mirror of https://github.com/kubernetes/kops.git
docs(cilium): fix several broken links
- `stable` route no longer has some of the links, so instead used a specific version of the Cilium docs - follows the convention in the rest of this doc to use versions - I used the latest version that has the link available
This commit is contained in:
parent
7616f138ec
commit
c869026b76
|
@ -29,7 +29,7 @@ kops create cluster \
|
|||
|
||||
{{ kops_feature_table(kops_added_beta='1.18', kops_added_default='1.26') }}
|
||||
|
||||
By default, Cilium will use CRDs for synchronizing agent state. This can cause performance problems on larger clusters. As of kOps 1.18, kOps can manage an etcd cluster using etcd-manager dedicated for cilium agent state sync. The [Cilium docs](https://docs.cilium.io/en/stable/gettingstarted/k8s-install-external-etcd/) contains recommendations for when this must be enabled.
|
||||
By default, Cilium will use CRDs for synchronizing agent state. This can cause performance problems on larger clusters. As of kOps 1.18, kOps can manage an etcd cluster using etcd-manager dedicated for cilium agent state sync. The [Cilium docs](https://docs.cilium.io/en/v1.12/gettingstarted/k8s-install-external-etcd/) contains recommendations for when this must be enabled.
|
||||
|
||||
For new clusters you can use the `cilium-etcd` networking provider:
|
||||
|
||||
|
@ -85,7 +85,7 @@ Then enable etcd as kvstore:
|
|||
As of kOps 1.19, BPF NodePort is enabled by default for new clusters if the kubernetes version is 1.12 or newer. It can be safely enabled as of kOps 1.18.
|
||||
|
||||
In this mode, the cluster is fully functional without kube-proxy, with Cilium replacing kube-proxy's NodePort implementation using BPF.
|
||||
Read more about this in the [Cilium docs - kubeproxy free](https://docs.cilium.io/en/stable/gettingstarted/kubeproxy-free/) and [Cilium docs - NodePort](https://docs.cilium.io/en/stable/gettingstarted/kubeproxy-free/#nodeport-devices)
|
||||
Read more about this in the [Cilium docs - kubeproxy free](https://docs.cilium.io/en/v1.12/gettingstarted/kubeproxy-free/) and [Cilium docs - NodePort](https://docs.cilium.io/en/v1.12/gettingstarted/kubeproxy-free/#nodeport-devices)
|
||||
|
||||
Be aware that you need to use an AMI with at least Linux 4.19.57 for this feature to work.
|
||||
|
||||
|
@ -203,7 +203,7 @@ Hubble UI brings a dashboard on top of Hubble observability layer. It allows vie
|
|||
|
||||
When Cilium is intalled and managed by kOps, Cilium cli should not be used as the configuration it produces conflicts with the configuration managed by kOps (certificates are not managed the same way). For this reason, deploying Hubble UI can be tricky.
|
||||
|
||||
Fortunately, recent versions of the Cilium Helm chart allow standalone install of Hubble UI. See `Helm (Standalone install)` tab in [Hubble UI documentation](https://docs.cilium.io/en/stable/gettingstarted/hubble/).
|
||||
Fortunately, recent versions of the Cilium Helm chart allow standalone install of Hubble UI. See `Helm (Standalone install)` tab in [Hubble UI documentation](https://docs.cilium.io/en/v1.13/gettingstarted/hubble/).
|
||||
|
||||
Basically, it requires to disable all components in the chart (they are already managed by kOps) except Hubble UI, and setting `hubble.ui.standalone.enabled` to `true`.
|
||||
|
||||
|
|
Loading…
Reference in New Issue