From a90c0075c8cb45e8b002bc599b91fc3fbb76106d Mon Sep 17 00:00:00 2001 From: Bryan Boreham Date: Wed, 17 Jun 2020 17:03:13 +0000 Subject: [PATCH] Typo --- site/kubernetes/kube-addon.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/site/kubernetes/kube-addon.md b/site/kubernetes/kube-addon.md index dd19c9e5d9..9efc30540e 100644 --- a/site/kubernetes/kube-addon.md +++ b/site/kubernetes/kube-addon.md @@ -82,7 +82,7 @@ This is a prerequisite to use use role-based access control on GKE. Please see t EKS by default installs `amazon-vpc-cni-k8s` CNI. Please follow below steps to use Weave-net as CNI - create EKS cluster in any of [prescribed](https://docs.aws.amazon.com/eks/latest/userguide/create-cluster.html) way -- delete `amazon-vpc-cni-k8s` deamonset by running `kubectl delete ds aws-node -n kube-system` command +- delete `amazon-vpc-cni-k8s` daemonset by running `kubectl delete ds aws-node -n kube-system` command - delete `/etc/cni/net.d/10-aws.conflist` on each of the node - edit instance security group to allow TCP 6783 and UDP 6783/6784 ports - flush iptables nat, mangle, filter tables to clear any iptables configurations done by `amazon-vpc-cni-k8s`