OpenShift Container Platform 4.13 网络EOF apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: thanos-metrics-reader rules: - apiGroups: - "" resources: - pods - nodes verbs: - get - apiGroups: - metrics.k8s Controller,以更改后端健康检查之间的间隔: 注意 要覆盖单个路由的 healthCheckInterval,请使用路由注解 router.openshift.io/haproxy.health.check.interval 7.8.10. 将集群的默认 Ingress Controller 配置为内部 $ oc -n openshift-ingress-operator edit ingresscontroller/default PLATFORM 中的 中的 INGRESS NODE FIREWALL OPERATOR 87 rules 数 数组 组 对于每个 source.CIDR,Ingress 防火墙 rules.order 对象的顺序以 1 开始,每个 CIDR 最多 100 个规则。低顺序规则会首先执行。 rules.protocolConfig.protocol 支持以下协议: TCP、UDP、SCTP、ICMP0 码力 | 697 页 | 7.55 MB | 1 年前3
OpenShift Container Platform 4.8 Service Meshio/v1beta1 kind: AuthorizationPolicy metadata: name: httpbin namespace: foo spec: action: DENY rules: - from: - source: namespaces: ["dev"] to: - operation: hosts: [“httpbin io/v1beta1 kind: AuthorizationPolicy metadata: name: httpbin namespace: default spec: action: DENY rules: - to: - operation: hosts: ["httpbin.example.com:*"] OpenShift Container Platform 4 的服务网格和应用程序性能图表。。您还可以创建您自己的自定义仪表板。 追踪 – 通过与 Jaeger 集成,可以在组成一个应用程序的多个微服务间追踪请求的路径。 验证 – 对最常见 Istio 对象(Destination Rules 、Service Entries 、Virtual Services 等等)进行高 级验证。 配置 – 使用向导创建、更新和删除 Istio 路由配置的可选功能,或者直接在 Kiali Console0 码力 | 344 页 | 3.04 MB | 1 年前3
OpenShift Container Platform 4.14 Operatorauthorization.k8s.io/aggregate-to-admin: "true" 3 rbac.authorization.k8s.io/aggregate-to-edit: "true" 4 rules: - apiGroups: ["stable.example.com"] 5 resources: ["crontabs"] 6 verbs: ["get", "list", "watch" io/aggregate-to-view: "true" 9 rbac.authorization.k8s.io/aggregate-to-cluster-reader: "true" 10 rules: - apiGroups: ["stable.example.com"] 11 resources: ["crontabs"] 12 verbs: ["get", "list", "watch"] apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: scoped namespace: scoped rules: - apiGroups: ["*"] resources: ["*"] verbs: ["*"] --- apiVersion: rbac.authorization.k8s.io/v10 码力 | 423 页 | 4.26 MB | 1 年前3
OpenShift Container Platform 4.14 存储clusterSelector 字段的值,以选择要从中卸载 LVM Storage 的集 群。 4. 运行以下命令来创建策略: 5. 要创建策略来检查 LVMCluster CR 是否已移除,请使用名称(如 check-lvms-remove- policy.yaml )将以下 YAML 保存到文件中: - complianceType: mustnothave metadata: name: binding-policy-lvmcluster-check placementRef: apiGroup: apps.open-cluster-management.io kind: PlacementRule name: placement-policy-lvmcluster-check subjects: - apiGroup: policy.open-cluster-management apps.open-cluster-management.io/v1 kind: PlacementRule metadata: name: placement-policy-lvmcluster-check spec: clusterConditions: - status: "True" type: ManagedClusterConditionAvailable clusterSelector:0 码力 | 215 页 | 2.56 MB | 1 年前3
OpenShift Container Platform 4.9 构建应用程序kind: ClusterRole metadata: name: database-view labels: servicebinding.io/controller: "true" rules: - apiGroups: - postgresql.dev4devs.com resources: - databases verbs: 6.3. RBAC 要求 要使用 Service Binding Operator 来公开后备服务绑定数据,您需要特定的基于角色的访问控制(RBAC) 权限。在 ClusterRole 资源的 rules 字段下指定特定的操作动词,以便为后备服务资源授予 RBAC 权限。 在定义这些规则时,允许 Service Binding Operator 在整个集群中读取后备服务资源的绑定数据。如果用 户没 ClusterRole metadata: name: postgrescluster-reader labels: servicebinding.io/controller: "true" rules: - apiGroups: - postgres-operator.crunchydata.com resources: - postgresclusters verbs:0 码力 | 184 页 | 3.36 MB | 1 年前3
