 Cilium v1.9 Documentationpod-to-a-denied-cnp-6967cb6f7f-7h9fn 1/1 Running 0 66s pod-to-b-intra-node-nodeport-9b487cf89-6ptrt 1/1 Running 0 65s pod-to-b-multi-node-clusterip-7db5dfdcf7-jkjpw pod-to-b-multi-node-headless-7d44b85d69-mtscc 1/1 Running 0 66s pod-to-b-multi-node-nodeport-7ffc76db7c-rrw82 1/1 Running 0 65s pod-to-external-1111-d56f47579-d79dz pod-to-a-denied-cnp-6967cb6f7f-7h9fn 1/1 Running 0 66s pod-to-b-intra-node-nodeport-9b487cf89-6ptrt 1/1 Running 0 65s pod-to-b-multi-node-clusterip-7db5dfdcf7-jkjpw0 码力 | 1263 页 | 18.62 MB | 1 年前3 Cilium v1.9 Documentationpod-to-a-denied-cnp-6967cb6f7f-7h9fn 1/1 Running 0 66s pod-to-b-intra-node-nodeport-9b487cf89-6ptrt 1/1 Running 0 65s pod-to-b-multi-node-clusterip-7db5dfdcf7-jkjpw pod-to-b-multi-node-headless-7d44b85d69-mtscc 1/1 Running 0 66s pod-to-b-multi-node-nodeport-7ffc76db7c-rrw82 1/1 Running 0 65s pod-to-external-1111-d56f47579-d79dz pod-to-a-denied-cnp-6967cb6f7f-7h9fn 1/1 Running 0 66s pod-to-b-intra-node-nodeport-9b487cf89-6ptrt 1/1 Running 0 65s pod-to-b-multi-node-clusterip-7db5dfdcf7-jkjpw0 码力 | 1263 页 | 18.62 MB | 1 年前3
 Cilium v1.8 Documentationpod-to-a-denied-cnp-677d9f567b-kkjp4 1/1 Running 0 68s pod-to-b-intra-node-nodeport-8484fb6d89-bwj8q 1/1 Running 0 68s pod-to-b-multi-node-clusterip-f7655dbc8-h5bwk pod-to-b-multi-node-headless-5fd98b9648-5bjj8 1/1 Running 0 68s pod-to-b-multi-node-nodeport-74bd8d7bd5-kmfmm 1/1 Running 0 68s pod-to-external-1111-7489c7c46d-jhtkr pod-to-a-denied-cnp-677d9f567b-kkjp4 1/1 Running 0 68s pod-to-b-intra-node-nodeport-8484fb6d89-bwj8q 1/1 Running 0 68s pod-to-b-multi-node-clusterip-f7655dbc8-h5bwk0 码力 | 1124 页 | 21.33 MB | 1 年前3 Cilium v1.8 Documentationpod-to-a-denied-cnp-677d9f567b-kkjp4 1/1 Running 0 68s pod-to-b-intra-node-nodeport-8484fb6d89-bwj8q 1/1 Running 0 68s pod-to-b-multi-node-clusterip-f7655dbc8-h5bwk pod-to-b-multi-node-headless-5fd98b9648-5bjj8 1/1 Running 0 68s pod-to-b-multi-node-nodeport-74bd8d7bd5-kmfmm 1/1 Running 0 68s pod-to-external-1111-7489c7c46d-jhtkr pod-to-a-denied-cnp-677d9f567b-kkjp4 1/1 Running 0 68s pod-to-b-intra-node-nodeport-8484fb6d89-bwj8q 1/1 Running 0 68s pod-to-b-multi-node-clusterip-f7655dbc8-h5bwk0 码力 | 1124 页 | 21.33 MB | 1 年前3
 Cilium v1.10 Documentationpod-to-a-denied-cnp-6967cb6f7f-7h9fn 1/1 Running 0 66s pod-to-b-intra-node-nodeport-9b487cf89-6ptrt 1/1 Running 0 65s pod-to-b-multi-node-clusterip-7db5dfdcf7-jkjpw pod-to-b-multi-node-headless-7d44b85d69-mtscc 1/1 Running 0 66s pod-to-b-multi-node-nodeport-7ffc76db7c-rrw82 1/1 Running 0 65s pod-to-external-1111-d56f47579-d79dz pod-to-a-denied-cnp-6967cb6f7f-7h9fn 1/1 Running 0 66s pod-to-b-intra-node-nodeport-9b487cf89-6ptrt 1/1 Running 0 65s pod-to-b-multi-node-clusterip-7db5dfdcf7-jkjpw0 码力 | 1307 页 | 19.26 MB | 1 年前3 Cilium v1.10 Documentationpod-to-a-denied-cnp-6967cb6f7f-7h9fn 1/1 Running 0 66s pod-to-b-intra-node-nodeport-9b487cf89-6ptrt 1/1 Running 0 65s pod-to-b-multi-node-clusterip-7db5dfdcf7-jkjpw pod-to-b-multi-node-headless-7d44b85d69-mtscc 1/1 Running 0 66s pod-to-b-multi-node-nodeport-7ffc76db7c-rrw82 1/1 Running 0 65s pod-to-external-1111-d56f47579-d79dz pod-to-a-denied-cnp-6967cb6f7f-7h9fn 1/1 Running 0 66s pod-to-b-intra-node-nodeport-9b487cf89-6ptrt 1/1 Running 0 65s pod-to-b-multi-node-clusterip-7db5dfdcf7-jkjpw0 码力 | 1307 页 | 19.26 MB | 1 年前3
