This saves the certs (ca.crt, tls.crt, tls.key) to the current directory. These files need to be copied to your external workload. Install and configure Cilium on external workloads following image describes the different files containing cryptographic data that are generated or copied, and what components in the system need access to those files: You can use openssl on your local system0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.11 Documentationhow to use ClusterConfig [https://eksctl.io/usage/creating- and-managing-clusters/#using-config-files] file to create the cluster: apiVersion: eksctl.io/v1alpha5 kind: ClusterConfig ... managedNodeGroups: how to use ClusterConfig [https://eksctl.io/usage/creating- and-managing-clusters/#using-config-files] file to create the cluster: apiVersion: eksctl.io/v1alpha5 kind: ClusterConfig ... managedNodeGroups: OpenShift OKD Cluster First, set the cluster name: CLUSTER_NAME="cluster-1" Now, create configuration files: Note The sample output below is showing the AWS provider, but it should work the same way with0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.5 DocumentationThis will extract the keys that Cilium is using to connect to the etcd in the local cluster. The key files are wri�en to config/.*.{key|crt|-ca.crt} Repeat this step for all clusters you want The key files in config/ and the secret represented as YAML are sensi�ve. Anyone gaining access to these files is able to connect to the etcd instances in the local cluster. Delete the files a�er the http://127.0.0.1:31079 - [...] Check for level=warning and level=error messages in the Cilium log files Run a bash in a Cilium and validate the following: Rou�ng rules matching on fwmark: ip rule list 0 码力 | 740 页 | 12.52 MB | 1 年前3
共 7 条
- 1













