Cilium v1.10 Documentationcreate-for-rbac --scopes /subscriptions/${AZURE_SUBSCRIPTION_ID}/resourceGroups/${AZURE_NODE_RES OURCE_GROUP} --role Contributor --output json --only-show-errors) AZURE_TENANT_ID=$(echo ${AZURE_SERVICE_PRINCIPAL} | SecurityGroups[0].GroupId')" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp,FromPort=8472,ToPort=8472,UserIdGroupPairs= [{GroupId=${worker_sg}},{G --group-id "${worker_sg}" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp,FromPort=8472,ToPort=8472,UserIdGroupPairs= [{GroupId=${worker_sg}},{G0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 Documentationcreate-for-rbac --scopes /subscriptions/${AZURE_SUBSCRIPTION_ID}/resourceGroups/${AZURE_NODE_RES OURCE_GROUP} --role Contributor --output json --only-show-errors) AZURE_TENANT_ID=$(echo ${AZURE_SERVICE_PRINCIPAL} | control-plane node. kind: Cluster apiVersion: kind.x-k8s.io/v1alpha4 nodes: - role: control-plane - role: worker - role: worker - role: worker networking: disableDefaultCNI: true By default, the latest version kind-cluster1.yaml: kind: Cluster apiVersion: kind.x-k8s.io/v1alpha4 nodes: - role: control-plane - role: worker - role: worker - role: worker networking: disableDefaultCNI: true podSubnet: "10.0.0.0/16"0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.9 Documentationcontrol-plane node. kind: Cluster apiVersion: kind.x-k8s.io/v1alpha4 nodes: - role: control-plane - role: worker - role: worker - role: worker networking: disableDefaultCNI: true By default, the latest version kind-cluster1.yaml: kind: Cluster apiVersion: kind.x-k8s.io/v1alpha4 nodes: - role: control-plane - role: worker - role: worker - role: worker networking: disableDefaultCNI: true podSubnet: "10.0.0.0/16" kind-cluster2.yaml: kind: Cluster apiVersion: kind.x-k8s.io/v1alpha4 nodes: - role: control-plane - role: worker - role: worker - role: worker networking: disableDefaultCNI: true podSubnet: "10.2.0.0/16"0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.8 Documentationcontrol-plane node. kind: Cluster apiVersion: kind.x-k8s.io/v1alpha4 nodes: - role: control-plane - role: worker - role: worker - role: worker networking: disableDefaultCNI: true By default, the latest version kind-cluster1.yaml: kind: Cluster apiVersion: kind.x-k8s.io/v1alpha4 nodes: - role: control-plane - role: worker - role: worker - role: worker networking: disableDefaultCNI: true podSubnet: "10.0.0.0/16" kind-cluster2.yaml: kind: Cluster apiVersion: kind.x-k8s.io/v1alpha4 nodes: - role: control-plane - role: worker - role: worker - role: worker networking: disableDefaultCNI: true podSubnet: "10.2.0.0/16"0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.5 Documentationamazon.com/cli/] kubectl [h�ps://kubernetes.io/docs/tasks/tools/install-kubectl] aws account with permissions: * AmazonEC2FullAccess * AmazonRoute53FullAccess * AmazonS3FullAccess * IAMFullAccess * AmazonVPCFullAccess toPorts: - ports: - port: "9092" protocol: TCP rules: kafka: - role: "consume" topic: "empire-announce" A CiliumNetworkPolicy contains a list of rules that TopicAuthorizationException: Not authorized This is because the policy does not allow messages with role = “produce” for topic “empire-announce” from containers with label app = empire-outpost. Its worth0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.6 Documentationamazon.com/cli/] kubectl [https://kubernetes.io/docs/tasks/tools/install-kubectl] aws account with permissions: * AmazonEC2FullAccess * AmazonRoute53FullAccess * AmazonS3FullAccess * IAMFullAccess * AmazonVPCFullAccess toPorts: - ports: - port: "9092" protocol: TCP rules: kafka: - role: "consume" topic: "empire-announce" A CiliumNetworkPolicy contains a list of rules that authorized to access topics: [empire-announce] This is because the policy does not allow messages with role = “produce” for topic “empire-announce” from containers with label app = empire-outpost. Its worth0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 Documentationwas created. kind: Cluster apiVersion: kind.x-k8s.io/v1alpha4 nodes: - role: control-plane - role: worker - role: worker - role: worker networking: disableDefaultCNI: true To change the version of kind-cluster1.yaml: kind: Cluster apiVersion: kind.x-k8s.io/v1alpha4 nodes: - role: control-plane - role: worker - role: worker - role: worker networking: disableDefaultCNI: true podSubnet: 10.0.0.0/16 serviceSubnet: kind-cluster2.yaml: kind: Cluster apiVersion: kind.x-k8s.io/v1alpha4 nodes: - role: control-plane - role: worker - role: worker - role: worker networking: disableDefaultCNI: true podSubnet: 10.2.0.0/16 serviceSubnet:0 码力 | 885 页 | 12.41 MB | 1 年前3
共 7 条
- 1













