The document discusses the use of the "calicoctl container" command to manage container networking with Calico. Specifically, it describes how to add and remove containers from the Calico network by assigning IP addresses, and how to add and remove IP addresses from existing Calico-enabled containers. Examples of usage are provided.
Adapted version for SlideShare of the presentation given at Scala Days 2019 by Viktor Klang.
Abstract:
For Scala 2.13, the implementation of Future & Promise and undergone a lot of work‚ yielding some rather dramatic performance, as well as semantical, improvements.
After this talk you will know what a Future and a Promise is: how they work; how they relate to ExecutionContexts & BlockContexts; and what has driven the implementation to evolve into what it is today. You will have a good grasp of the feature set, and performance, over time. You will also, most likely, have picked up some tips & tricks which will improve your use of Scala Future & Promise in the future!
Short introduction to ROP which is a basic in computer security exploitation and implemented defenses. It contains useful links for further research at the end.
Kube-proxy enables access to Kubernetes services (virtual IPs backed by pods) by configuring client-side load-balancing on nodes. The first implementation relied on a userspace proxy which was not very performant. The second implementation used iptables and is still the one used in most Kubernetes clusters. Recently, the community introduced an alternative based on IPVS. This talk will start with a description of the different modes and how they work. It will then focus on the IPVS implementation, the improvements it brings, the issues we encountered and how we fixed them as well as the remaining challenges and how they could be addressed. Finally, the talk will present alternative solutions based on eBPF such as Cilium.
Going from 7,000 concurrent users to 50,000 concurrent users in a matter of seconds is not an uncommon occurrence at Kumparan. In this 5-10 minutes talk I will show you how Kumparan use Python asyncio to build a service to handle requests at this scale.
Transcript: https://medium.com/@pyk/asynchronous-python-at-kumparan-a511d478c2b9
Adapted version for SlideShare of the presentation given at Scala Days 2019 by Viktor Klang.
Abstract:
For Scala 2.13, the implementation of Future & Promise and undergone a lot of work‚ yielding some rather dramatic performance, as well as semantical, improvements.
After this talk you will know what a Future and a Promise is: how they work; how they relate to ExecutionContexts & BlockContexts; and what has driven the implementation to evolve into what it is today. You will have a good grasp of the feature set, and performance, over time. You will also, most likely, have picked up some tips & tricks which will improve your use of Scala Future & Promise in the future!
Short introduction to ROP which is a basic in computer security exploitation and implemented defenses. It contains useful links for further research at the end.
Kube-proxy enables access to Kubernetes services (virtual IPs backed by pods) by configuring client-side load-balancing on nodes. The first implementation relied on a userspace proxy which was not very performant. The second implementation used iptables and is still the one used in most Kubernetes clusters. Recently, the community introduced an alternative based on IPVS. This talk will start with a description of the different modes and how they work. It will then focus on the IPVS implementation, the improvements it brings, the issues we encountered and how we fixed them as well as the remaining challenges and how they could be addressed. Finally, the talk will present alternative solutions based on eBPF such as Cilium.
Going from 7,000 concurrent users to 50,000 concurrent users in a matter of seconds is not an uncommon occurrence at Kumparan. In this 5-10 minutes talk I will show you how Kumparan use Python asyncio to build a service to handle requests at this scale.
Transcript: https://medium.com/@pyk/asynchronous-python-at-kumparan-a511d478c2b9
Exactly Once Semantics Revisited (Jason Gustafson, Confluent) Kafka Summit NY...confluent
Two years ago, we helped to contribute a framework for exactly once semantics (or EOS) to Apache Kafka. This much-needed feature brought transactional guarantees to stream processing engines such as Kafka Streams. In this talk, we will recount the journey since then and the lessons we have learned as usage has gradually picked up steam. What did we get right and what did we get wrong? Most importantly, we will discuss how the work is continuing to evolve in order to provide more reliability and better performance. This talk assumes basic familiarity with Kafka and the log abstraction. What you will get out of it is a deeper understanding of the underlying architecture of the EOS framework in Kafka, what its limitations are, and how you can use it to solve problems.
