You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As you can see, the Load Balancer routed the request to node `test1-control-plane-cn9lm` that is the only node with role `master` in this workload cluster.
45
+
As you can see, the Load Balancer routed the request to node `test1-control-plane-cn9lm` that is the only node with role `control-plane` in this workload cluster.
46
46
47
47
In order to SSH to node 'test1-md-0-scctm', you can use the other node as a bastion:
Clusters using an `Internal` Load Balancer (private clusters) can't use this approach. Network-level SSH access to those clusters have to be made on the private IP address of VMs
54
+
Clusters using an `Internal` Load Balancer (private clusters) can't use this approach. Network-level SSH access to those clusters has to be made on the private IP address of VMs
55
55
by first getting access to the Virtual Network. How to do that is out of the scope of this document.
56
56
A possible alternative that works for private clusters as well is described in the next paragraph.
57
57
@@ -65,7 +65,7 @@ It is enough to set the field's value to the empty object `{}` and the default c
65
65
66
66
For example this is an `AzureCluster` CR with the `Azure Bastion` feature enabled:
@@ -121,7 +121,7 @@ With the networking part sorted, we still have to work out a way of authenticati
121
121
In order to add an SSH authorized key for user `username` and provide `sudo` access to the `control plane` VMs, you can adjust the `KubeadmControlPlane` CR
0 commit comments