小编Ajo*_*owe的帖子

在Azure Load Balancer v2中,"入站NAT规则"与"负载平衡规则"的不同之处有何不同

有人可以向我解释在两个场景的负载均衡器(v2)的后端实际发生了什么:

  1. 应用入站NAT规则.

  2. 应用负载平衡规则.

load-balancing nat azure

11
推荐指数
1
解决办法
6786
查看次数

ssl:auth方法ssl需要密码

在尝试通过Ansible连接到Windows VM时,我遇到了这个问题:

TASK [setup] *******************************************************************
<10.xx.xx.xx> ESTABLISH WINRM CONNECTION FOR USER: winad-admin on PORT 5986 TO 10.xx.xx.xx
fatal: [10.xx.xx.xx]: UNREACHABLE! => {"changed": false, "msg": "ssl: auth method ssl requires a password", "unreachable": true}
Run Code Online (Sandbox Code Playgroud)

库存文件:

---hosts---

[win_servers]
10.xx.xx.xx

[nonprod1_ad_servers:vars]
ansible_user=administrator
ansible_pass=Horse@1234
ansible_port=5986
ansible_connection=winrm
# The following is necessary for Python 2.7.9+ when using default WinRM self-signed certificates:
ansible_winrm_server_cert_validation=ignore
Run Code Online (Sandbox Code Playgroud)

用于在Windows机器上启用winrm的powershell脚本如下:


# Configure a Windows host for remote management with Ansible
# -----------------------------------------------------------
#
# This script checks the current WinRM/PSRemoting configuration and …
Run Code Online (Sandbox Code Playgroud)

winrm ansible ansible-playbook

8
推荐指数
1
解决办法
3684
查看次数

无法使用RBAC列出部署资源

我正在为Kubernetes中的用户使用x509身份验证,该工作正常.但是,虽然提供对部署的访问似乎没有正常工作,如下所示:

角色:

# kubectl get rolebindings devops-rb -n demo -o yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
  creationTimestamp: 2018-03-26T13:43:49Z
  name: devops-rb
  namespace: demo
  resourceVersion: "2530329"
  selfLink: /apis/rbac.authorization.k8s.io/v1/namespaces/demo/rolebindings/devops-rb
  uid: b6c17e28-30fb-11e8-b530-000d3a11bb2f
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: Role
  name: devops-role
subjects:
- apiGroup: rbac.authorization.k8s.io
  kind: Group
  name: devops
Run Code Online (Sandbox Code Playgroud)

角色绑定:

# kubectl get roles devops-role -n demo -o yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
  creationTimestamp: 2018-03-26T13:43:49Z
  name: devops-role
  namespace: demo
  resourceVersion: "2538402"
  selfLink: /apis/rbac.authorization.k8s.io/v1/namespaces/demo/roles/devops-role
  uid: b6bee0fb-30fb-11e8-b530-000d3a11bb2f
rules:
- apiGroups:
  - ""
  resources:
  - pods
  - secrets …
Run Code Online (Sandbox Code Playgroud)

rbac kubernetes

3
推荐指数
1
解决办法
1946
查看次数