10 ways to shoot yourself in the foot with kubernetes, #9 will surprise you! ...Laurent Bernaille
Kubernetes is a very powerful and complicated system, and many users don’t understand the underlying systems. Come learn how your users can abuse container runtimes, overwhelm your control plane, and cause outages - it’s actually quite easy!
In the last year, we have containerized hundreds of applications and deployed them in large scale clusters (more than 1000 nodes). The journey was eventful and we learned a lot along the way. We’ll share stories of our ten favorite Kubernetes foot guns, including the dangers of cargo culting, rolling updates gone wrong, the pitfalls of initContainers, and nightmarish daemonset upgrades. The talk will present solutions we adopted to avoid or work around some these problems and will finally show several improvements we plan deploy in the future.
Similar to the Kubecon talk with the same title with a few new incidents.
Max Gallo - Reinventing RxJS - Codemotion Rome 2019Codemotion
RxJS has become almost a standard in the emerging reactive Front-End world. If you're not using it right now, you probably played with a few operators. In the talk we're going to rewrite RxJS from scratch, seeing behind the curtains which are the core components and the ideas of the library. You'll see how to build Observables, Subscriptions and Operator, then we'll introduce Schedulers and how they're used in RxJS. If you fancy Reactive Programming or simply you want to learn something new then... this talk is for you!
https://github.com/fdaciuk/talks
Vídeo:
https://youtu.be/7Ur9zN2vMcs
Versão com Gifs:
https://docs.google.com/presentation/d/1yX33K4Ubiwsg46pqvpbFYVbvK86ZcHVRcomJwOwTIOI/present
Shellshock, also known as Bashdoor, is a family of security bugs in the widely used Unix Bash shell, the first of which was disclosed on 24 September 2014. Many Internet-facing services, such as some web server deployments, use Bash to process certain requests, allowing an attacker to cause vulnerable versions of Bash to execute arbitrary commands. This can allow an attacker to gain unauthorized access to a computer system.
The Golang standard library provides a lot of examples of code design practices and patterns which allow us to create great things. However in practice engineers often ignore them.
I`m going to tell the story about one little library: the way from write-to-work stage to the idiomatic go implementation.
Kubernetes is currently the most popular container orchestration platform, and while many organizations are migrating their workloads to it, Kubernetes is still relatively immature. New corner cases, errors, and quirks are regularly discovered as users push the boundaries of size and scale.
Joining Datadog allowed me to discover Kubernetes at a larger scale. In this session I will share what I’ve learned, how it has changed my perspective about the Kubernetes ecosystem, and how you can apply those learnings when scaling your cluster to hundreds or thousands of nodes.
Sharding and Load Balancing in Scala - Twitter's FinagleGeoff Ballinger
My presentation at Mostly Functional (http://mostlyfunctional.com), part of this year's Turing Festival Fringe (http://turingfestival.com) in Edinburgh. The example source code is up on Github at https://github.com/geoffballinger/simple-sharder
Knit, Chisel, Hack: Building Programs in Guile Scheme (Strange Loop 2016)Igalia
By Andy Wingo.
This talk makes the case that Guile is a delightful medium for making crafty programs, from the most ephemeral scripts to long-lived systems that you can rely on for years. Guile takes the elegant Scheme programming language, integrates it with the POSIX environments that you know and loathe and love, and wraps it all up in a responsive, hackable environment that nurtures programs from the small up to the large. Guile hacker will give you a gentle introduction to the language as they lead you through the process of building cool stuff in Scheme. With all this going for it, maybe you will choose to make your next program in Guile!
(c) Strange Loop 2016
http://www.thestrangeloop.com/2016/sessions.html
Exactly Once Semantics Revisited (Jason Gustafson, Confluent) Kafka Summit NY...confluent
Two years ago, we helped to contribute a framework for exactly once semantics (or EOS) to Apache Kafka. This much-needed feature brought transactional guarantees to stream processing engines such as Kafka Streams. In this talk, we will recount the journey since then and the lessons we have learned as usage has gradually picked up steam. What did we get right and what did we get wrong? Most importantly, we will discuss how the work is continuing to evolve in order to provide more reliability and better performance. This talk assumes basic familiarity with Kafka and the log abstraction. What you will get out of it is a deeper understanding of the underlying architecture of the EOS framework in Kafka, what its limitations are, and how you can use it to solve problems.