OpenShift Container Platform 4.10 构建应用程序kind: ClusterRole metadata: name: database-view labels: servicebinding.io/controller: "true" rules: - apiGroups: - postgresql.dev4devs.com 第 第 6 章 章 将 将应 应用程序 用程序连 连接到服 接到服务 务 59 1 Operator 6.4. RBAC 要求 要使用 Service Binding Operator 来公开后备服务绑定数据,您需要特定的基于角色的访问控制(RBAC) 权限。在 ClusterRole 资源的 rules 字段下指定特定的操作动词,以便为后备服务资源授予 RBAC 权限。 在定义这些规则 规则时,允许 Service Binding Operator 在整个集群中读取后备服务资源的绑定数据。如果用 ClusterRole metadata: name: postgrescluster-reader labels: servicebinding.io/controller: "true" rules: - apiGroups: - postgres-operator.crunchydata.com resources: - postgresclusters verbs:0 码力 | 198 页 | 3.62 MB | 1 年前3
OpenShift Container Platform 4.9 网络load-balancer-api-internal kubernetes-apiserver-endpoint kubernetes-apiserver-service-cluster network-check-target openshift-apiserver-endpoint openshift-apiserver-service-cluster metadata.namespace 字符串 与对象关联的命名空间。此值始终为 openshift- network-diagnostics。 spec.sourcePod 字符串 字符串 连接检查来源于的 pod 的名称,如 network-check- source-596b4c6566-rgh92。 spec.targetEndpoint 字符串 字符串 连接检查的目标,如 api.devcluster.example.com:6443。 AGE network-check-source-ci-ln-x5sv9rb-f76d1-4rzrp-worker-b-6xdmh-to-kubernetes-apiserver- endpoint-ci-ln-x5sv9rb-f76d1-4rzrp-master-0 75m network-check-source-ci-ln-x5sv9rb-f76d1-40 码力 | 388 页 | 4.04 MB | 1 年前3
OpenShift Container Platform 4.13 虚拟化可能无法清除克隆。手动 删除克隆也可能会失败。(BZ#2055595) 作为临时解决方案,您可以重启 ceph-mgr 来清除虚拟机克隆。 如果您停止集群中的节点,然后使用 Node Health Check Operator 来启动节点,到 Multus 的连 $ oc annotate --overwrite -n openshift-cnv hyperconverged kubevirt-hyperconverged "DisableMDEVConfiguration"}]' OpenShift Container Platform 4.13 虚 虚拟 拟化 化 42 如果您停止集群中的节点,然后使用 Node Health Check Operator 来启动节点,到 Multus 的连 接可能会丢失。(OCPBUGS-8398) OpenShift Virtualization 4.12 中更改了 TopoLVM 置备程序名称字符串。因此,自动导入操作系 RunStrategies 如 何影响这些结果的信息,请参阅虚拟机的 RunStrategies。 通过在 OpenShift Container Platform 集群上使用 Node Health Check Operator 来部署 NodeHealthCheck 控制器,可以使用 IPI 和非 IPI 自动高可用性。控制器标识不健康的节点,并 使用 Self Node Remediation Operator0 码力 | 393 页 | 4.53 MB | 1 年前3
OpenShift Container Platform 4.10 CLI 工具com:6443 1 The server uses a certificate signed by an unknown authority. You can bypass the certificate check, but any data you send to the server could be intercepted by others. Use insecure connections? (y/n): replica set named nginx oc attach rs/nginx # Check to see if I can create pods in any namespace oc auth can-i create pods --all-namespaces # Check to see if I can list deployments in my current namespace oc auth can-i list deployments.apps # Check to see if I can do everything in my current namespace ("*" means all) oc auth can-i '*' '*' # Check to see if I can get the job named "bar" in namespace0 码力 | 120 页 | 1.04 MB | 1 年前3
OpenShift Container Platform 4.13 CLI 工具com:6443 1 The server uses a certificate signed by an unknown authority. You can bypass the certificate check, but any data you send to the server could be intercepted by others. Use insecure connections? (y/n): replica set named nginx oc attach rs/nginx # Check to see if I can create pods in any namespace oc auth can-i create pods --all-namespaces # Check to see if I can list deployments in my current namespace oc auth can-i list deployments.apps # Check to see if I can do everything in my current namespace ("*" means all) oc auth can-i '*' '*' # Check to see if I can get the job named "bar" in namespace0 码力 | 128 页 | 1.11 MB | 1 年前3
共 42 条
- 1
- 2
- 3
- 4
- 5













