Cilium v1.10 Documentation
consider setting identityAllocationMode: --set identityAllocationMode=kvstore Optional: Configure the SSL certificates Create a Kubernetes secret with the root certificate authority, and client-side key and key=client.key \ --from-file=etcd-client.crt=client.crt Adjust the helm template generation to enable SSL for etcd and use https instead of http for the etcd endpoint URLs: helm install cilium cilium/cilium cilium/cilium --version 1.10.20 \ --namespace kube-system \ --set etcd.enabled=true \ --set etcd.ssl=true \ --set "etcd.endpoints[0]=https://etcd-endpoint1:2379" \ --set "etcd.endpoints[1]=https://etcd-endpoint2:2379"0 码力 | 1307 页 | 19.26 MB | 1 年前3Cilium v1.9 Documentation
consider setting identityAllocationMode: --set identityAllocationMode=kvstore Optional: Configure the SSL certificates Create a Kubernetes secret with the root certificate authority, and client-side key and key=client.key \ --from-file=etcd-client.crt=client.crt Adjust the helm template generation to enable SSL for etcd and use https instead of http for the etcd endpoint URLs: helm install cilium cilium/cilium cilium/cilium --version 1.9.18 \ --namespace kube-system \ --set etcd.enabled=true \ --set etcd.ssl=true \ --set "etcd.endpoints[0]=https://etcd-endpoint1:2379" \ --set "etcd.endpoints[1]=https://etcd-endpoint2:2379"0 码力 | 1263 页 | 18.62 MB | 1 年前3Cilium v1.11 Documentation
consider setting identityAllocationMode: --set identityAllocationMode=kvstore Optional: Configure the SSL certificates Create a Kubernetes secret with the root certificate authority, and client-side key and key=client.key \ --from-file=etcd-client.crt=client.crt Adjust the helm template generation to enable SSL for etcd and use https instead of http for the etcd endpoint URLs: helm install cilium cilium/cilium cilium/cilium --version 1.11.20 \ --namespace kube-system \ --set etcd.enabled=true \ --set etcd.ssl=true \ --set "etcd.endpoints[0]=https://etcd-endpoint1:2379" \ --set "etcd.endpoints[1]=https://etcd-endpoint2:2379"0 码力 | 1373 页 | 19.37 MB | 1 年前3Cilium v1.7 Documentation
oint1:2379 \ --set global.etcd.endpoints[1]=http://etcd-endpoint2:2379 Optional: Configure the SSL certificates Create a Kubernetes secret with the root certificate authority, and client-side key and key=client.key \ --from-file=etcd-client.crt=client.crt Adjust the helm template generation to enable SSL for etcd and use https instead of http for the etcd endpoint URLs: helm install cilium cilium/cilium --version 1.7.16 \ --namespace kube-system \ --set global.etcd.enabled=true \ --set global.etcd.ssl=true \ --set global.etcd.endpoints[0]=https://etcd-endpoint1:2379 \ --set global.etcd.endpoint0 码力 | 885 页 | 12.41 MB | 1 年前3Cilium v1.6 Documentation
--set global.etcd.endpoints[1]=http://etcd-endpoint2:2379 \ > cilium.yaml Optional: Configure the SSL certificates Create a Kubernetes secret with the root certificate authority, and client-side key and to enable SSL for etcd and use https instead of http for the etcd endpoint URLs: helm template cilium \ --namespace kube-system \ --set global.etcd.enabled=true \ --set global.etcd.ssl=true \ --set rmesh/. It must contain a configuration file for each remote cluster along with all the required SSL certificates and keys. The filenames must match the cluster names as provided by the --cluster-name0 码力 | 734 页 | 11.45 MB | 1 年前3Cilium v1.8 Documentation
t2:2379" \ --set "global.etcd.endpoints[2]=http://etcd-endpoint3:2379" Optional: Configure the SSL certificates Create a Kubernetes secret with the root certificate authority, and client-side key and key=client.key \ --from-file=etcd-client.crt=client.crt Adjust the helm template generation to enable SSL for etcd and use https instead of http for the etcd endpoint URLs: helm install cilium cilium/cilium --version 1.8.13 \ --namespace kube-system \ --set global.etcd.enabled=true \ --set global.etcd.ssl=true \ --set "global.etcd.endpoints[0]=https://etcd-endpoint1:2379" \ --set "global.etcd.endp0 码力 | 1124 页 | 21.33 MB | 1 年前3Cilium v1.5 Documentation
ermesh/ . It must contain a configura�on file for each remote cluster along with all the required SSL cer�ficates and keys. The filenames must match the cluster names as provided by the --cluster-name0 码力 | 740 页 | 12.52 MB | 1 年前3
共 7 条
- 1