10 ways to shoot yourself in the foot with kubernetes, #9 will surprise you! ...Laurent Bernaille
Kubernetes is a very powerful and complicated system, and many users don’t understand the underlying systems. Come learn how your users can abuse container runtimes, overwhelm your control plane, and cause outages - it’s actually quite easy!
In the last year, we have containerized hundreds of applications and deployed them in large scale clusters (more than 1000 nodes). The journey was eventful and we learned a lot along the way. We’ll share stories of our ten favorite Kubernetes foot guns, including the dangers of cargo culting, rolling updates gone wrong, the pitfalls of initContainers, and nightmarish daemonset upgrades. The talk will present solutions we adopted to avoid or work around some these problems and will finally show several improvements we plan deploy in the future.
Similar to the Kubecon talk with the same title with a few new incidents.
Max Gallo - Reinventing RxJS - Codemotion Rome 2019Codemotion
RxJS has become almost a standard in the emerging reactive Front-End world. If you're not using it right now, you probably played with a few operators. In the talk we're going to rewrite RxJS from scratch, seeing behind the curtains which are the core components and the ideas of the library. You'll see how to build Observables, Subscriptions and Operator, then we'll introduce Schedulers and how they're used in RxJS. If you fancy Reactive Programming or simply you want to learn something new then... this talk is for you!
https://github.com/fdaciuk/talks
Vídeo:
https://youtu.be/7Ur9zN2vMcs
Versão com Gifs:
https://docs.google.com/presentation/d/1yX33K4Ubiwsg46pqvpbFYVbvK86ZcHVRcomJwOwTIOI/present
Shellshock, also known as Bashdoor, is a family of security bugs in the widely used Unix Bash shell, the first of which was disclosed on 24 September 2014. Many Internet-facing services, such as some web server deployments, use Bash to process certain requests, allowing an attacker to cause vulnerable versions of Bash to execute arbitrary commands. This can allow an attacker to gain unauthorized access to a computer system.
The Golang standard library provides a lot of examples of code design practices and patterns which allow us to create great things. However in practice engineers often ignore them.
I`m going to tell the story about one little library: the way from write-to-work stage to the idiomatic go implementation.
Kubernetes is currently the most popular container orchestration platform, and while many organizations are migrating their workloads to it, Kubernetes is still relatively immature. New corner cases, errors, and quirks are regularly discovered as users push the boundaries of size and scale.
Joining Datadog allowed me to discover Kubernetes at a larger scale. In this session I will share what I’ve learned, how it has changed my perspective about the Kubernetes ecosystem, and how you can apply those learnings when scaling your cluster to hundreds or thousands of nodes.
Sharding and Load Balancing in Scala - Twitter's FinagleGeoff Ballinger
My presentation at Mostly Functional (http://mostlyfunctional.com), part of this year's Turing Festival Fringe (http://turingfestival.com) in Edinburgh. The example source code is up on Github at https://github.com/geoffballinger/simple-sharder
Knit, Chisel, Hack: Building Programs in Guile Scheme (Strange Loop 2016)Igalia
By Andy Wingo.
This talk makes the case that Guile is a delightful medium for making crafty programs, from the most ephemeral scripts to long-lived systems that you can rely on for years. Guile takes the elegant Scheme programming language, integrates it with the POSIX environments that you know and loathe and love, and wraps it all up in a responsive, hackable environment that nurtures programs from the small up to the large. Guile hacker will give you a gentle introduction to the language as they lead you through the process of building cool stuff in Scheme. With all this going for it, maybe you will choose to make your next program in Guile!
