본문 바로가기
Compute/kubernetis

31. 새로 추가된 시험 유형 - 4 / CNI 플러그인 설치 Flannel, Calico

by 조청유곽 2025. 11. 6.
반응형

[Question]

Install and configure a Container Network Interface (CNI) of your choice that meets the specified requirements. 
Choose one of the following CNI options:

Flannel (v0.26.1)
using the manifest:
© [kube-flannel.yml]
(https://github.com/flannel-io/flannel/releases/download/v0.26.1/kube-flannel.yml)

Calico (v3.28.2)
using the manifest:
[tigera-operator.yamll]
(https://raw.githubusercontent.com/projectcalico/calico/v3.28.2/manifests/tigera-operator.yaml)

 


 

[Precondition]

- N/A 

 


 

[Solve]

controlplane ~ ✖ kubectl apply -f https://github.com/flannel-io/flannel/releases/download/v0.26.1/kube-flannel.yml
namespace/kube-flannel created
serviceaccount/flannel created
clusterrole.rbac.authorization.k8s.io/flannel created
clusterrolebinding.rbac.authorization.k8s.io/flannel created
configmap/kube-flannel-cfg created
daemonset.apps/kube-flannel-ds created

controlplane ~ ➜  kubectl get pods -A
NAMESPACE      NAME                                      READY   STATUS             RESTARTS     AGE
autoscale      apache-server-75d7546c96-xc5n4            1/1     Running            0            31m
kube-flannel   kube-flannel-ds-5t86m                     0/1     CrashLoopBackOff   1 (6s ago)   13s
kube-system    coredns-7896679cc-gcbns                   1/1     Running            0            36m
kube-system    helm-install-traefik-cjtkj                0/1     Completed          2            36m
kube-system    helm-install-traefik-crd-fr6xl            0/1     Completed          0            36m
kube-system    local-path-provisioner-578895bd58-ddjdd   1/1     Running            0            36m
kube-system    metrics-server-7b9c9c4b9c-4xqsv           1/1     Running            0            36m
kube-system    svclb-traefik-fe190efa-tq8fm              2/2     Running            0            35m
kube-system    traefik-6f986b958c-4hmbn                  1/1     Running            0            35m

controlplane ~ ➜

 

controlplane ~ ➜  kubectl apply -f https://raw.githubusercontent.com/projectcalico/calico/v3.28.2/manifests/tigera-operator.yaml
namespace/tigera-operator created
customresourcedefinition.apiextensions.k8s.io/bgpconfigurations.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/bgpfilters.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/bgppeers.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/blockaffinities.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/caliconodestatuses.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/clusterinformations.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/felixconfigurations.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/globalnetworkpolicies.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/globalnetworksets.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/hostendpoints.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/ipamblocks.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/ipamconfigs.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/ipamhandles.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/ippools.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/ipreservations.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/kubecontrollersconfigurations.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/networkpolicies.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/networksets.crd.projectcalico.org created
customresourcedefinition.apiextensions.k8s.io/apiservers.operator.tigera.io created
customresourcedefinition.apiextensions.k8s.io/imagesets.operator.tigera.io created
customresourcedefinition.apiextensions.k8s.io/tigerastatuses.operator.tigera.io created
serviceaccount/tigera-operator created
clusterrole.rbac.authorization.k8s.io/tigera-operator created
clusterrolebinding.rbac.authorization.k8s.io/tigera-operator created
deployment.apps/tigera-operator created
The CustomResourceDefinition "installations.operator.tigera.io" is invalid: metadata.annotations: Too long: may not be more than 262144 bytes
반응형