Skip to content

Latest commit

 

History

History

ipsec_mechanism

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 

IPSec remote mechanism examples

Contain a setup for NSM that includes nsmgr, forwarder-vpp, registry-k8s. This setup can be used to check mechanisms combination.

Unlike the basic setup, which uses Wireguard as the default IP remote mechanism, we prioritize IPSec here.

Requires

Run

Apply NSM resources for basic tests:

kubectl apply -k https://github.com/networkservicemesh/deployments-k8s/examples/ipsec_mechanism?ref=0e8c3ce7819f0640d955dc1136a64ecff2ae8c56

Wait for admission-webhook-k8s:

WH=$(kubectl get pods -l app=admission-webhook-k8s -n nsm-system --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}')
kubectl wait --for=condition=ready --timeout=1m pod ${WH} -n nsm-system

Includes

Cleanup

To free resources follow the next commands:

kubectl delete mutatingwebhookconfiguration nsm-mutating-webhook
kubectl delete ns nsm-system