OpenShift Container Platform 4.13 网络name: sharded namespace: openshift-ingress-operator spec: domain:net> 1 nodePlacement: nodeSelector: matchLabels: node-role.kubernetes.io/worker: "" router-internal.yaml $ oc expose svc --hostname .apps- sharded.basedomain.example.net # cat router-internal.yaml apiVersion: operator.openshift.io/v1 kind: IngressController 第 第 8 章 name: sharded namespace: openshift-ingress-operator spec: domain: net> 1 nodePlacement: nodeSelector: matchLabels: node-role.kubernetes.io/worker: "" 0 码力 | 697 页 | 7.55 MB | 1 年前3
OpenShift Container Platform 4.6 网络sharded namespace: openshift-ingress-operator spec: domain:net> nodePlacement: nodeSelector: matchLabels: 第 第 6 章 章 OPENSHIFT CONTAINER PLATFORM sharded namespace: openshift-ingress-operator spec: domain: net> nodePlacement: nodeSelector: OpenShift Container Platform 4.6 网 网络 络 42 2. 应用 Ingress 接口,附加到集群范围的 pod 网络。您可以使用 oc exec -it -- ip a 命令来查看 pod 的接 口。如果您添加使用 Multus CNI 的额外网络接口,则名称为 net1、net2、…、netN。 要将额外网络接口附加到 pod,您必须创建配置来定义接口的附加方式。您可以使用 NetworkAttachmentDefinition 自定义资源(CR)来指定各个接口。各个 0 码力 | 256 页 | 2.78 MB | 1 年前3
OpenShift Container Platform 4.9 网络sharded namespace: openshift-ingress-operator spec: domain:net> nodePlacement: nodeSelector: matchLabels: node-role.kubernetes.io/worker: sharded namespace: openshift-ingress-operator spec: domain: net> nodePlacement: nodeSelector: matchLabels: node-role.kubernetes.io/worker: follow_up_info 0 hybrid_e2e 0 inhibit_multicast_service 0 net_sync_monitor 0 tc_spanning_tree 0 tx_timestamp_timeout 10 0 码力 | 388 页 | 4.04 MB | 1 年前3
OpenShift Container Platform 4.8 Service MeshServiceEntry metadata: name: service-entry-threescale-saas-backend spec: hosts: - su1.3scale.net ports: - number: 443 name: https OpenShift Container Platform 4.8 Service Mesh 156 b. 将 destination-rule-threescale-saas-backend spec: host: su1.3scale.net trafficPolicy: tls: mode: SIMPLE sni: su1.3scale.net $ oc apply -f service-entry-threescale-saas-backend.yml $ oc ServiceEntry metadata: name: service-entry-threescale-saas-system spec: hosts: - multitenant.3scale.net ports: - number: 443 name: https protocol: HTTPS location: MESH_EXTERNAL resolution:0 码力 | 344 页 | 3.04 MB | 1 年前3
OpenShift Container Platform 4.13 虚拟化pod 不是作为特权容器运行。 scc.AllowedCapabilities = []corev1.Capability{"SYS_NICE", "NET_BIND_SERVICE"} SYS_NICE 允许设置 CPU 关联性。 NET_BIND_SERVICE 允许 DHCP 和 Slirp 操作。 8.2.1. 查看 kubevirt-controller 的 SCC 和 RBAC volumes: - formats: - format: raw url: https://vmexport- proxy.test.net/api/export.kubevirt.io/v1alpha1/namespaces/example/virtualmachineexports/exam ple-export/volumes/example-disk/disk 文件复制到目标集群。 2. 运行以下命令,解码源集群中的令牌并将其保存到 token_decode 文件中: url: https://vmexport- proxy.test.net/api/export.kubevirt.io/v1alpha1/namespaces/example/virtualmachineexports/exam ple-export/volumes/example-disk/disk0 码力 | 393 页 | 4.53 MB | 1 年前3