(c) Strange Loop 2016
http://www.thestrangeloop.com/2016/sessions.html
Replacing iptables with eBPF in Kubernetes with CiliumMichal Rostecki
Cilium is an open source project which provides networking, security and load balancing for application services that are deployed using Linux container technologies by using the native eBPF technology in the Linux kernel. In this presentation we talked about:
- The evolution of the BPF filters and explained the advantages of eBPF Filters and its use cases today in Linux especially on how Cilium networking utilizes the eBPF Filters to secure the Kubernetes workload with increased performance when compared to legacy iptables.
- How Cilium uses SOCKMAP for layer 7 policy enforcement - How Cilium integrates with Istio and handles L7 Network Policies with Envoy Proxies.
- The new features since the last release such as running Kubernetes cluster without kube-proxy, providing clusterwide NetworkPolicies, providing fully distributed networking and security observability platform for cloud native workloads etc.
apidays New York 2023 - Use What You've Got, Sarah Simpers, MongoDBapidays
apidays New York 2023
APIs for Embedded Business Models: Finance, Healthcare, Retail, and Media
May 16 & 17, 2023
Use What You've Got: How Incremental Updates to our Automated CLI Docs Improve the Developer Experience
Sarah Simpers, Senior Technical Writer at MongoDB
------
Check out our conferences at https://www.apidays.global/
Do you want to sponsor or talk at one of our conferences?
https://apidays.typeform.com/to/ILJeAaV8
Learn more on APIscene, the global media made by the community for the community:
https://www.apiscene.io
Explore the API ecosystem with the API Landscape:
https://apilandscape.apiscene.io/
JDD2015: Kubernetes - Beyond the basics - Paul BakkerPROIDEA
KUBERNETES - BEYOND THE BASICS
Kubernetes has answers to many questions related to clustering and the required low-level networking. When using Kubernetes for real live deployments we need more than those lower-level solutions however. We need things like automated deployments, load balancing for web applications, blue/green deployments and monitoring.
This is all possible with Kubernetes when we start to look at Kubernetes as an API. In this talk you will learn to embrace the Kuberentes API and some of the patterns, tools and mechanisms we developed and use around Kubernetes to prepare for production grade deployments.
Canary Deployments for Kubernetes (KubeCon 2018 North America)Nail Islamov
https://kccna18.sched.com/event/GrUI/custom-deployment-strategies-for-kubernetes-nail-islamov-atlassian
Many tech companies are using continuous deployments (CD) to deliver changes to their users faster and more frequently. One of the challenges with automated deployments is making them safe by detecting and quickly rolling back in the event of a bad release. Standard CD practices include using canary and blue-green deployments; unfortunately, Kubernetes only supports the "rolling update" deployment strategy out of the box, which can only prevent trivial failures. Thanks to extensibility of Kubernetes, it is possible to build custom advanced deployment strategies while reusing Kubernetes core concepts. Nail Islamov will give an overview of how Deployment, ReplicaSet and Pod objects work together along with Service and Ingress, and will provide examples of implementing blue-green and canary deployments reusing these concepts by introducing extra CRD resources.
Salvatore Incandela, Fabio Marinelli - Using Spinnaker to Create a Developmen...Codemotion
Out of the box Kubernetes is an Operations platform which is great for flexibility but creates friction for deploying simple applications. Along comes Spinnaker which allows you to easily create custom workflows for testing, building, and deploying your application on Kubernetes. Salvatore Incandela and Fabio Marinelli will give an introduction to Containers and Kubernetes and the default development/deployment workflows that it enables. They will then show you how you can use Spinnaker to simplify and streamline your workflow and help provide a full #gitops style CI/CD.
A small introduction to get started on Kubernetes as a user. This explains the main concepts like pod, deployment and services and gives some hints to help you use kubectl command.
These slides were presented in Grenoble Docker meetup in November 2017.
Verified CKAD Exam Questions and Answersdalebeck957
Really impressed by the brilliant exam practise software. Highly recommended to all candidates for the CKAD exam preparations. I got 93% in the first attempt.
On parle des Operator Kubernetes, mais de quoi s’agit-il ? Comment peut-on programmer son cluster Kubernetes et surtout, est-il possible de les écrire en Java ?