 Cilium v1.11 Documentationpod-to-a-denied-cnp-6967cb6f7f-7h9fn 1/1 Running 0 66s pod-to-b-intra-node-nodeport-9b487cf89-6ptrt 1/1 Running 0 65s pod-to-b-multi-node-clusterip-7db5dfdcf7-jkjpw pod-to-b-multi-node-headless-7d44b85d69-mtscc 1/1 Running 0 66s pod-to-b-multi-node-nodeport-7ffc76db7c-rrw82 1/1 Running 0 65s pod-to-external-1111-d56f47579-d79dz pod-to-a-denied-cnp-6967cb6f7f-7h9fn 1/1 Running 0 66s pod-to-b-intra-node-nodeport-9b487cf89-6ptrt 1/1 Running 0 65s pod-to-b-multi-node-clusterip-7db5dfdcf7-jkjpw0 码力 | 1373 页 | 19.37 MB | 1 年前3 Cilium v1.11 Documentationpod-to-a-denied-cnp-6967cb6f7f-7h9fn 1/1 Running 0 66s pod-to-b-intra-node-nodeport-9b487cf89-6ptrt 1/1 Running 0 65s pod-to-b-multi-node-clusterip-7db5dfdcf7-jkjpw pod-to-b-multi-node-headless-7d44b85d69-mtscc 1/1 Running 0 66s pod-to-b-multi-node-nodeport-7ffc76db7c-rrw82 1/1 Running 0 65s pod-to-external-1111-d56f47579-d79dz pod-to-a-denied-cnp-6967cb6f7f-7h9fn 1/1 Running 0 66s pod-to-b-intra-node-nodeport-9b487cf89-6ptrt 1/1 Running 0 65s pod-to-b-multi-node-clusterip-7db5dfdcf7-jkjpw0 码力 | 1373 页 | 19.37 MB | 1 年前3
 Cilium v1.7 Documentationpod-to-b-multi-node-headless-746f84dff5-prk4w 1/1 Running 0 4m49s pod-to-b-multi-node-nodeport-7cb9c6cb8b-ksm4h 1/1 Running 0 4m49s pod-to-external-fqdn-allow-google-cnp-b7b6bcdcb-tg9dh pod-to-b-multi-node-headless-746f84dff5-prk4w 1/1 Running 0 4m49s pod-to-b-multi-node-nodeport-7cb9c6cb8b-ksm4h 1/1 Running 0 4m49s pod-to-external-fqdn-allow-google-cnp-b7b6bcdcb-tg9dh --set global.hostServices.enabled=false \ --set global.externalIPs.enabled=true \ --set global.nodePort.enabled=true \ --set global.hostPort.enabled=true \ --set global.pullPolicy=IfNotPresent0 码力 | 885 页 | 12.41 MB | 1 年前3 Cilium v1.7 Documentationpod-to-b-multi-node-headless-746f84dff5-prk4w 1/1 Running 0 4m49s pod-to-b-multi-node-nodeport-7cb9c6cb8b-ksm4h 1/1 Running 0 4m49s pod-to-external-fqdn-allow-google-cnp-b7b6bcdcb-tg9dh pod-to-b-multi-node-headless-746f84dff5-prk4w 1/1 Running 0 4m49s pod-to-b-multi-node-nodeport-7cb9c6cb8b-ksm4h 1/1 Running 0 4m49s pod-to-external-fqdn-allow-google-cnp-b7b6bcdcb-tg9dh --set global.hostServices.enabled=false \ --set global.externalIPs.enabled=true \ --set global.nodePort.enabled=true \ --set global.hostPort.enabled=true \ --set global.pullPolicy=IfNotPresent0 码力 | 885 页 | 12.41 MB | 1 年前3
 Deploying and ScalingKubernetes with Rancher
