Cilium v1.7 Documentation
code changes BPF and XDP Reference Guide BPF Architecture Instruction Set Helper Functions Maps Object Pinning Tail Calls BPF to BPF Calls JIT Hardening Offloads Toolchain Development Environment LLVM enables CNI chaining on top of any CNI plugin that is using a veth device model. The majority of CNI plugins use such a model. Validate that the current CNI plugin is using veth 1. Log into one of the is not suitable. In that case, a full CNI chaining plugin is required which understands the device model of the underlying plugin. Writing such a plugin is trivial, contact us on Slack for more details.0 码力 | 885 页 | 12.41 MB | 1 年前3Cilium v1.6 Documentation
enables CNI chaining on top of any CNI plugin that is using a veth device model. The majority of CNI plugins use such a model. Validate that the current CNI plugin is using veth 1. Log into one of the is not suitable. In that case, a full CNI chaining plugin is required which understands the device model of the underlying plugin. Writing such a plugin is trivial, contact us on Slack for more details. [https://cilium.herokuapp.com] with any questions! Locking down external access with DNS-based policies This document serves as an introduction for using Cilium to enforce DNS-based security policies for Kubernetes0 码力 | 734 页 | 11.45 MB | 1 年前3Ubuntu Desktop Training 2009
amongst users. Software was then considered an enabler for the hardware, around which the business model of these corporations was built. Software was provided with source code that could be improved and and servers. It contains all the applications you need - including a Web browser, presentation, document and spread- sheet software, instant messaging and much more. Nice to Know: Ubuntu is an African the proprietary software model in that it: • Encourages customisation and variation as opposed to a one size fits many approach. • Relies on a 'services attached' business model rather than per license0 码力 | 428 页 | 57.45 MB | 1 年前3Cilium v1.10 Documentation
code changes BPF and XDP Reference Guide BPF Architecture Instruction Set Helper Functions Maps Object Pinning Tail Calls BPF to BPF Calls JIT Hardening Offloads Toolchain Development Environment LLVM It is also possible to update Helm values once the cluster is running by changing the CiliumConfig object, e.g. with kubectl edit ciliumconfig -n cilium cilium. You may need to restart the Cilium agent for Cilium connectivity test pods to run on OpenShift, a simple custom SecurityContextConstraints object is required. It will to allow hostPort/hostNetwork that some of the connectivity test pods rely on0 码力 | 1307 页 | 19.26 MB | 1 年前3Cilium v1.9 Documentation
code changes BPF and XDP Reference Guide BPF Architecture Instruction Set Helper Functions Maps Object Pinning Tail Calls BPF to BPF Calls JIT Hardening Offloads Toolchain Development Environment LLVM for Cilium connectivity test pods to run on OpenShift, a simple custom SecurityContextConstraints object is required. It will to allow hostPort/hostNetwork that some of the connectivity test pods rely on enables CNI chaining on top of any CNI plugin that is using a veth device model. The majority of CNI plugins use such a model. Note Some advanced Cilium features may be limited when chaining with other0 码力 | 1263 页 | 18.62 MB | 1 年前3Cilium v1.11 Documentation
code changes BPF and XDP Reference Guide BPF Architecture Instruction Set Helper Functions Maps Object Pinning Tail Calls BPF to BPF Calls JIT Hardening Offloads Toolchain Development Environment LLVM It is also possible to update Helm values once the cluster is running by changing the CiliumConfig object, e.g. with kubectl edit ciliumconfig -n cilium cilium. You may need to restart the Cilium agent for Cilium connectivity test pods to run on OpenShift, a simple custom SecurityContextConstraints object is required. It will to allow hostPort/hostNetwork that some of the connectivity test pods rely on0 码力 | 1373 页 | 19.37 MB | 1 年前3Cilium v1.5 Documentation
[h�ps://cilium.herokuapp.com] with any ques�ons! Locking down external access with DNS-based policies This document serves as an introduc�on for using Cilium to enforce DNS- based security policies for Kubernetes githubusercontent.com/cilium/cilium/v1.5/ex $ kubectl delete cnp fqdn Securing a Kafka cluster This document serves as an introduc�on to using Cilium to enforce Ka�a- aware security policies. It is a detailed $ minikube delete A�er this, you can re-run the tutorial from Step 1. How to secure gRPC This document serves as an introduc�on to using Cilium to enforce gRPC- aware security policies. It is a detailed0 码力 | 740 页 | 12.52 MB | 1 年前3Cilium v1.8 Documentation
code changes BPF and XDP Reference Guide BPF Architecture Instruction Set Helper Functions Maps Object Pinning Tail Calls BPF to BPF Calls JIT Hardening Offloads Toolchain Development Environment LLVM for Cilium connectivity test pods to run on OpenShift, a simple custom SecurityContextConstraints object is required. It will to allow hostPort/hostNetwork that some of the connectivity test pods rely on enables CNI chaining on top of any CNI plugin that is using a veth device model. The majority of CNI plugins use such a model. Note Some advanced Cilium features may be limited when chaining with other0 码力 | 1124 页 | 21.33 MB | 1 年前3ubuntu server guide
improvements to pages, please use the link at the bottom of each topic titled: “Help improve this document in the forum.” This link will take you to the Server Discourse forum for the specific page you are Select restart when this is complete, and log in using the username and password provided This document explains how to use the installer in general terms. For a step-by-step guide through the screens and TFTP There are several implementations of the DHCP/BOOTP and TFTP protocols available. This document will briefly describe how to configure dnsmasq to perform both of these roles. 1. Install dnsmasq0 码力 | 486 页 | 3.33 MB | 1 年前3Ubuntu Server Guide 18.04
Ubuntu Server Guide Ubuntu Server Guide Copyright © 2018 Contributors to the document Abstract Welcome to the Ubuntu Server Guide! It contains information on how to install and configure various server Credits and License This document is maintained by the Ubuntu documentation team (https://wiki.ubuntu.com/DocumentationTeam). A list of contributors is below. This document is made available under the copy of the license is available here: Creative Commons ShareAlike License1. Contributors to this document are: • Members of the Ubuntu Documentation Project2 • Members of the Ubuntu Server Team3 • Contributors0 码力 | 413 页 | 1.40 MB | 1 年前3
共 67 条
- 1
- 2
- 3
- 4
- 5
- 6
- 7