Deploying and ScalingKubernetes with Rancher
...................45 4.5 Ingress Support ..........................................................................................................48 4.5.1 Ingress Use cases ................... abstraction called a “service,” or with an ingress-type resource. A service masks underlying pods/containers and instead represents them as a single entity. The ingress ©Rancher Labs 2017. All rights Reserved Kubernetes cluster • Rancher-ingress-controller will leverage the existing Kubernetes load balancing functionality within Rancher and convert what’s in the Kubernetes ingress to a load balancer in Rancher0 码力 | 66 页 | 6.10 MB | 1 年前3Rancher Kubernetes Engine 2, VMWare vSAN
secret. 11 SAP Data Intelligence 3 on Rancher Kubernetes Engine 2 using VMware vSAN and vSphere $ cat CA.pem > cert_with_cr $ tr -d '\r' < cert_with_cr > cert $ kubectl -ncreate secret .csr Decrypt the key: $ openssl rsa -in .key -out decrypted- .key Let a CA sign the .csr You will receive a .crt. Create a secret from the certificate and .crt Deploy an nginx-ingress controller: For more information, see https://kubernetes.github.io/ingress-nginx/deploy/#bare- metal . Create the nginx-ingress controller as a nodePort service 0 码力 | 29 页 | 213.09 KB | 1 年前3Hardening Guide - Rancher v2.3.3+
|grep cattle • Ve r i f y t h at t h e r ol e s e x i s t : kubectl get role default-psp-role -n ingress-nginx kubectl get role default-psp-role -n cattle-system kubectl get clusterrole restricted-clusterrole le • Ve r i f y t h e b i n d i n gs ar e s e t c or r e c t l y : kubectl get rolebinding -n ingress-nginx default-psp-rolebinding kubectl get rolebinding -n cattle-system default-psp-rolebinding kubectl apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: default-psp-role namespace: ingress-nginx rules: - apiGroups: - extensions resourceNames: - default-psp resources: - podsecuritypolicies0 码力 | 44 页 | 279.78 KB | 1 年前3Rancher CIS Kubernetes v.1.4.0 Benchmark Self Assessment
can interact poorly with certain Pod Security Policies Several system services (such as nginx-ingress ) utilize SecurityContext to switch users and assign capabilities. These exceptions to the general appropriate (Scored) Notes RKE is using the kubelet's ability to automatically create self-signed certs. No CA cert is saved to verify the communication between kube-apiserver and kubelet . Mitigation Make the --client-ca-file argument is set as appropriate (Scored) Audit docker inspect kube-apiserver | jq -e '.[0].Args[] | match("--client-ca-file=.*").string' Returned Value: --client-ca-file=/etc/k0 码力 | 47 页 | 302.56 KB | 1 年前3SUSE Rancher and RKE Kubernetes cluster using CSI Driver on DELL EMC PowerFlex
containers, Kubernetes, PowerFlex, and Data Protection. Table 1. Terminology Term Definition CA Certificate Authority CNS Cloud Native Storage CSI Container Storage Interface Revisions issuing sources. SUSE Rancher relies on cert-manager to issue certificates generated by SUSE Rancher CA or to request the encrypted certificates. Run the following command to use helm to install the cert-manager: take several minutes to fully initialize. Please standby while Certificates are being issued and Ingress comes up. Check out Rancher docs at https://rancher.com/docs/rancher/v2.x/en/ Browse to h0 码力 | 45 页 | 3.07 MB | 1 年前3Rancher Hardening Guide v2.4
NetworkPolicy metadata: name: default-allow-all spec: podSelector: {} ingress: - {} egress: - {} policyTypes: - Ingress - Egress Create a bash script file called apply_networkPolicy_to_all_ns Namespace metadata: name: ingress-nginx --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: default-psp-role namespace: ingress-nginx rules: - apiGroups: authorization.k8s.io/v1 kind: RoleBinding metadata: name: default-psp-rolebinding namespace: ingress-nginx roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: default-psp-role0 码力 | 22 页 | 197.27 KB | 1 年前3Rancher Hardening Guide v2.3.5
NetworkPolicy metadata: name: default-allow-all spec: podSelector: {} policyTypes: - Ingress - Egress Create a bash script file called apply_networkPolicy_to_all_ns.sh. Be sure to chmod Namespace metadata: name: ingress-nginx --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: default-psp-role namespace: ingress-nginx rules: - apiGroups: authorization.k8s.io/v1 kind: RoleBinding metadata: name: default-psp-rolebinding namespace: ingress-nginx roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: default-psp-role0 码力 | 21 页 | 191.56 KB | 1 年前3企业云原生的探索与落地深圳沙龙-RacherLabs-20-11-14/应用容器化最佳实践
Dockerfile编写 • Docker Build构建 • …… • Deployment • DaemonSet • ConfigMap • Secret • Service • Ingress • …… • 功能测试 • 性能测试 • 升级回滚 • …… © Copyright 2020 Rancher Labs. All Rights Reserved. Confidential Confidential 通过Ingress对外发布应用 通常情况下,Service和Pod仅可在集群内部网络中通过IP地址访问。 Ingress是对集群中服务的外部访问进行管理的API对 象,典型的访问方式是HTTP和HTTPS。Ingress功能实现依赖于Ingress Controller控制器,社区有非常多不同的Ingress Controller实现,比较常用的有Ingress Nginx Controller。 Controller。 注:除了通过Ingress方式进行服务对外发布以外,Service还提供了NodePort、LoadBalance两种服务类型,针对不同的 应用场景可以选择最适合的方案。 © Copyright 2020 Rancher Labs. All Rights Reserved. Confidential 应用发布策略 • 滚动发布:逐个替换,直到所有实例都被替换完成 •0 码力 | 28 页 | 3.47 MB | 1 年前3Cloud Native Contrail Networking Installation and Life Cycle ManagementGuide for Rancher RKE2
17h 172.16.0.11 rke2-s1kube-system helm-install-rke2-ingress-nginx-jghfq 0/1 Completed 11 17h 10.42.0.6 rke2-s1 kube-system rke2-ingress-nginx-controller-6sk9w 1/1 Running 0 11h 10.42.0.9 rke2-s1 kube-system rke2-ingress-nginx-controller-ng4hg 0 11h 10.42.2.3 rke2-a2 kube-system rke2-ingress-nginx-controller-rrrts 1/1 Running 0 11h 10.42.1.0 0 码力 | 72 页 | 1.01 MB | 1 年前3Rancher Hardening Guide Rancher v2.1.x
default-psp-role -n ingress-nginx kubectl get role default-psp-role -n cattle-system kubectl get clusterrole psp:restricted Verify the bindings are set correctly: kubectl get rolebinding -n ingress-nginx de rbac.authorization.k8s.io/v1 kind: Role metadata: name: default-psp-role namespace: ingress-nginx rules: - apiGroups: - extensions resourceNames: - default-psp resources: authorization.k8s.io/v1 kind: RoleBinding metadata: name: default-psp-rolebinding namespace: ingress-nginx roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: default-psp-role0 码力 | 24 页 | 336.27 KB | 1 年前3
共 15 条
- 1
- 2