apiVersion: v1 kind: Service metadata: name: frontend labels: name: frontend spec: type: NodePort ports: - port: 80 - protocol: “TCP” - targetPort: 80 selector: name: frontend use NodePort or LoadBalancer in “type” (Called ServiceType). If you don’t specify any value, then the default value is ClusterIP, which allows connections only from within cluster. NodePort proxies port. NodePort is chosen randomly from a pre-configured range, or can be specified in the definition. The service is then available on each host on which a pod is running at NodePort. NodePort can be0 码力 | 66 页 | 6.10 MB | 1 年前3 Deploying and ScalingKubernetes with Rancher
apiVersion: v1 kind: Service metadata: name: frontend labels: name: frontend spec: type: NodePort ports: - port: 80 - protocol: “TCP” - targetPort: 80 selector: name: frontend use NodePort or LoadBalancer in “type” (Called ServiceType). If you don’t specify any value, then the default value is ClusterIP, which allows connections only from within cluster. NodePort proxies port. NodePort is chosen randomly from a pre-configured range, or can be specified in the definition. The service is then available on each host on which a pod is running at NodePort. NodePort can be0 码力 | 66 页 | 6.10 MB | 1 年前3
 OpenShift Container Platform 4.8 Service Mesh-n istio-system get service istio-ingressgateway -o jsonpath='{.spec.ports[?(@.name=="http2")].nodePort}') OpenShift Container Platform 4.8 Service Mesh 92 2. 运行以下命令来设置安全入口端口。 3. 运行以下命令来设置 TCP 入口端口。 ports[?(@.name=="https")].nodePort}') $ export TCP_INGRESS_PORT=$(kubectl -n istio-system get service istio-ingressgateway -o jsonpath='{.spec.ports[?(@.name=="tcp")].nodePort}') apiVersion: networking ServiceMeshPeer 对象的 .spec.remote.addresses 字段中的条目之一。 如果集群不支持 LoadBalancer 服务,则如果节点可从运行其他网格的集群访问,则可以使用 NodePort 服务。在 ServiceMeshPeer 对象中,在 .spec.remote.addresses 字段中指定节点的 IP 地址,并在 .spec.remote.discoveryPort0 码力 | 344 页 | 3.04 MB | 1 年前3 OpenShift Container Platform 4.8 Service Mesh-n istio-system get service istio-ingressgateway -o jsonpath='{.spec.ports[?(@.name=="http2")].nodePort}') OpenShift Container Platform 4.8 Service Mesh 92 2. 运行以下命令来设置安全入口端口。 3. 运行以下命令来设置 TCP 入口端口。 ports[?(@.name=="https")].nodePort}') $ export TCP_INGRESS_PORT=$(kubectl -n istio-system get service istio-ingressgateway -o jsonpath='{.spec.ports[?(@.name=="tcp")].nodePort}') apiVersion: networking ServiceMeshPeer 对象的 .spec.remote.addresses 字段中的条目之一。 如果集群不支持 LoadBalancer 服务,则如果节点可从运行其他网格的集群访问,则可以使用 NodePort 服务。在 ServiceMeshPeer 对象中,在 .spec.remote.addresses 字段中指定节点的 IP 地址,并在 .spec.remote.discoveryPort0 码力 | 344 页 | 3.04 MB | 1 年前3
 Cilium v1.6 Documentationbased Networking (beta) Transparent Encryption (beta) Host-Reachable Services (beta) Kubernetes NodePort (beta) Kubernetes without kube-proxy (beta) Kata with Cilium on Google GCE Configuring IPAM modes EXTERNAL-IP PORT(S) AGE svc/elasticsearch NodePort 10.111.238.254 Cilium v1.6 Documentationbased Networking (beta) Transparent Encryption (beta) Host-Reachable Services (beta) Kubernetes NodePort (beta) Kubernetes without kube-proxy (beta) Kata with Cilium on Google GCE Configuring IPAM modes EXTERNAL-IP PORT(S) AGE svc/elasticsearch NodePort 10.111.238.254- 9200:30130/TCP,9300:31721/TCP 2d svc/etcd-cilium NodePort 10.98.67.60 - 32379:31079/TCP resolved in future kernels. Kubernetes NodePort (beta) This guide explains how to configure Cilium to enable Kubernetes NodePort services in BPF which can replace NodePort implemented by kube-proxy. Enabling 0 码力 | 734 页 | 11.45 MB | 1 年前3
