Cilium v1.6 Documentationto secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular [https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/], Ingress [https://kubernetes.io/docs/concepts/services-networking/ingress/], Service [https://kubernetes.io/docs/concepts/services-networking/service/] on all worker nodes Recommended: Enable PodCIDR allocation (--allocate-node-cidrs) in the kube-controller-manager (recommended) Refer to the section Requirements for detailed instruction on how to prepare0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.8 Documentationto secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular [https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/], Ingress [https://kubernetes.io/docs/concepts/services-networking/ingress/], Service [https://kubernetes.io/docs/concepts/services-networking/service/] on all worker nodes Recommended: Enable PodCIDR allocation (--allocate-node-cidrs) in the kube-controller-manager (recommended) Refer to the section Requirements for detailed instruction on how to prepare0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.9 Documentationto secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular [https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/], Ingress [https://kubernetes.io/docs/concepts/services-networking/ingress/], Service [https://kubernetes.io/docs/concepts/services-networking/service/] on all worker nodes Recommended: Enable PodCIDR allocation (--allocate-node-cidrs) in the kube-controller-manager (recommended) Refer to the section Requirements for detailed instruction on how to prepare0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.10 Documentationto secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular on all worker nodes Recommended: Enable PodCIDR allocation (--allocate-node-cidrs) in the kube-controller-manager (recommended) Refer to the section Requirements for detailed instruction on how to prepare Values=${infraID}-master-sg" | jq -r '.SecurityGroups[0].GroupId')" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp,FromPort=8472,ToPort=8472,UserIdGroupPairs=0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 Documentationto secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular on all worker nodes Recommended: Enable PodCIDR allocation (--allocate-node-cidrs) in the kube-controller-manager (recommended) Refer to the section Requirements for detailed instruction on how to prepare 3m19s $ kubectl -n kube-system exec cilium-1c2cz -- cilium endpoint list ENDPOINT POLICY (ingress) POLICY (egress) IDENTITY LABELS (source:key[=value]) IPv6 IPv40 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.7 Documentationto secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular [https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/], Ingress [https://kubernetes.io/docs/concepts/services-networking/ingress/], Service [https://kubernetes.io/docs/concepts/services-networking/service/] on all worker nodes Recommended: Enable PodCIDR allocation (--allocate-node-cidrs) in the kube-controller-manager (recommended) Refer to the section Requirements for detailed instruction on how to prepare0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.5 Documentationto secure access to and from external services, tradi�onal CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from applica�on containers to par�cular [h�ps://kubernetes.io/docs/concepts/overview/working-with- objects/labels/], Ingress [h�ps://kubernetes.io/docs/concepts/services- networking/ingress/], Service [h�ps://kubernetes.io/docs/concepts/services- networking/service/] filesystem mounted on all worker nodes Enable PodCIDR alloca�on ( --allocate-node-cidrs ) in the kube-controller-manager (recommended) Refer to the sec�on Requirements for detailed instruc�on on how to prepare0 码力 | 740 页 | 12.52 MB | 1 年前3
1.5 Years of Cilium Usage at DigitalOceancilium-operator Node #1 cilium-agent cilium-operator Control Plane kube-api-server cilium-agent kube-controller- manager scheduler ….. etcd VPC digitalocean.com How’s Cilium been working for us? ● Good connectivity between apps (allow for same customer, deny otherwise) ○ restrict connectivity for ingress (Envoy) and egress (public Internet with exceptions, e.g., SMTP) ○ allow connectivity to needed0 码力 | 7 页 | 234.36 KB | 1 年前3
Cilium的网络加速秘诀pod 1 process kernel network stack raw PREROUTING mangle PREROUTING nat PREROUTING tc ingress conntrack filter FORWARD mangle POSTROUING nat POSTROUING tc egress veth woker node1 pod1 process kernel network stack tc ingress kernel network stack netfilter tc egress veth veth eth0 tc ingress tc egress redirect_peer redirect_neigh kernel network netfilter pod2 process kernel network stack tc ingress kernel network stack netfilter tc egress veth veth eth0 tc ingress tc egress redirect_peer redirect_neigh kernel network0 码力 | 14 页 | 11.97 MB | 1 年前3
ubuntu server guidecontrols 3 samba-apparmor-profile Create AppArmor profile 3 Legacy pages 4 samba-domain-controller NT4 domain controller 4 samba-openldap-backend OpenLDAP backend 2 Mail services 3 mail-postfix Install Postfix server Set up a print server Set up share access control Set up an AppArmor profile NT4 domain controller (legacy) OpenLDAP backend (legacy) Mail services These guides will help you get started with credentials to join a machine to that domain. • The domain controller is acting as an authoritative DNS server for the domain. • The domain controller is the primary DNS resolver (check with systemd-resolve0 码力 | 486 页 | 3.33 MB | 1 年前3
共 38 条
- 1
- 2
- 3
- 4













