Skip to content

Latest commit

 

History

History

ipsec_mechanism

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 

IPSec remote mechanism examples

Contain a setup for NSM that includes nsmgr, forwarder-vpp, registry-k8s. This setup can be used to check mechanisms combination.

Unlike the basic setup, which uses Wireguard as the default IP remote mechanism, we prioritize IPSec here.

Requires

Run

Apply NSM resources for basic tests:

kubectl apply -k https://github.com/networkservicemesh/deployments-k8s/examples/ipsec_mechanism?ref=6d8a27030aa0de0145b0b66a8f81217a8294a55e

Wait for admission-webhook-k8s:

WH=$(kubectl get pods -l app=admission-webhook-k8s -n nsm-system --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}')
kubectl wait --for=condition=ready --timeout=1m pod ${WH} -n nsm-system

Includes

Cleanup

To free resources follow the next commands:

kubectl delete mutatingwebhookconfiguration nsm-mutating-webhook
kubectl delete ns nsm-system