Cilium v1.8 DocumentationProtect and secure APIs transparently Ability to secure modern application protocols such as REST/HTTP, gRPC and Kafka. Traditional firewalls operates at Layer 3 and 4. A protocol running on a particular port DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing mode, Hubble runs a gRPC service over plain-text HTTP on the host network without any authentication/authorization. The main consequence is that anybody who can reach the Hubble gRPC service can obtain0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.6 DocumentationProtect and secure APIs transparently Ability to secure modern application protocols such as REST/HTTP, gRPC and Kafka. Traditional firewalls operates at Layer 3 and 4. A protocol running on a particular port authorization Locking down external access with DNS-based policies Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing this, you can re-run the tutorial from Step 1. How to secure gRPC This document serves as an introduction to using Cilium to enforce gRPC-aware security policies. It is a detailed walk-through of getting0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.5 DocumentationProtect and secure APIs transparently Ability to secure modern applica�on protocols such as REST/HTTP, gRPC and Ka�a. Tradi�onal firewalls operates at Layer 3 and 4. A protocol running on a par�cular port is authoriza�on Locking down external access with DNS-based policies Securing a Ka�a cluster How to secure gRPC Ge�ng Started Securing Elas�csearch How to Secure a Cassandra Database Ge�ng Started Securing Memcached this, you can re-run the tutorial from Step 1. How to secure gRPC This document serves as an introduc�on to using Cilium to enforce gRPC- aware security policies. It is a detailed walk-through of ge�ng0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.7 DocumentationProtect and secure APIs transparently Ability to secure modern application protocols such as REST/HTTP, gRPC and Kafka. Traditional firewalls operates at Layer 3 and 4. A protocol running on a particular port DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing this, you can re-run the tutorial from Step 1. How to secure gRPC This document serves as an introduction to using Cilium to enforce gRPC-aware security policies. It is a detailed walk-through of getting0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.10 DocumentationProtect and secure APIs transparently Ability to secure modern application protocols such as REST/HTTP, gRPC and Kafka. Traditional firewalls operates at Layer 3 and 4. A protocol running on a particular port DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing this, you can re-run the tutorial from Step 1. How to secure gRPC This document serves as an introduction to using Cilium to enforce gRPC-aware security policies. It is a detailed walk-through of getting0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.9 DocumentationProtect and secure APIs transparently Ability to secure modern application protocols such as REST/HTTP, gRPC and Kafka. Traditional firewalls operates at Layer 3 and 4. A protocol running on a particular port DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing this, you can re-run the tutorial from Step 1. How to secure gRPC This document serves as an introduction to using Cilium to enforce gRPC-aware security policies. It is a detailed walk-through of getting0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.11 DocumentationProtect and secure APIs transparently Ability to secure modern application protocols such as REST/HTTP, gRPC and Kafka. Traditional firewalls operates at Layer 3 and 4. A protocol running on a particular port DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing this, you can re-run the tutorial from Step 1. How to secure gRPC This document serves as an introduction to using Cilium to enforce gRPC-aware security policies. It is a detailed walk-through of getting0 码力 | 1373 页 | 19.37 MB | 1 年前3
openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)tool that communicates with the atuned process on the server through the gRPC protocol. The atuned process contains a frontend gRPC service layer (implemented by Golang) and a backend service layer, the parameter search. A-Tune software architecture A-Tune client (atune-adm) A-Tune server (atuned/Golang) gRPC service Configuration Analysis Tuning Database Backend server (HTTP/Python 3) MPI/CPI Data sampling iSulad software architecture Kernel space User space Syscall Cgroup Namespace REST (light-mode)/gRPC (perf-mode) runc kata LXC Kuasar Container Image Events Log Container service Volume service Image0 码力 | 116 页 | 3.16 MB | 1 年前3
openEuler 22.03 LTS SP2 技术白皮书atus、ContainerStats、ListContainerStats 等接口。 • 新增 PodSandboxStats、ListPodSandboxStats 接口。 gRPC Client gRPC Server Runtime Service lmage Service CRI Service iSulad CRI iSulad 36 openEuler 22.030 码力 | 48 页 | 5.62 MB | 1 年前3
openEuler 21.09 技术白皮书finance, telecom, and security fields. Kubelet iSulad Shim v2 client Containerd-kata- shim-v2 grpc ttrpc StratoVirt vsock CRI client CRI server runtime Guest kernel Pod Sandbox kata-agent container0 码力 | 36 页 | 3.40 MB | 1 年前3
共 12 条
- 1
- 2













