Cilium v1.8 DocumentationProtect and secure APIs transparently Ability to secure modern application protocols such as REST/HTTP, gRPC and Kafka. Traditional firewalls operates at Layer 3 and 4. A protocol running on a particular port DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing mode, Hubble runs a gRPC service over plain-text HTTP on the host network without any authentication/authorization. The main consequence is that anybody who can reach the Hubble gRPC service can obtain0 码力 | 1124 页 | 21.33 MB | 1 年前3
 Cilium v1.6 DocumentationProtect and secure APIs transparently Ability to secure modern application protocols such as REST/HTTP, gRPC and Kafka. Traditional firewalls operates at Layer 3 and 4. A protocol running on a particular port authorization Locking down external access with DNS-based policies Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing this, you can re-run the tutorial from Step 1. How to secure gRPC This document serves as an introduction to using Cilium to enforce gRPC-aware security policies. It is a detailed walk-through of getting0 码力 | 734 页 | 11.45 MB | 1 年前3
 Cilium v1.5 DocumentationProtect and secure APIs transparently Ability to secure modern applica�on protocols such as REST/HTTP, gRPC and Ka�a. Tradi�onal firewalls operates at Layer 3 and 4. A protocol running on a par�cular port is authoriza�on Locking down external access with DNS-based policies Securing a Ka�a cluster How to secure gRPC Ge�ng Started Securing Elas�csearch How to Secure a Cassandra Database Ge�ng Started Securing Memcached this, you can re-run the tutorial from Step 1. How to secure gRPC This document serves as an introduc�on to using Cilium to enforce gRPC- aware security policies. It is a detailed walk-through of ge�ng0 码力 | 740 页 | 12.52 MB | 1 年前3
 Cilium v1.7 DocumentationProtect and secure APIs transparently Ability to secure modern application protocols such as REST/HTTP, gRPC and Kafka. Traditional firewalls operates at Layer 3 and 4. A protocol running on a particular port DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing this, you can re-run the tutorial from Step 1. How to secure gRPC This document serves as an introduction to using Cilium to enforce gRPC-aware security policies. It is a detailed walk-through of getting0 码力 | 885 页 | 12.41 MB | 1 年前3
 Cilium v1.10 DocumentationProtect and secure APIs transparently Ability to secure modern application protocols such as REST/HTTP, gRPC and Kafka. Traditional firewalls operates at Layer 3 and 4. A protocol running on a particular port DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing this, you can re-run the tutorial from Step 1. How to secure gRPC This document serves as an introduction to using Cilium to enforce gRPC-aware security policies. It is a detailed walk-through of getting0 码力 | 1307 页 | 19.26 MB | 1 年前3
 Cilium v1.9 DocumentationProtect and secure APIs transparently Ability to secure modern application protocols such as REST/HTTP, gRPC and Kafka. Traditional firewalls operates at Layer 3 and 4. A protocol running on a particular port DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing this, you can re-run the tutorial from Step 1. How to secure gRPC This document serves as an introduction to using Cilium to enforce gRPC-aware security policies. It is a detailed walk-through of getting0 码力 | 1263 页 | 18.62 MB | 1 年前3
 Cilium v1.11 DocumentationProtect and secure APIs transparently Ability to secure modern application protocols such as REST/HTTP, gRPC and Kafka. Traditional firewalls operates at Layer 3 and 4. A protocol running on a particular port DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing this, you can re-run the tutorial from Step 1. How to secure gRPC This document serves as an introduction to using Cilium to enforce gRPC-aware security policies. It is a detailed walk-through of getting0 码力 | 1373 页 | 19.37 MB | 1 年前3
 openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)tool that communicates with the atuned process on the server through the gRPC protocol. The atuned process contains a frontend gRPC service layer (implemented by Golang) and a backend service layer, the parameter search. A-Tune software architecture A-Tune client (atune-adm) A-Tune server (atuned/Golang) gRPC service Configuration Analysis Tuning Database Backend server (HTTP/Python 3) MPI/CPI Data sampling iSulad software architecture Kernel space User space Syscall Cgroup Namespace REST (light-mode)/gRPC (perf-mode) runc kata LXC Kuasar Container Image Events Log Container service Volume service Image0 码力 | 116 页 | 3.16 MB | 1 年前3
 3 Key Elements for Your GitOps strategy
security. Push vs. Pull-Based Architecture Kubernetes Cluster Git Repository Bi-Directional gRPC Developer gRPC REST API | 09 3 KEY ELEMENTS FOR YOUR GITOPS STRATEGY Copyright 2024 Akamai Technologies0 码力 | 14 页 | 761.79 KB | 1 年前3
 openEuler 22.03 LTS SP2 技术白皮书atus、ContainerStats、ListContainerStats 等接口。 • 新增 PodSandboxStats、ListPodSandboxStats 接口。 gRPC Client gRPC Server Runtime Service lmage Service CRI Service iSulad CRI iSulad 36 openEuler 22.030 码力 | 48 页 | 5.62 MB | 1 年前3
共 16 条
- 1
 - 2
 













