top of page
Search

CNI QS 2025 CKA

ree

AWNS:


Note: Flannel is not support for network policy enforcement

So go for Calico


Now Check the node Communication status


ree




Ckeck if any cni installed # kubectl get pods -A | grep -E "flannel|calico"


Install tigera operator and verify



# 3) Install the Calico custom resources (the actual Calico installation config)



To verify:


#kubectl get pods -n tigera-operator

#kubectl get pods -A | grep calico


ree


vi tigera-operator.yaml

kind: Installation

metadata:

name: default

spec:

cni:

type: Calico

calicoNetwork:

bgp: Disabled

ipPools:

- cidr: 192.168.0.0/16

encapsulation: VXLAN

natOutgoing: Enabled

nodeSelector: all()

:wq


#kubectl apply -f tigera-operator.yaml


May be this display the waring dont warry


ree

To verify:


Kubectl get installations.operator.tigera.io default -o yaml


then create a two test pods


ree

#kubectl get pods -o wide

#kubectl exec test1 -- ping -c 4 192.168.1.130


optional: create a network policy


Default deny all ingress traffic (from the docment)

vi deny.yaml

---

kind: NetworkPolicy

metadata:

name: allow-all-ingress

spec:

podSelector: {}

ingress:

- {}

policyTypes:

- Ingress

  - Egress

:wq


Kubectl apply -f deny.yaml


#kubectl exec test1 -- ping -c 4 192.168.1.130


pods not responding





 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page