 Rancher Kubernetes Engine 2, VMWare vSANthe following information is needed: URL of secure private registry Choose expert mode Choose NodePort for the service Take a note of the service port of the SLC Bridge. It is needed for the installation https://kubernetes.github.io/ingress-nginx/deploy/#bare- metal . Create the nginx-ingress controller as a nodePort service according to the Ingress nginx documentation: $ kubectl apply -f https://raw.githubusercontent CLUSTER-IP EXTERNAL-IP PORT(S) AGE ingress-nginx-controller NodePort 10.43.86.90 Rancher Kubernetes Engine 2, VMWare vSANthe following information is needed: URL of secure private registry Choose expert mode Choose NodePort for the service Take a note of the service port of the SLC Bridge. It is needed for the installation https://kubernetes.github.io/ingress-nginx/deploy/#bare- metal . Create the nginx-ingress controller as a nodePort service according to the Ingress nginx documentation: $ kubectl apply -f https://raw.githubusercontent CLUSTER-IP EXTERNAL-IP PORT(S) AGE ingress-nginx-controller NodePort 10.43.86.90- 80:31963/ TCP,443:{di_version}06/TCP 53d In our example here, 0 码力 | 29 页 | 213.09 KB | 1 年前3
 SUSE Rancher and RKE Kubernetes cluster
using CSI Driver on DELL EMC PowerFlex sample shows a post that is published in the WordPress application that can be accessed with the nodeport 31556: Figure 15. Published post in WordPress The following image shows the protection job the new namespace dellwordpressrestore. The restored WordPress application is accessed with the nodeport 31640 as shown in the following sample: Rancher Kubernetes Cluster Data Protection using PowerProtect namespace dellwordpress, on the restored namespace dellwordpressrestore, that is accessed with the nodeport 31640: Figure 23. WordPress post available on the restored namespace This confirms the successful0 码力 | 45 页 | 3.07 MB | 1 年前3 SUSE Rancher and RKE Kubernetes cluster
using CSI Driver on DELL EMC PowerFlex sample shows a post that is published in the WordPress application that can be accessed with the nodeport 31556: Figure 15. Published post in WordPress The following image shows the protection job the new namespace dellwordpressrestore. The restored WordPress application is accessed with the nodeport 31640 as shown in the following sample: Rancher Kubernetes Cluster Data Protection using PowerProtect namespace dellwordpress, on the restored namespace dellwordpressrestore, that is accessed with the nodeport 31640: Figure 23. WordPress post available on the restored namespace This confirms the successful0 码力 | 45 页 | 3.07 MB | 1 年前3
共 132 条
- 1
- 2
- 3
- 4
- 5
- 6
- 14














