From d91b244b02c86d27a3d25d8f3c9a7061054b8f2c Mon Sep 17 00:00:00 2001 From: Maycon Santos Date: Fri, 23 Feb 2024 17:32:38 +0100 Subject: [PATCH] adjust images width --- src/pages/how-to/routing-peers-and-kubernetes.mdx | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/src/pages/how-to/routing-peers-and-kubernetes.mdx b/src/pages/how-to/routing-peers-and-kubernetes.mdx index d5c31f4c..45acd601 100644 --- a/src/pages/how-to/routing-peers-and-kubernetes.mdx +++ b/src/pages/how-to/routing-peers-and-kubernetes.mdx @@ -26,7 +26,7 @@ suit your needs. See the screenshot below for reference:

- k8s-create-setup-key + k8s-create-setup-key

With your setup key created, note it down for the next steps. @@ -41,12 +41,12 @@ Set the distribution group to `hetzner-servers`. This group is used to distribut See the screenshot below for reference:

- k8s-add-network-route + k8s-add-network-route

Click on Name & Description to give your route a name and description. Then click on `Add Route` to save your changes.

- k8s-name-network-route + k8s-name-network-route

### Step 3: Create an access control policy @@ -55,12 +55,12 @@ Navigate to Access Control Policies in the NetBird management dashboard and clic Set the source group to `hetzner-servers` and the destination group to `kubernetes-routers`. This configuration allows the Hetzner servers to access the kubernetes pods.

- k8s-add-access-control-policy + k8s-add-access-control-policy

Click on Name & Description to give your policy a name and description. Then click on `Add Policy` to save your changes.

- k8s-name-access-control-policy + k8s-name-access-control-policy

### Step 4: Deploy the NetBird agent @@ -121,7 +121,7 @@ kubectl logs -l app=netbird You can also verify that the agent is connected to the NetBird management dashboard by checking the dashboard.

- k8s-netbird-agent-connected + k8s-netbird-agent-connected

## Conclusion