Update readme.md

This commit is contained in:
EHerzog76 2024-12-09 13:05:36 +01:00 committed by GitHub
parent d88a3ac33e
commit f13c29f61d
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -1,6 +1,6 @@
# Kubernetes Deployment example # Kubernetes Deployment example
This is an example of one possibilty how to deploy netboot.xyz to a OKD/OpenShift cluster. This is an example of one possibilty how to deploy netboot.xyz to a OKD/OpenShift cluster.
You can also use it for a Kubernetes cluster, but in this case you will add your ingress configuration instead of the route. You can also use it for a Kubernetes cluster, but in this case you will add your ingress configuration instead of the route.
## Edit PVC config ## Edit PVC config
@ -43,10 +43,10 @@ kubectl -n network apply -f service.yaml
Please notice the service configuration for the service: Please notice the service configuration for the service:
- svc-pxboot - svc-pxboot
this is from **type: NodePort**. this is from **type: NodePort**.
This is important, because after a TFTP-client requests a file, This is important, because after a TFTP-client requests a file,
the TFTP-Server will initiate a new connection and send data back to the client over this new connection. the TFTP-Server will initiate a new connection and send data back to the client over this new connection.
So you must configure your **CNI** to **not** use source nat (**SNAT**) for this connections ! So you must configure your **CNI** to **not** use source nat (**SNAT**) for this connections !
CNI configs: CNI configs:
- calico [SNAT-Config](https://docs.tigera.io/calico/latest/networking/configuring/workloads-outside-cluster) - calico [SNAT-Config](https://docs.tigera.io/calico/latest/networking/configuring/workloads-outside-cluster)
- cilium [SNAT-Config](https://docs.cilium.io/en/stable/network/concepts/masquerading/) - cilium [SNAT-Config](https://docs.cilium.io/en/stable/network/concepts/masquerading/)