in contrib/cmd/runkperf/commands/bench/cilium_cr_list.go [239:291]
func generateCiliumEndpoint() string {
cepName := uuid.New().String()
return fmt.Sprintf(`
apiVersion: cilium.io/v2
kind: CiliumEndpoint
metadata:
name: "%s"
status:
encryption: {}
external-identifiers:
container-id: 790d85075c394a8384f8b1a0fec62e2316c2556d175dab0c1fe676e5a6d92f33
k8s-namespace: kube-system
k8s-pod-name: coredns-54b69f46b8-dbcdl
pod-name: kube-system/coredns-54b69f46b8-dbcdl
id: 1453
identity:
id: 0000001
labels:
- k8s:io.cilium.k8s.namespace.labels.control-plane=true
- k8s:io.cilium.k8s.namespace.labels.kubernetes.azure.com/managedby=aks
- k8s:io.cilium.k8s.namespace.labels.kubernetes.io/cluster-service=true
- k8s:io.cilium.k8s.namespace.labels.kubernetes.io/metadata.name=kube-system
- k8s:io.cilium.k8s.policy.cluster=default
- k8s:io.cilium.k8s.policy.serviceaccount=coredns
- k8s:io.kubernetes.pod.namespace=kube-system
- k8s:k8s-app=kube-dns
- k8s:kubernetes.azure.com/managedby=aks
- k8s:version=v20
named-ports:
- name: dns
port: 53
protocol: UDP
- name: dns-tcp
port: 53
protocol: TCP
- name: metrics
port: 9153
protocol: TCP
networking:
addressing:
- ipv4: 10.244.1.38
node: 10.224.0.4
policy:
egress:
enforcing: false
state: <status disabled>
ingress:
enforcing: false
state: <status disabled>
state: ready
visibility-policy-status: <status disabled>
`, cepName)
}