把这段话翻译成中文:Initially, Jordan mentioned that the Pre-Configuration feature was not working, even with both EX920 meshed and connected to the internet. When the testing started I deleted the network and factory reset the devices then powered them off. I created the network in the portal and enabled pre configuration parameters. Powered on the main unit and after a short time the network came online in the portal, we powered on the satellite unit and also came online in the portal. These initial testing show the appropriate behavior. later on, Jordan attempted to recreate the previous test and mentioned it did not work for him, the network remained inactive in the portal. On our next troubleshooting call I followed the exact same previous steps and the network remained inactive in the portal.
时间: 2023-03-06 22:02:56 浏览: 117
首先,乔丹提到,即使EX920互联网拓扑结构连接在网络上,预配置功能也无法正常工作。在测试开始时,我删除了网络,并对设备进行了恢复出厂设置,然后将其关闭。我在门户中创建了网络,并启用了预配置参数。打开主机,短时间内网络就在门户中上线了,我们打开卫星单元,也在门户中上线。这些初始测试表明了适当的行为。后来,乔丹试图重新创建之前的测试,但他说它对他来说不起作用,网络仍然在门户中处于不活动状态。在我们的下一次故障排除电话中,我按照完全相同的步骤,网络仍然在门户中处于不活动状态。
相关问题
解决error initially creating leader election record: endpoints is forbidden: User "system:serviceaccount:default:nfs-client-provisioner" cannot create resource "endpoints" in API group "" in the namespace "default"的yaml,怎么写
你可以创建一个 RBAC 的 YAML 文件,给 "system:serviceaccount:default:nfs-client-provisioner" 用户授予创建 endpoints 资源的权限。以下是一个示例 YAML 文件的内容:
```yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: nfs-client-provisioner-endpoints
rules:
- apiGroups: [""]
resources: ["endpoints"]
verbs: ["create"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: nfs-client-provisioner-endpoints-binding
subjects:
- kind: ServiceAccount
name: nfs-client-provisioner
namespace: default
roleRef:
kind: Role
name: nfs-client-provisioner-endpoints
apiGroup: rbac.authorization.k8s.io
```
你可以将上面的 YAML 文件保存为一个文件,比如 `nfs-client-provisioner-rbac.yaml`,然后使用 kubectl apply 命令来创建这个 RBAC 规则:
```
kubectl apply -f nfs-client-provisioner-rbac.yaml
```
这样,"system:serviceaccount:default:nfs-client-provisioner" 用户就可以在 default 命名空间中创建 endpoints 资源了。
error initially creating leader election record: endpoints is forbidden: User "system:serviceaccount:default:nfs-client-provisioner" cannot create resource "endpoints" in API group "" in the namespace "default"
这个错误是因为 "system:serviceaccount:default:nfs-client-provisioner" 这个用户在 default 命名空间中没有创建 endpoints 资源的权限。要解决这个问题,你可以给这个用户赋予创建 endpoints 资源的权限,具体方法可以参考 Kubernetes 的 RBAC (Role-Based Access Control) 文档。或者你也可以考虑使用一个拥有创建 endpoints 资源权限的用户来运行 nfs-client-provisioner。
相关推荐
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![rar](https://img-home.csdnimg.cn/images/20210720083606.png)
![](https://csdnimg.cn/download_wenku/file_type_ask_c1.png)
![](https://csdnimg.cn/download_wenku/file_type_ask_c1.png)
![](https://csdnimg.cn/download_wenku/file_type_ask_c1.png)
![](https://csdnimg.cn/download_wenku/file_type_ask_c1.png)
![](https://csdnimg.cn/download_wenku/file_type_ask_c1.png)
![](https://csdnimg.cn/download_wenku/file_type_ask_c1.png)
![](https://csdnimg.cn/download_wenku/file_type_ask_c1.png)
![](https://csdnimg.cn/download_wenku/file_type_ask_c1.png)
![](https://csdnimg.cn/download_wenku/file_type_ask_c1.png)
![](https://csdnimg.cn/download_wenku/file_type_ask_c1.png)
![](https://csdnimg.cn/download_wenku/file_type_ask_c1.png)
![](https://csdnimg.cn/download_wenku/file_type_ask_c1.png)
![rar](https://img-home.csdnimg.cn/images/20210720083606.png)