Cilium v1.10 Documentationexport AZURE_RESOURCE_GROUP="${NAME}-group" az group create --name "${AZURE_RESOURCE_GROUP}" -l westus2 # Create AKS cluster az aks create \ --resource-group "${AZURE_RESOURCE_GROUP}" \ --name "${NAME}" the credentials to access the cluster with kubectl az aks get-credentials --resource-group "${AZURE_RESOURCE_GROUP}" -- name "${NAME}" AKS (Azure IPAM) Note Azure IPAM offers integration with the Azure export AZURE_RESOURCE_GROUP="${NAME}-group" az group create --name "${AZURE_RESOURCE_GROUP}" -l westus2 # Create AKS cluster az aks create \ --resource-group "${AZURE_RESOURCE_GROUP}" \ --name "${NAME}"0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 Documentationexport AZURE_RESOURCE_GROUP="${NAME}-group" az group create --name "${AZURE_RESOURCE_GROUP}" -l westus2 # Create AKS cluster az aks create \ --resource-group "${AZURE_RESOURCE_GROUP}" \ --name "${NAME}" the credentials to access the cluster with kubectl az aks get-credentials --resource-group "${AZURE_RESOURCE_GROUP}" -- name "${NAME}" AKS (Azure IPAM) Note Azure IPAM offers integration with the Azure export AZURE_RESOURCE_GROUP="${NAME}-group" az group create --name "${AZURE_RESOURCE_GROUP}" -l westus2 # Create AKS cluster az aks create \ --resource-group "${AZURE_RESOURCE_GROUP}" \ --name "${NAME}"0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.7 DocumentationRESOURCE_GROUP_NAME=group1 export CLUSTER_NAME=aks-test1 export LOCATION=westus az group create --name $RESOURCE_GROUP_NAME --location $LOCATION az aks create \ --resource-group $RESOURCE_GROUP_NAME \ commands to configure kubectl to connect to this AKS cluster: az aks get-credentials --resource-group $RESOURCE_GROUP_NAME --name $CLUSTER_NAME To verify, you should see AKS in the name of the nodes when you up IAM Group and User Assuming you have all the prerequisites, run the following commands to create the kops user and group: # Create IAM group named kops and grant access aws iam create-group --group-name0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.6 DocumentationRESOURCE_GROUP_NAME=group1 export CLUSTER_NAME=aks-test1 export LOCATION=westus az group create --name $RESOURCE_GROUP_NAME --location $LOCATION az aks create \ --resource-group $RESOURCE_GROUP_NAME \ commands to configure kubectl to connect to this AKS cluster: az aks get-credentials --resource-group $RESOURCE_GROUP_NAME --name $CLUSTER_NAME To verify, you should see AKS in the name of the nodes when you up IAM Group and User Assuming you have all the prerequisites, run the following commands to create the kops user and group: # Create IAM group named kops and grant access aws iam create-group --group-name0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.8 DocumentationRESOURCE_GROUP_NAME=aks-test export CLUSTER_NAME=aks-test export LOCATION=westeurope az group create --name $RESOURCE_GROUP_NAME --location $LOCATION az aks create \ --resource-group $RESOURCE_GROUP_NAME AZURE_NODE_RESOURCE_GROUP="$(az aks show --resource-group $RESOURCE_GROUP_NAME --name $CLUSTER_NAME | jq -r .nodeResourceGroup)" Note AZURE_NODE_RESOURCE_GROUP must be set to the resource group of the node node pool, not the resource group of the AKS cluster. Retrieve Credentials to access cluster az aks get-credentials --name $CLUSTER_NAME --resource-group $RESOURCE_GROUP_NAME Deploy Cilium Note First0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.9 DocumentationValues=${infraID}-master-sg" | jq -r '.SecurityGroups[0].GroupId')" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp,FromPort=8472,ToPort=8472 UserIdGroupPairs= [{GroupId=${worker_sg}},{GroupId=${master_sg}}]" \ --group-id "${worker_sg}" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp FromPort=4240,ToPort=4240,UserIdGroupPairs= [{GroupId=${worker_sg}},{GroupId=${master_sg}}]" \ --group-id "${master_sg}" GCP: enable Cilium ports This script depends on jq & Google Cloud SDK (gcloud)0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.5 Documentationup IAM Group and User Assuming you have all the prerequisites, run the following commands to create the kops user and group: # Create IAM group named kops and grant access aws iam create-group --group-name --group-name kops aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/AmazonEC2 aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/AmazonRout aws iam attach-group-policy --policy-arn a arn:aws:iam::aws:policy/AmazonS3F aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/IAMFullAc aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/AmazonVPC aws iam create-user0 码力 | 740 页 | 12.52 MB | 1 年前3
共 7 条
- 1













