秘钥管理秘钥Turtles all the way down - Securely managing Kubernetes Secretslots of factors that influence the choice of cryptoperiod From NIST SP 800-57: ○ Strength of cryptographic algorithms used ○ Implementation ○ Operating environment ○ Volume of data ○ Re-keying method all key-management processes and procedures for cryptographic keys used for encryption of cardholder data, including the following: 3.6.4 Cryptographic key changes for keys that have reached the end of Envelope encryption: best practices Managing DEKs: ● Generate DEKs locally ● Use a strong cryptographic algorithm ● For easy access, store the DEK near the data that it encrypts ● Ensure DEKs are0 码力 | 52 页 | 2.84 MB | 1 年前3
绕过conntrack,使用eBPF增强 IPVS优化K8s网络性能Does SNAT nic nic Y N • How IPVS talks with eBPF program? • eBPF map id is passed to IPVS module • Ip_vs_new_conn() inserts eBPF map • Key: (protocol, cip:cport , rsip:rsport) • Value: (protocol unroll • Size limitation of BPF program <= 4096 • Move SNAT allocate port loop into IPVS kernel module • Bounded loop support in Linux 5.3 • Size limitation of BPF program is one million after Linux0 码力 | 24 页 | 1.90 MB | 1 年前3
KubeCon2020/大型Kubernetes集群的资源编排优化Product2 Used Quota 25 Product2 Used Quota 10 Product2 Used Quota 15 Quota allocation module Cluster 1 allocates 50 quota Cluster 2 allocates 20 quota Cluster 3 allocates 30 quota Allocate0 码力 | 27 页 | 3.91 MB | 1 年前3
共 3 条
- 1













