Skip to content

Commit 92a68c7

Browse files
authored
Merge pull request #36775 from Kikiodazie/main
Update Cilium's Installation Output
2 parents 2b79cda + a794cc6 commit 92a68c7

File tree

1 file changed

+26
-30
lines changed

1 file changed

+26
-30
lines changed

content/en/docs/tasks/administer-cluster/network-policy-provider/cilium-network-policy.md

Lines changed: 26 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -41,44 +41,40 @@ minikube version: v1.5.2
4141
minikube start --network-plugin=cni
4242
```
4343

44-
For minikube you can install Cilium using its CLI tool. Cilium will
45-
automatically detect the cluster configuration and will install the appropriate
46-
components for a successful installation:
44+
For minikube you can install Cilium using its CLI tool. To do so, first download the latest
45+
version of the CLI with the following command:
4746

4847
```shell
4948
curl -LO https://github.com/cilium/cilium-cli/releases/latest/download/cilium-linux-amd64.tar.gz
49+
```
50+
51+
Then extract the downloaded file to your `/usr/local/bin` directory with the following command:
52+
53+
```shell
5054
sudo tar xzvfC cilium-linux-amd64.tar.gz /usr/local/bin
5155
rm cilium-linux-amd64.tar.gz
52-
cilium install
53-
```
5456
```
55-
🔮 Auto-detected Kubernetes kind: minikube
56-
✨ Running "minikube" validation checks
57-
✅ Detected minikube version "1.20.0"
58-
ℹ️ Cilium version not set, using default version "v1.10.0"
59-
🔮 Auto-detected cluster name: minikube
60-
🔮 Auto-detected IPAM mode: cluster-pool
61-
🔮 Auto-detected datapath mode: tunnel
62-
🔑 Generating CA...
63-
2021/05/27 02:54:44 [INFO] generate received request
64-
2021/05/27 02:54:44 [INFO] received CSR
65-
2021/05/27 02:54:44 [INFO] generating key: ecdsa-256
66-
2021/05/27 02:54:44 [INFO] encoded CSR
67-
2021/05/27 02:54:44 [INFO] signed certificate with serial number 48713764918856674401136471229482703021230538642
68-
🔑 Generating certificates for Hubble...
69-
2021/05/27 02:54:44 [INFO] generate received request
70-
2021/05/27 02:54:44 [INFO] received CSR
71-
2021/05/27 02:54:44 [INFO] generating key: ecdsa-256
72-
2021/05/27 02:54:44 [INFO] encoded CSR
73-
2021/05/27 02:54:44 [INFO] signed certificate with serial number 3514109734025784310086389188421560613333279574
74-
🚀 Creating Service accounts...
75-
🚀 Creating Cluster roles...
76-
🚀 Creating ConfigMap...
77-
🚀 Creating Agent DaemonSet...
78-
🚀 Creating Operator Deployment...
79-
⌛ Waiting for Cilium to be installed...
57+
58+
After running the above commands, you can now install Cilium with the following command:
59+
60+
```shell
61+
cilium install
8062
```
8163

64+
Cilium will then automatically detect the cluster configuration and create and
65+
install the appropriate components for a successful installation.
66+
The components are:
67+
68+
- Certificate Authority (CA) in Secret `cilium-ca` and certificates for Hubble (Cilium's observability layer).
69+
- Service accounts.
70+
- Cluster roles.
71+
- ConfigMap.
72+
- Agent DaemonSet and an Operator Deployment.
73+
74+
After the installation, you can view the overall status of the Cilium deployment with the `cilium status` command.
75+
See the expected output of the `status` command
76+
[here](https://docs.cilium.io/en/stable/gettingstarted/k8s-install-default/#validate-the-installation).
77+
8278
The remainder of the Getting Started Guide explains how to enforce both L3/L4
8379
(i.e., IP address + port) security policies, as well as L7 (e.g., HTTP) security
8480
policies using an example application.

0 commit comments

Comments
 (0)