Cilium v1.10 DocumentationGetting a pull request merged Pull requests review process for committers Weekly duties Developer’s Certificate of Origin Development Setup Verifying Your Development Setup Requirements Vagrant Setup Local identityAllocationMode=kvstore Optional: Configure the SSL certificates Create a Kubernetes secret with the root certificate authority, and client-side key and certificate of etcd: kubectl create secret generic -n key=client.key \ --from-file=etcd-client.crt=client.crt Adjust the helm template generation to enable SSL for etcd and use https instead of http for the etcd endpoint URLs: helm install cilium cilium/cilium0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 DocumentationGetting a pull request merged Pull requests review process for committers Weekly duties Developer’s Certificate of Origin Development Setup Verifying Your Development Setup Requirements Vagrant Setup Local identityAllocationMode=kvstore Optional: Configure the SSL certificates Create a Kubernetes secret with the root certificate authority, and client-side key and certificate of etcd: kubectl create secret generic -n key=client.key \ --from-file=etcd-client.crt=client.crt Adjust the helm template generation to enable SSL for etcd and use https instead of http for the etcd endpoint URLs: helm install cilium cilium/cilium0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.7 Documentation-endpoint2:2379 Optional: Configure the SSL certificates Create a Kubernetes secret with the root certificate authority, and client-side key and certificate of etcd: kubectl create secret generic -n key=client.key \ --from-file=etcd-client.crt=client.crt Adjust the helm template generation to enable SSL for etcd and use https instead of http for the etcd endpoint URLs: helm install cilium cilium/cilium --version 1.7.16 \ --namespace kube-system \ --set global.etcd.enabled=true \ --set global.etcd.ssl=true \ --set global.etcd.endpoints[0]=https://etcd-endpoint1:2379 \ --set global.etcd.endpoint0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.9 DocumentationGetting a pull request merged Pull requests review process for committers Weekly duties Developer’s Certificate of Origin Development Setup Requirements Vagrant Setup Local Development in Vagrant Box Making identityAllocationMode=kvstore Optional: Configure the SSL certificates Create a Kubernetes secret with the root certificate authority, and client-side key and certificate of etcd: kubectl create secret generic -n key=client.key \ --from-file=etcd-client.crt=client.crt Adjust the helm template generation to enable SSL for etcd and use https instead of http for the etcd endpoint URLs: helm install cilium cilium/cilium0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.6 Documentationto contribute Pull request review process Building Container Images Documentation Developer’s Certificate of Origin Release Management Release Cadence Stable releases LTS Generic Release Process GitHub \ > cilium.yaml Optional: Configure the SSL certificates Create a Kubernetes secret with the root certificate authority, and client-side key and certificate of etcd: kubectl create secret generic -n to enable SSL for etcd and use https instead of http for the etcd endpoint URLs: helm template cilium \ --namespace kube-system \ --set global.etcd.enabled=true \ --set global.etcd.ssl=true \ --set0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.8 DocumentationGetting a pull request merged Pull requests review process for committers Weekly duties Developer’s Certificate of Origin Development Setup Requirements Vagrant Setup Local Development in Vagrant Box Making endpoint3:2379" Optional: Configure the SSL certificates Create a Kubernetes secret with the root certificate authority, and client-side key and certificate of etcd: kubectl create secret generic -n key=client.key \ --from-file=etcd-client.crt=client.crt Adjust the helm template generation to enable SSL for etcd and use https instead of http for the etcd endpoint URLs: helm install cilium cilium/cilium0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.5 Documentationermesh/ . It must contain a configura�on file for each remote cluster along with all the required SSL cer�ficates and keys. The filenames must match the cluster names as provided by the --cluster-name In case you want client to server authentication, uncomment the follo # lines and add the certificate and key in cilium-etcd-secrets below key-file: '/var/lib/etcd-secrets/etcd-client.key' In case you want client to server authentication, uncomment the follo # lines and add the certificate and key in cilium-etcd-secrets below key-file: '/var/lib/etcd-secrets/etcd-client.key'0 码力 | 740 页 | 12.52 MB | 1 年前3
共 7 条
- 1













