Rancher Kubernetes Engine 2, VMWare vSAN
VMware vSAN and vSphere $ cat CA.pem > cert_with_cr $ tr -d '\r' < cert_with_cr > cert $ kubectl -ncreate secret generic cmcertificates --from-file=cert 5.2 Downloading the SLC backup. If you forgot to note it down, the following command will list the service port: $ kubectl -n sap-slcbridge get svc 12 SAP Data Intelligence 3 on Rancher Kubernetes Engine 2 using VMware vSAN and Parameters (https://help.sap.com/viewer/a8d90a56d61a49718e- bcb5f65014bbe7/3.3.latest/en-US/abfa9c73f7704de2907ea7ff65e7a20a.html) of the SAP Data Intelligence Installation Guide. 5.6 Post-installation tasks 0 码力 | 29 页 | 213.09 KB | 1 年前3Deploying and ScalingKubernetes with Rancher
v1 kind: Secret metadata: name: redis-pass type: Opaque data: password: c3VwZXJ0b3VnaHBhc3N3b3Jk username: c3VwZXJ1c2Vy Using Secrets Secrets can be used as data volumes or environment "myesdb", "version" : { "number" : "1.7.1", "build_hash" : "b88f43fc40b0bcd7f173a1f9ee2e97816de80b19", "build_timestamp" : "2015-07-29T09:54:16Z", "build_snapshot" : false, "lucene_version"0 码力 | 66 页 | 6.10 MB | 1 年前3Secrets Management at Scale with Vault & Rancher
Secrets Management at Scale with Vault & Rancher 24. June Robert de Bock Senior DevOps Engineer Adfinis robert.debock@adfinis.com Kapil Arora Senior Solution Engineer HashiCorp kapil@hashicorp.com There are sufficient methods to consume secrets. Resources • SUSE Rancher • https://www.suse.com/de-de/products/suse-rancher/ • https://rancher.com/docs/rancher/v2.5/en/ • HashiCorp Vault • https://www0 码力 | 36 页 | 1.19 MB | 1 年前3Hardening Guide - Rancher v2.3.3+
H a r d e n i n g G u i d e - R a n c h e r v 2 . 3 . 3 + C o nt e nt s Har d e n i n g G u i d e f or R an c h e r 2. 3. 3+ w i t h K u b e r n e t e s 1. 16 . . . 2 O v e r v i e w . . . . . . . . . . . . . . . . . . . 2 P r ofi l e D e fi n i t i on s . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1. 1 - R an c h e r R K E K u b e r n e t e s c l u s t e r h os t c on fi gu r at i on . . . . . 3 1. 1. 1 - C on fi gu r e d e f au l t s y s c t l s e t t i n gs on al l h os t s . . . . . . . . 3 1. 4. 11 E n s u r e t h at t h e e t c d d at a d i r e c t or y p e r m i s s i on s0 码力 | 44 页 | 279.78 KB | 1 年前3Cloud Native Contrail Networking Installation and Life Cycle ManagementGuide for Rancher RKE2
/contrail-readiness-controller.yaml 30 Check that the controller has come up. kubectl get pods -n contrail-readiness Manifests SUMMARY We provide sample manifests to make your installation easier contrail-analytics-.tgz 36 2. To install Contrail Analytics with a single instance of Prometheus: helm -n contrail-analytics install analytics contrail-analytics- .tgz --create-namespace The --create-namespace available metric system. b. Install Contrail Analytics (referencing the thanos-values.yaml) file. helm -n contrail-analytics install analytics contrail-analytics- .tgz -f thanos-values.yaml --create-namespace 0 码力 | 72 页 | 1.01 MB | 1 年前3Rancher Kubernetes Cryptographic Library FIPS 140-2 Non-Proprietary Security Policy
