You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -103,76 +103,7 @@ To troubleshoot these issues, `netshoot` includes a set of powerful tools as rec
103
103
vim
104
104
websocat
105
105
106
-
## **Docker EE 2.0 + Kubernetes Use Cases:**
107
-
Here's a list of use-cases that can help you understand when and how to use this container to solve networking issues in your Docker cluster. Please feel free to add your own use-case where you used `netshoot` to investigate, trouble-shoot, or just learn more about your environment!!!
108
-
109
-
110
-
## Managing Kubernetes Calico CNI with calicoctl
111
-
112
-
In Docker Enterprise Edition, and in so many Kubernetes-based solutions, [Calico](https://www.projectcalico.org/) is used as the default CNI plugin of choice. This means that all the pod networking related resources ( IP assignment, routing, network policies, etc..) is handled by Calico. [calicoctl](https://github.com/projectcalico/calicoctl) is a cli tool to makes it easy to manage Calico network and security policy, as well as other Calico configurations. The calicoctl tool talks directly to `etcd`, so it's often not possible or recommended to expose etcd outside of the Kubernetes cluster. A recommended way to use calicoctl is to run it on a the master node inside the cluster.
113
-
114
-
Assuming you are running Docker EE 2.0 (although this should work on any Kuberenetes cluster with Calico installed), run the `netshoot` as a deployment using [this deployment](configs/netshoot-calico.yaml). This deployment will use the `kube-system` namespace.
115
-
116
-
```
117
-
# Note: This step assumes you loaded UCP client bundle and have kubectl working as expected.
118
-
🐳 → kubectl apply -f netshoot-calico.yaml
119
-
```
120
-
121
-
This deployment will deploy a single pod on a master node and automatically load up etcd certs so you can easily start using calicoctl. Now it's time to exec into the pod:
122
-
123
-
```
124
-
🐳 → kubectl get pod --selector=app=netshoot -n kube-system
Now exec into this pod and use the calicoctl directly without any further configurations! Full documentations on using the calicoctl tool is found [here](https://docs.projectcalico.org/v3.1/reference/calicoctl/commands/).
@@ -670,4 +601,5 @@ More info on `termshark` [here](https://github.com/gcla/termshark)
670
601
671
602
## Feedback + Contribution
672
603
673
-
Feel free to provide feedback and contribute networking troubleshooting tools and use-cases by opening PRs.
604
+
Feel free to provide feedback and contribute networking troubleshooting tools and use-cases by opening PRs. If you would like to add any package, open a PR with the rationale and ensure that you update both the Dockerfile and the README with some examples on how to use it!
0 commit comments