OpenShift Container Platform 4.10 可伸缩性和性能%23%20turn%20on%20Receive%20Flow%20Steering%20%28RFS%29%20for%20all %20network%20interfaces%0ASUBSYSTEM%3D%3D%22net%22%2C%20ACTION%3D% 3D%22add%22%2C%20RUN%7Bprogram%7D%2B%3D%22/bin/bash%20- c%20%27for%20x%20in%20/ %22%0A filesystem: root mode: 0644 path: /etc/udev/rules.d/70-persistent-net.rules - contents: source: data:text/plain;charset=US- ASCII,%23%20define%20sock%20 格示例 $ oc delete -f 05-worker-kernelarg-hpav.yaml ...3 0 码力 | 315 页 | 3.19 MB | 1 年前3
OpenShift Container Platform 4.8
Web 控制台threescale params: service_id: "" system_url: "https:// -admin.3scale.net/" access_token: " " connection: address: "threescale-istio-adapter:3333" kind: rule metadata: name: threescale spec: match: destination.labels["service-mesh.3scale.net"] == "true" actions: - handler: threescale.handler instances: - threescale-authorization --url="https:// - admin.3scale.net:443" --token="[redacted]" 这个示例生成带有内嵌在处理器中的服务 ID 的模板: $ 3scale-gen-config --url="https:// -admin.3scale.net" --name="my-unique-id" -- service="123456789" 0 码力 | 87 页 | 1.58 MB | 1 年前3
OpenShift Container Platform 4.10 虚拟化virt-launcher pod 不是作为特权容器运行。 scc.AllowedCapabilities = []corev1.Capability{"NET_ADMIN", "NET_RAW", "SYS_NICE"} 这可提供以下额外的 Linux 功能 NET_ADMIN、NET_RAW 和 SYS_NICE。 6.2.2. 查看 kubevirt-controller 的 SCC 和 RBAC 定义 您可以使用 networks: - name: default pod: {} - multus: networkName: cnv-bridge name: bridge-net ... status: interfaces: - interfaceName: eth0 ipAddress: 198.51.100.0/24 ipAddresses: ipAddresses: 192.0.2.0/24 2001:db8::/32 mac: 00:17:a4:77:77:25 name: bridge-net ... 第 第 8 章 章 虚 虚拟 拟机 机 77 4. 打开 RDP 客户端,并使用上一步中复制的 IP 地址进行连接。 5. 输入 Administrator 用户名和密码以连接至 Windows0 码力 | 307 页 | 3.45 MB | 1 年前3
OpenShift Container Platform 4.14 镜像构建器镜像和模板,并接受更新。S2I 镜像流和模板包括: Ruby Python Node.js Perl PHP HTTPD Nginx EAP Java Webserver .NET Go 从 OpenShift Container Platform 4.16 开始,Cluster Samples Operator 将停止管 理非 S2I 镜像流和模板。您可以联系镜像流或模板所有者以获取任何要求和将来的 registry 中的所有存储库到镜像 registry。 从 mirror mirror.example.net/image@sha256:.. 拉取镜像 registry.example.com/example/myimage@sha256:…。 从 mirror mirror.example.net/image@sha256:… 的源 registry 命名空间中拉取镜像 registry.example example.com/example/image@sha256:…。 从 mirror registry example.net/registry-example-com/myimage@sha256:… 中拉取 镜像 registry.example.com/myimage@sha256。 创建 ImageContentSourcePolicy 自定义资源,将源和镜像替换为您自己的 registry、存储0 码力 | 118 页 | 1.13 MB | 1 年前3
OpenShift Container Platform 4.6 节点profile specification [main] summary=Description of tuned_profile_1 profile [sysctl] net.ipv4.ip_forward=1 # ... other sysctl's or other Tuned daemon plugins supported by the containerized avc_cache_threshold=8192 [net] nf_conntrack_hashsize=131072 [sysctl] net.ipv4.ip_forward=1 kernel.pid_max=>4194304 net.netfilter.nf_conntrack_max=1048576 net.ipv4.conf.all.arp_announce=2 arp_announce=2 net.ipv4.neigh.default.gc_thresh1=8192 net.ipv4.neigh.default.gc_thresh2=32768 net.ipv4.neigh.default.gc_thresh3=65536 net.ipv6.neigh.default.gc_thresh1=8192 net.ipv6.neigh0 码力 | 404 页 | 3.60 MB | 1 年前3
共 36 条
- 1
- 2
- 3
- 4













