Cilium v1.10 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services under multi-queue NICs compared to traditional approaches such as HTB (Hierarchy Token Bucket) or TBF (Token Bucket Filter) as used in the bandwidth CNI plugin, for example. Monitoring and Troubleshooting Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.7 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver the creation of a dedicated S3 bucket in order to store the state and representation of the cluster. You will need to change the bucket name and provide your unique bucket name (for example a reverse of0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.11 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services under multi-queue NICs compared to traditional approaches such as HTB (Hierarchy Token Bucket) or TBF (Token Bucket Filter) as used in the bandwidth CNI plugin, for example. Monitoring and Troubleshooting Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.9 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services under multi-queue NICs compared to traditional approaches such as HTB (Hierarchy Token Bucket) or TBF (Token Bucket Filter) as used in the bandwidth CNI plugin, for example. Monitoring and Troubleshooting Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.5 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and des�na�on IP of the packet, the tool provides the full label informa�on of both the sender and receiver the crea�on of a dedicated S3 bucket in order to store the state and representa�on of the cluster. You will need to change the bucket name and provide your unique bucket name (for example a reverse of0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.8 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver the creation of a dedicated S3 bucket in order to store the state and representation of the cluster. You will need to change the bucket name and provide your unique bucket name (for example a reverse of0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.6 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver the creation of a dedicated S3 bucket in order to store the state and representation of the cluster. You will need to change the bucket name and provide your unique bucket name (for example a reverse of0 码力 | 734 页 | 11.45 MB | 1 年前3
Steering connections to sockets with BPF socket lookup hookhttps://blog.cloudflare.com/its-crowded-in-here/ ● Proof-of-concept tool for configuring BPF socket dispatch https://github.com/majek/inet-tool/ ● “Programmable socket lookup with BPF” presentation at Linux0 码力 | 23 页 | 441.22 KB | 1 年前3
The Tale of Smokey and the Crypto Bandits+ ContainerOS was not very performant Attempt #1 - The Postmortem Iteration is key ● Built a tool to automatically reload falco on rule changes ● Rules: monitor well known IPs, binary names,0 码力 | 14 页 | 926.57 KB | 1 年前3
Containers and BPF: twagent storymulti-kernel VM tests (qemu) ● Resource usage (CPU cycles, memlock) monitored across the fleet by bpf_tax tool → ● Alerts on program load and attach failures [0] https://github.com/libbpf/libbpf0 码力 | 9 页 | 427.42 KB | 1 年前3
共 10 条
- 1













