Cilium v1.6 Documentationlatest CoreOS ami image, you can change the region value to your choice in the command below. aws ec2 describe-images --region=us-west-2 --owner=595879546273 -- filters "Name=virtualization-type,Values=hvm" kubernetes cluster. --node-size t2.medium : The size of the AWS EC2 instance for worker nodes --master-size t2.medium : The size of the AWS EC2 instance of master nodes --topology private : Cluster will be command in the kubespray clone repo, providing the correct path of the AWS EC2 ssh private key in ansible_ssh_private_key_file=EC2 SSH private key file> We recommend using the latest released Cilium 0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 Documentationcommand in the kubespray clone repo, providing the correct path of the AWS EC2 ssh private key in ansible_ssh_private_key_file=EC2 SSH private key file> We recommend using the latest released Cilium kube_network_plugin=cilium -b --become-user=root --flush-cache -e ansible_ssh_private_key_file= EC2 SSH private key file> Validate Cluster To check if cluster is created successfully, ssh into the "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "ec2:Describe*", "Resource": "*" } ] } As soon as you have the access tokens, the 0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.10 Documentationcom/eks/latest/userguide/pod-networking.html]. This mode depends on a set of Required Privileges from the EC2 API. Cilium can alternatively run in EKS using an overlay mode that gives pods non- VPC-routable IPs worker_sg="$(aws ec2 describe-security-groups --region "${aws_region}" --filters "${cluster_tag}" "Name=tag:Name,Values=${infraID}-worker-sg" | jq -r '.SecurityGroups[0].GroupId')" master_sg="$(aws ec2 describe-security-groups "${cluster_tag}" "Name=tag:Name,Values=${infraID}-master-sg" | jq -r '.SecurityGroups[0].GroupId')" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.8 Documentationworker_sg="$(aws ec2 describe-security-groups --region "${aws_region}" --filters "${cluster_tag}" "Name=tag:Name,Values=${infraID}-worker-sg" | jq -r '.SecurityGroups[0].GroupId')" master_sg="$(aws ec2 describe-security-groups "${cluster_tag}" "Name=tag:Name,Values=${infraID}-master-sg" | jq -r '.SecurityGroups[0].GroupId')" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp UserIdGroupPairs= [{GroupId=${worker_sg}},{GroupId=${master_sg}}]" \ --group-id "${worker_sg}" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.9 Documentationworker_sg="$(aws ec2 describe-security-groups --region "${aws_region}" --filters "${cluster_tag}" "Name=tag:Name,Values=${infraID}-worker-sg" | jq -r '.SecurityGroups[0].GroupId')" master_sg="$(aws ec2 describe-security-groups "${cluster_tag}" "Name=tag:Name,Values=${infraID}-master-sg" | jq -r '.SecurityGroups[0].GroupId')" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp UserIdGroupPairs= [{GroupId=${worker_sg}},{GroupId=${master_sg}}]" \ --group-id "${worker_sg}" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.11 Documentationcom/eks/latest/userguide/pod-networking.html]. This mode depends on a set of Required Privileges from the EC2 API. Cilium can alternatively run in EKS using an overlay mode that gives pods non-VPC-routable IPs command in the kubespray clone repo, providing the correct path of the AWS EC2 ssh private key in ansible_ssh_private_key_file=EC2 SSH private key file> We recommend using the latest released Cilium kube_network_plugin=cilium -b --become-user=root --flush-cache -e ansible_ssh_private_key_file= EC2 SSH private key file> If you are interested in configuring your Kubernetes cluster setup, you should 0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.5 Documentationlatest CoreOS ami image, you can change the region value to your choice in the command below. aws ec2 describe-images --region=us-west-2 --owner=595879546273 --filters { "id": "595879546273/CoreOS-stable-1745 kubernetes cluster. --node-size t2.medium : The size of the AWS EC2 instance for worker nodes --master-size t2.medium : The size of the AWS EC2 instance of master nodes --topology private : Cluster will in the kubespray clone repo, providing the correct path of the AWS EC2 ssh private key in ansible_ssh_private_key_file=EC2 SSH private key file> We recommend using the latest released Cilium 0 码力 | 740 页 | 12.52 MB | 1 年前3
Hyperledger Fabric 2.5 中文文档disable_known_hosts Default: False 如果为 True ,SSH 层将不会加载用户的 know-hosts 文件。这样可以有效地避 免当一个“已知主机”改变了 key、但仍然有效时(比如 EC2 这样的云服务器 中)的异常。 参见 --disable-known-hosts、SSH 行为 eagerly_disconnect Default: False 设置为 True 时, fab 流量转向他控制的计算机,并将其伪装为你的目的主机,将会检测到主机密钥 不匹配。因此 SSH (及其 Python 实现)发现主机密钥与 known_hosts 文件中 纪录不一致时,都默认立即拒绝连接。 在某些情况下,比如部署 EC2 时,你可能会打算忽略该问题,我们目前所采 用的 SSH 层并没有提供对该操作的明确控制,但是可以通过跳过 known_hosts 文件的加载过程——如果 known_hosts 文件为空,则不会出现纪录不一致的问0 码力 | 138 页 | 154.00 KB | 1 年前3
Hyperledger Fabric 1.4 中文文档disable_known_hosts Default: False 如果为 True ,SSH 层将不会加载用户的 know-hosts 文件。这样可以有效地避 免当一个“已知主机”改变了 key、但仍然有效时(比如 EC2 这样的云服务器 中)的异常。 参见 --disable-known-hosts、SSH 行为 eagerly_disconnect Default: False 设置为 True 时, fab 流量转向他控制的计算机,并将其伪装为你的目的主机,将会检测到主机密钥 不匹配。因此 SSH (及其 Python 实现)发现主机密钥与 known_hosts 文件中 纪录不一致时,都默认立即拒绝连接。 在某些情况下,比如部署 EC2 时,你可能会打算忽略该问题,我们目前所采 用的 SSH 层并没有提供对该操作的明确控制,但是可以通过跳过 known_hosts 文件的加载过程——如果 known_hosts 文件为空,则不会出现纪录不一致的问0 码力 | 145 页 | 161.53 KB | 1 年前3
Scrapy 0.9 Documentationcontrolling the service. For a practical example see this guide on how to deploy a Scrapy crawler on Amazon EC2 [http://dev.scrapy.org/wiki/AmazonEC2]. © Copyright 2008-2010, Insophia. Last updated on May 12, 20160 码力 | 204 页 | 447.68 KB | 1 年前3
共 53 条
- 1
- 2
- 3
- 4
- 5
- 6













