Cilium v1.6 Documentationto secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular [https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/], Ingress [https://kubernetes.io/docs/concepts/services-networking/ingress/], Service [https://kubernetes.io/docs/concepts/services-networking/service/] on all worker nodes Recommended: Enable PodCIDR allocation (--allocate-node-cidrs) in the kube-controller-manager (recommended) Refer to the section Requirements for detailed instruction on how to prepare0 码力 | 734 页 | 11.45 MB | 1 年前3
 Cilium v1.8 Documentationto secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular [https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/], Ingress [https://kubernetes.io/docs/concepts/services-networking/ingress/], Service [https://kubernetes.io/docs/concepts/services-networking/service/] on all worker nodes Recommended: Enable PodCIDR allocation (--allocate-node-cidrs) in the kube-controller-manager (recommended) Refer to the section Requirements for detailed instruction on how to prepare0 码力 | 1124 页 | 21.33 MB | 1 年前3
 Cilium v1.9 Documentationto secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular [https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/], Ingress [https://kubernetes.io/docs/concepts/services-networking/ingress/], Service [https://kubernetes.io/docs/concepts/services-networking/service/] on all worker nodes Recommended: Enable PodCIDR allocation (--allocate-node-cidrs) in the kube-controller-manager (recommended) Refer to the section Requirements for detailed instruction on how to prepare0 码力 | 1263 页 | 18.62 MB | 1 年前3
 Cilium v1.10 Documentationto secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular on all worker nodes Recommended: Enable PodCIDR allocation (--allocate-node-cidrs) in the kube-controller-manager (recommended) Refer to the section Requirements for detailed instruction on how to prepare Values=${infraID}-master-sg" | jq -r '.SecurityGroups[0].GroupId')" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp,FromPort=8472,ToPort=8472,UserIdGroupPairs=0 码力 | 1307 页 | 19.26 MB | 1 年前3
 Cilium v1.11 Documentationto secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular on all worker nodes Recommended: Enable PodCIDR allocation (--allocate-node-cidrs) in the kube-controller-manager (recommended) Refer to the section Requirements for detailed instruction on how to prepare 3m19s $ kubectl -n kube-system exec cilium-1c2cz -- cilium endpoint list ENDPOINT POLICY (ingress) POLICY (egress) IDENTITY LABELS (source:key[=value]) IPv6 IPv40 码力 | 1373 页 | 19.37 MB | 1 年前3
 Cilium v1.7 Documentationto secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular [https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/], Ingress [https://kubernetes.io/docs/concepts/services-networking/ingress/], Service [https://kubernetes.io/docs/concepts/services-networking/service/] on all worker nodes Recommended: Enable PodCIDR allocation (--allocate-node-cidrs) in the kube-controller-manager (recommended) Refer to the section Requirements for detailed instruction on how to prepare0 码力 | 885 页 | 12.41 MB | 1 年前3
 Cilium v1.5 Documentationto secure access to and from external services, tradi�onal CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from applica�on containers to par�cular [h�ps://kubernetes.io/docs/concepts/overview/working-with- objects/labels/], Ingress [h�ps://kubernetes.io/docs/concepts/services- networking/ingress/], Service [h�ps://kubernetes.io/docs/concepts/services- networking/service/] filesystem mounted on all worker nodes Enable PodCIDR alloca�on ( --allocate-node-cidrs ) in the kube-controller-manager (recommended) Refer to the sec�on Requirements for detailed instruc�on on how to prepare0 码力 | 740 页 | 12.52 MB | 1 年前3
 Traefik 在⼜拍云的应⽤和改造Traefik 在⼜拍云的应⽤和改造 陈卓 ⼜拍云系统开发⼯程师 公开课 分享内容 • Traefik 简介 • Traefik 跟 Ingress-Nginx 比较 • 我们为什么使用 Traefik • Traefik 改造之路 Traefik 简介 Traefik 简介 Edge Router Auto Service Discovery Traefik 简介 Traefik 配置提供者 —Provider Ingress-Nginx 介绍 • Ingress-Nginx: K8S 官方的 Http 网关产品 • Ingress 配置: 指的是 K8S 的 Ingress 的 configmap Ingress Controller Ingress Nginx Ingress 配置 Ingress-Nignx 流程 为什么选择 Traefik,不⽤其它产品 Traefik,不⽤其它产品 ingress-nginx/kong/apisix controller 使用 go,网关使用基于 openresty 的软件 性能有保障,但增加修改,kong/apisix 需要额外的存储 envoy/getambassador envoy 成熟,但是 c++ 的 controller getambassador 使用度不高0 码力 | 22 页 | 1.91 MB | 1 年前3
 The Path to GitOpsit can be declar- ative based on a source of truth. Based on a reconciliation loop, the GitOps controller makes changes to the cluster by deploying new instances, once those changes have been committed by the GitOps controller. What’s powerful about this method is that you no longer have to wait for the CI/CD process to finish before detecting and correcting drift. The GitOps controller acts as both These components include the source controller, the Kustomize controller, the Helm controller, the notification controller, and the image automation controller. Flux was born out of the best practices0 码力 | 45 页 | 1.09 MB | 1 年前3
 1.5 Years of Cilium Usage at DigitalOceancilium-operator Node #1 cilium-agent cilium-operator Control Plane kube-api-server cilium-agent kube-controller- manager scheduler ….. etcd VPC digitalocean.com How’s Cilium been working for us? ● Good connectivity between apps (allow for same customer, deny otherwise) ○ restrict connectivity for ingress (Envoy) and egress (public Internet with exceptions, e.g., SMTP) ○ allow connectivity to needed0 码力 | 7 页 | 234.36 KB | 1 年前3
共 91 条
- 1
 - 2
 - 3
 - 4
 - 5
 - 6
 - 10
 