C’est ce que nous allons présenter au cours de 3 sessions dont celle-ci est la première. Dans cette session, nous allons présenter les différentes ressources de l’api REST de Kubernetes, les CRD (Custom Resource Definition), la bibliothèque fabric8 kubernetes-client et le projet exemple Hypnos.
par Charles Sabourdin
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. 2
calicoctl container
Her e will t alk about cont ainer command use in
Calico
Displaying the help text for ‘calicoctl container’ commands
Run calicoct l cont ainer --help t o display t he f ollowing help menu f or t he
calicoct l cont ainer commands.
Usage:
calicoct l cont ainer add <CONTAI NER><I P>[--
int erf ace=<I NTERFACE>]
calicoct l cont ainer remove <CONTAI NER>
calicoct l cont ainer <CONTAI NER>ip (add| remove) <I P>[--
int erf ace=<I NTERFACE>]
calicoct l cont ainer <CONTAI NER>endpoint show
calicoct l cont ainer <CONTAI NER>prof ile (append| remove| set )
[<PROFI LES>...]
Descript ion:
Add or remove cont ainers t o calico net working, manage t heir I P
3. 3
calicoctl container
calicoctl container add <CONTAINER> <IP>
This command allows you to add a container into the Calico
network.
This command is required for any container created using default
Docker networking to use Calico. This command creates a new
network interface within the container, connects it to the Calico
network, and assigns the given IP address.
To configure networking policy on a container after it has been
added to Calico, create a profile using calicoctl profile add (see the
calicoctl profile guide) and set the profile on the container using the
calicoctl container <CONTAINER> profile add <PROFILE> command
4. 4
calicoctl container
This command must be run as root and must be run on the specific
Calico node that hosts the container.
Command syntax:
calicoctl container add <CONTAINER> <IP> [--
interface=<INTERFACE>]
<CONTAINER>: The name or ID of the container.
<IP>: An IP address, IP version, or pool expressed as a CIDR prefix.
<INTERFACE>: The name to give to the interface in the container.
[default: eth1]
5. 5
calicoctl container
The <IP> parameter can be expressed in three different ways:
IP address: an IPv4 or IPv6 address from within a Calico pool
IP version: “ipv4” or “ipv6”, which will automatically select an IP
address from an existing Calico pool with the given IP version.
IP CIDR: an IP address CIDR representing an existing Calico pool,
which will automatically select an IP from the pool.
NOTE: Since Calico is fully routed, you do not have to worry about
conflicts with addresses that are commonly reserved L2 subnets,
such as the subnet network and broadcast addresses. It is perfectly
okay to assign an IP address that ends in .0 or .255 to a workload.
If you specify the --interface flag, Calico will use the passed in value
as the name of the new Calico interface.
6. 6
calicoctl container
Examples:
$ calicoctl container add test-container 192.168.1.1
IP 192.168.1.1 added to test-container
$ calicoctl container add test-container ipv6 --interface=eth1
IP fd80:24e2:f998:72d6::1 added to test-container
$ calicoctl container add test-container 192.168.0.0/16
IP 192.168.0.1 added to test-container
$ calicoctl container add test-container ipv4
IP 192.168.0.0 added to test-container
7. 7
calicoctl container
calicoctl container remove <CONTAINER>
This command allows you to remove a container from the Calico
network.
This command must be run as root and must be run on the specific
Calico node that hosts the container.
Command syntax:
calicoctl container remove <CONTAINER>
<CONTAINER>: The name or ID of the container
Examples:
$ calicoctl container remove test-container
Removed Calico interface from test-container
8. 8
calicoctl container
calicoctl container <CONTAINER> ip add <IP>
This command allows you to add an IP address to a container that
has already been configured to use Calico networking with the
calicoctl container add command (see above).
Command syntax:
calicoctl container <CONTAINER> ip add <IP> [--
interface=<INTERFACE>]
Parameters:
<CONTAINER>: The name or ID of the container
<IP>: The IPv4 or IPv6 address to add.
--interface=<INTERFACE> The name to give to the interface in the
container
[default: eth1]