From c2aed5eeba3a47e49a1cdfa237e6f1cf11b847c4 Mon Sep 17 00:00:00 2001 From: Xander Grzywinski Date: Thu, 30 May 2019 11:28:54 -0700 Subject: [PATCH] clean up smoke test chapter --- docs/04-certificate-authority.md | 48 ++++++----------------- docs/05-kubernetes-configuration-files.md | 8 ---- docs/11-pod-network-routes.md | 20 +++++----- docs/13-smoke-test.md | 26 ++++++------ 4 files changed, 35 insertions(+), 67 deletions(-) diff --git a/docs/04-certificate-authority.md b/docs/04-certificate-authority.md index 565de75..045aad2 100644 --- a/docs/04-certificate-authority.md +++ b/docs/04-certificate-authority.md @@ -9,8 +9,6 @@ In this section you will provision a Certificate Authority that can be used to g Generate the CA configuration file, certificate, and private key: ``` -{ - cat > ca-config.json < ca-csr.json < admin-csr.json < admin-csr.json < ${instance}-csr.json < kube-controller-manager-csr.json < kube-controller-manager-csr.json < kube-proxy-csr.json < kube-proxy-csr.json < kube-scheduler-csr.json < kube-scheduler-csr.json < kubernetes-csr.json < kubernetes-csr.json < service-account-csr.json < service-account-csr.json < output ``` -NAME NETWORK DEST_RANGE NEXT_HOP PRIORITY -default-route-081879136902de56 kubernetes-the-hard-way 10.240.0.0/24 kubernetes-the-hard-way 1000 -default-route-55199a5aa126d7aa kubernetes-the-hard-way 0.0.0.0/0 default-internet-gateway 1000 -kubernetes-route-10-200-0-0-24 kubernetes-the-hard-way 10.200.0.0/24 10.240.0.20 1000 -kubernetes-route-10-200-1-0-24 kubernetes-the-hard-way 10.200.1.0/24 10.240.0.21 1000 -kubernetes-route-10-200-2-0-24 kubernetes-the-hard-way 10.200.2.0/24 10.240.0.22 1000 +AddressPrefix Name NextHopIpAddress NextHopType ProvisioningState ResourceGroup +--------------- ------------------------------------------- ------------------ ---------------- ------------------- ----------------------- +10.200.0.0/24 kubernetes-the-hard-way-route-10-200-0-0-24 10.240.0.20 VirtualAppliance Succeeded kubernetes-the-hard-way +10.200.1.0/24 kubernetes-the-hard-way-route-10-200-1-0-24 10.240.0.21 VirtualAppliance Succeeded kubernetes-the-hard-way +10.200.2.0/24 kubernetes-the-hard-way-route-10-200-2-0-24 10.240.0.22 VirtualAppliance Succeeded kubernetes-the-hard-way ``` Next: [Deploying the DNS Cluster Add-on](12-dns-addon.md) diff --git a/docs/13-smoke-test.md b/docs/13-smoke-test.md index 72b805d..8d69458 100644 --- a/docs/13-smoke-test.md +++ b/docs/13-smoke-test.md @@ -180,23 +180,22 @@ Create a firewall rule that allows remote access to the `nginx` node port: ``` az network nsg rule create \ - --resource-group kubernetes-the-hard-way - --nsg-name kubernetes-the-hard-way-nsg - --name nginx - --access Allow - --direction Inbound - --priority 101 - --protocol Tcp - --source-address-prefix Any - --source-port-range "*" - --destination-port-ranges ${NODE_PORT} + --resource-group kubernetes-the-hard-way \ + --nsg-name kubernetes-the-hard-way-nsg \ + --name nginx \ + --access Allow \ + --direction Inbound \ + --priority 101 \ + --protocol Tcp \ + --source-address-prefixes "*" \ + --source-port-range "*" \ + --destination-port-ranges ${NODE_PORT} \ ``` Retrieve the external IP address of a worker instance: ``` -EXTERNAL_IP=$(gcloud compute instances describe worker-0 \ - --format 'value(networkInterfaces[0].accessConfigs[0].natIP)') +EXTERNAL_IP=$(az vm show --show-details -g kubernetes-the-hard-way -n worker-0 --output tsv | cut -f19) ``` Make an HTTP request using the external IP address and the `nginx` node port: @@ -266,7 +265,8 @@ INSTANCE_NAME=$(kubectl get pod untrusted --output=jsonpath='{.spec.nodeName}') SSH into the worker node: ``` -gcloud compute ssh ${INSTANCE_NAME} +EXTERNAL_IP=$(az vm show --show-details -g kubernetes-the-hard-way -n ${INSTANCE_NAME} --output tsv | cut -f19) +ssh azureuser@${EXTERNAL_IP} ``` List the containers running under gVisor: