Cilium v1.10 Documentationexport AZURE_RESOURCE_GROUP="${NAME}-group" az group create --name "${AZURE_RESOURCE_GROUP}" -l westus2 # Create AKS cluster az aks create \ --resource-group "${AZURE_RESOURCE_GROUP}" \ --name "${NAME}" the credentials to access the cluster with kubectl az aks get-credentials --resource-group "${AZURE_RESOURCE_GROUP}" -- name "${NAME}" AKS (Azure IPAM) Note Azure IPAM offers integration with the Azure export AZURE_RESOURCE_GROUP="${NAME}-group" az group create --name "${AZURE_RESOURCE_GROUP}" -l westus2 # Create AKS cluster az aks create \ --resource-group "${AZURE_RESOURCE_GROUP}" \ --name "${NAME}"0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 Documentationexport AZURE_RESOURCE_GROUP="${NAME}-group" az group create --name "${AZURE_RESOURCE_GROUP}" -l westus2 # Create AKS cluster az aks create \ --resource-group "${AZURE_RESOURCE_GROUP}" \ --name "${NAME}" the credentials to access the cluster with kubectl az aks get-credentials --resource-group "${AZURE_RESOURCE_GROUP}" -- name "${NAME}" AKS (Azure IPAM) Note Azure IPAM offers integration with the Azure export AZURE_RESOURCE_GROUP="${NAME}-group" az group create --name "${AZURE_RESOURCE_GROUP}" -l westus2 # Create AKS cluster az aks create \ --resource-group "${AZURE_RESOURCE_GROUP}" \ --name "${NAME}"0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.7 DocumentationRESOURCE_GROUP_NAME=group1 export CLUSTER_NAME=aks-test1 export LOCATION=westus az group create --name $RESOURCE_GROUP_NAME --location $LOCATION az aks create \ --resource-group $RESOURCE_GROUP_NAME \ commands to configure kubectl to connect to this AKS cluster: az aks get-credentials --resource-group $RESOURCE_GROUP_NAME --name $CLUSTER_NAME To verify, you should see AKS in the name of the nodes when you up IAM Group and User Assuming you have all the prerequisites, run the following commands to create the kops user and group: # Create IAM group named kops and grant access aws iam create-group --group-name0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.6 DocumentationRESOURCE_GROUP_NAME=group1 export CLUSTER_NAME=aks-test1 export LOCATION=westus az group create --name $RESOURCE_GROUP_NAME --location $LOCATION az aks create \ --resource-group $RESOURCE_GROUP_NAME \ commands to configure kubectl to connect to this AKS cluster: az aks get-credentials --resource-group $RESOURCE_GROUP_NAME --name $CLUSTER_NAME To verify, you should see AKS in the name of the nodes when you up IAM Group and User Assuming you have all the prerequisites, run the following commands to create the kops user and group: # Create IAM group named kops and grant access aws iam create-group --group-name0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.8 DocumentationRESOURCE_GROUP_NAME=aks-test export CLUSTER_NAME=aks-test export LOCATION=westeurope az group create --name $RESOURCE_GROUP_NAME --location $LOCATION az aks create \ --resource-group $RESOURCE_GROUP_NAME AZURE_NODE_RESOURCE_GROUP="$(az aks show --resource-group $RESOURCE_GROUP_NAME --name $CLUSTER_NAME | jq -r .nodeResourceGroup)" Note AZURE_NODE_RESOURCE_GROUP must be set to the resource group of the node node pool, not the resource group of the AKS cluster. Retrieve Credentials to access cluster az aks get-credentials --name $CLUSTER_NAME --resource-group $RESOURCE_GROUP_NAME Deploy Cilium Note First0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.9 DocumentationValues=${infraID}-master-sg" | jq -r '.SecurityGroups[0].GroupId')" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp,FromPort=8472,ToPort=8472 UserIdGroupPairs= [{GroupId=${worker_sg}},{GroupId=${master_sg}}]" \ --group-id "${worker_sg}" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp FromPort=4240,ToPort=4240,UserIdGroupPairs= [{GroupId=${worker_sg}},{GroupId=${master_sg}}]" \ --group-id "${master_sg}" GCP: enable Cilium ports This script depends on jq & Google Cloud SDK (gcloud)0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.5 Documentationup IAM Group and User Assuming you have all the prerequisites, run the following commands to create the kops user and group: # Create IAM group named kops and grant access aws iam create-group --group-name --group-name kops aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/AmazonEC2 aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/AmazonRout aws iam attach-group-policy --policy-arn a arn:aws:iam::aws:policy/AmazonS3F aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/IAMFullAc aws iam attach-group-policy --policy-arn arn:aws:iam::aws:policy/AmazonVPC aws iam create-user0 码力 | 740 页 | 12.52 MB | 1 年前3
Buzzing Across SpaceBy running in the kernel, eBPF enables broad system observability. Collection and in-kernel aggregation of metrics allows flexible and efficient generation of observability events and data structures0 码力 | 32 页 | 32.98 MB | 1 年前3
Scaling a Multi-Tenant k8s Cluster in a TelcoMoncada October 28, 2020 About MasMovil group ● 4th telecom company in Spain ● Provides voice and broadband services to +12M customers ● Several brands in the group (7 main brands but there are more than0 码力 | 6 页 | 640.05 KB | 1 年前3
Can eBPF save us from the Data Deluge?Universiteit Amsterdam ● atLarge research group ● Work with eBPF 4 whoami ● Giulia Frascaria ● PhD student in Vrije Universiteit Amsterdam ● atLarge research group ● Work with eBPF for storage! 5 eBPF0 码力 | 18 页 | 266.90 KB | 1 年前3
共 11 条
- 1
- 2













