The Path to GitOpsInfrastructure as Code Containers Change the Game Argo CD Flux Open Cluster Management Other GitOps Tools PipeCD Keptn Pulumi Kubernetes Operator Summary 7–Handling Secrets Common Patterns Storing Encrypted Secrets Sealed Secrets Challenges of Storing Encrypted Secrets Storing Secret References External Secrets Challenges Storing Secret References Conclusion 41 Chapter 8–Other Considerations Multicluster Management Non-Declarative Infrastructure Security Base Image Selection Everything as0 码力 | 45 页 | 1.09 MB | 1 年前3
GitOps 2.0 The Future of DevOps EbookAuditing 1.9. Running at scale 1.10. GitOps and Helm 1.11. Continuous Deployment 1.12. Secrets management 2. A Vision of GitOps 2.0 2.1. Visibility into the whole software lifecycle 2.2. Observability Achieving Continuous deployment and full Git automation 2.5. Built-in handling for rollbacks and secrets 2.6. Running GitOps at scale 2.7. Making the vision for GitOps 2.0 a reality 3. GitOps 2 automated process ● Deployments, tests, and rollbacks controlled through Git flow ● Integration with secrets providers ● No hand-rolled deployments: If you want to change the state you need to perform a0 码力 | 29 页 | 1.61 MB | 1 年前3
Cilium v1.5 DocumentationNetworking Opera�ons Is�o Other Orchestrators Concepts Component Overview Assurances Terminology Address Management Mul� Host Networking Security Architecture Datapath Scale Kubernetes Integra�on Ge�ng Help FAQ contribute Pull request review process Building Container Images Documenta�on CI / Jenkins Release Management Developer’s Cer�ficate of Origin BPF and XDP Reference Guide BPF Architecture Toolchain Program transparently securing the network connec�vity between applica�on services deployed using Linux container management pla�orms like Docker and Kubernetes. At the founda�on of Cilium is a new Linux kernel technology0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.6 DocumentationNetworking Operations Istio Other Orchestrators Concepts Component Overview Terminology Address Management Multi Host Networking Security Datapath Failure Behavior Architecture Datapath Scale Kubernetes review process Building Container Images Documentation Developer’s Certificate of Origin Release Management Release Cadence Stable releases LTS Generic Release Process GitHub template process Reference transparently securing the network connectivity between application services deployed using Linux container management platforms like Docker and Kubernetes. At the foundation of Cilium is a new Linux kernel technology0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 DocumentationNetworking Operations Istio Other Orchestrators Concepts Component Overview Terminology Address Management Multi Host Networking Security Datapath Failure Behavior Architecture Datapath Scale Kubernetes Official release images Update cilium-builder and cilium-runtime images Nightly Docker image Release Management Organization Release tracking Release Cadence Backporting process Backport Criteria Backporting transparently securing the network connectivity between application services deployed using Linux container management platforms like Docker and Kubernetes. At the foundation of Cilium is a new Linux kernel technology0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.9 DocumentationDebugging Mutexes / Locks and Data Races Hubble Bumping the vendored Cilium dependency Release Management Organization Release tracking Release Cadence Backporting process Backport Criteria Backporting transparently securing the network connectivity between application services deployed using Linux container management platforms like Docker and Kubernetes. At the foundation of Cilium is a new Linux kernel technology application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external services Label based0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.10 DocumentationDebugging Mutexes / Locks and Data Races Hubble Bumping the vendored Cilium dependency Release Management Organization Release tracking Release Cadence Backporting process Backport Criteria Backporting transparently securing the network connectivity between application services deployed using Linux container management platforms like Docker and Kubernetes. At the foundation of Cilium is a new Linux kernel technology application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external services Label based0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 DocumentationCilium dependency Documentation Style Header Titles Body Code Blocks Links Lists Roles Release Management Organization Release tracking Release Cadence Backporting process Backport Criteria Backporting transparently securing the network connectivity between application services deployed using Linux container management platforms like Docker and Kubernetes. At the foundation of Cilium is a new Linux kernel technology application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external services Label based0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.8 DocumentationImportant common packages Debugging toFQDNs and DNS Debugging Mutexes / Locks and Data Races Release Management Organization Release tracking Release Cadence Backporting process Backport Criteria Backporting transparently securing the network connectivity between application services deployed using Linux container management platforms like Docker and Kubernetes. At the foundation of Cilium is a new Linux kernel technology application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external services Label based0 码力 | 1124 页 | 21.33 MB | 1 年前3
Zabbix 6.2 Manual. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468 13 Storage of secrets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . user group configuration. Storage of secrets It is now possible to store some sensitive information from Zabbix in CyberArk Vault CV2. Similarly to storing secrets in HashiCorp Vault, introduced in Zabbix • user macro values 8 • database access credentials Zabbix provides read-only access to the secrets in vault. See also: CyberArk configuration Secure password hashing In Zabbix 5.0 the password hashing0 码力 | 1689 页 | 22.82 MB | 1 年前3
共 142 条
- 1
- 2
- 3
- 4
- 5
- 6
- 15