ports of the tested platforms API return values Power input Physical ports of the tested platforms N/A As a software module, control of the physical ports is outside module scope; however, when the Functions Keys and/or CSPs Roles Access Rights to Keys and/or CSPs Module Initialization N/A N/A CO N/A Symmetric Encryption/ Decryption AES, Triple-DES AES, Triple-DES symmetric keys User CO Execute Keyed Hashing HMAC-SHA HMAC key User, CO Execute Hashing SHS None User, CO N/A Random Bit Generation CTR_DRBG DRBG seed, internal state V and Key values User, CO Write/Execute0 码力 | 16 页 | 551.69 KB | 1 年前3SUSE Rancher and RKE Kubernetes cluster using CSI Driver on DELL EMC PowerFlex
(192.168.153.111) a Control Plane host (y/n)? [y]: [+] Is host (192.168.153.111) a Worker host (y/n)? [n]: y [+] Is host (192.168.153.111) an etcd host (y/n)? [n]: y [+] Override Hostname of host (192 domain [cluster.local]: [+] Service Cluster IP Range [10.43.0.0/16]: [+] Enable PodSecurityPolicy [n]: [+] Cluster Network CIDR [10.42.0.0/16]: [+] Cluster DNS Service IP [10.43.0.10]: [+] Add addon jetstack/cert-manager -n cert- manager --version v1.2.0 –wait 7. Run the following command to check the cert-manager namespace for running pods to verify that it is deployed correctly: $ kubectl get pods -n cert-manager0 码力 | 45 页 | 3.07 MB | 1 年前3Rancher Hardening Guide Rancher v2.1.x
default-psp-role -n ingress-nginx kubectl get role default-psp-role -n cattle-system kubectl get clusterrole psp:restricted Verify the bindings are set correctly: kubectl get rolebinding -n ingress-nginx ingress-nginx default-psp-rolebinding kubectl get rolebinding -n cattle-system default-psp-rolebinding kubectl get clusterrolebinding psp:restricted Verify the restricted PSP is present. kubectl get psp restricted Verify the Rancher deployment has the --add-local=false option set. kubectl get deployment rancher -n cattle-system -o yaml |grep 'add- local' In the Rancher UI go to Clusters in the Global view and verify0 码力 | 24 页 | 336.27 KB | 1 年前3Rancher CIS Kubernetes v.1.4.0 Benchmark Self Assessment
a lockfile. Permissions on this file do not need to be as restrictive as the CNI files. stat -c "%n - %a" /var/lib/cni/networks/k8s-pod-network/* Returned Value: /var/lib/cni/networks/k8s-pod-network/10 d_ip.0 - 644 /var/lib/cni/networks/k8s-pod-network/lock - 750 Audit ( /etc/cni/net.d ) stat -c "%n - %a" /etc/cni/net.d/* Returned Value: /etc/cni/net.d/10-canal.conflist - 664 /etc/cni/net.d/calico-kubeconfig Scored) Notes This is a manual check. Audit ( /var/lib/cni/networks/k8s-pod-network ) stat -c "%n - %U:%G" /var/lib/cni/networks/k8s-pod-network/* Returned Value: /var/lib/cni/networks/k8s-pod-network/100 码力 | 47 页 | 302.56 KB | 1 年前3CIS 1.6 Benchmark - Self-Assessment Guide - Rancher v2.5.4
%U:%G ${INPUT_DIR}) != "root:root" ]]; then echo "false" exit fi statInfoLines=$(stat -c "%n %U:%G" ${INPUT_DIR}/*) while read -r statInfoLine; do f=$(echo ${statInfoLine} | cut -d' ' -f1) " fi PERMISSION="" if [[ "$2" != "" ]]; then PERMISSION=$2 fi FILES_PERMISSIONS=$(stat -c %n\ %a ${PATTERN}) while read -r fileInfo; do p=$(echo ${fileInfo} | cut -d' ' -f2) if [[ "${PERMISSION}" " fi PERMISSION="" if [[ "$2" != "" ]]; then PERMISSION=$2 fi FILES_PERMISSIONS=$(stat -c %n\ %a ${PATTERN}) while read -r fileInfo; do p=$(echo ${fileInfo} | cut -d' ' -f2) if [[ "${PERMISSION}"0 码力 | 132 页 | 1.12 MB | 1 年前3
共 15 条
- 1
- 2
相关搜索词
RancherKubernetesEngineVMWarevSANDeployingandScalingKuberneteswithSecretsManagementatScaleVaultHardeningGuidev23.3CloudNativeContrailNetworkingInstallationLifeCycleManagementGuideforRKE2CryptographicLibraryFIPS140NonProprietarySecurityPolicySUSERKEclusterusingCSIDriveronDELLEMCPowerFlexCIS1.4BenchmarkSelfAssessment1.65.4