Cilium v1.9 Documentationdeploy Hubble Relay and the UI as follows on your existing installation: Installation via Helm If you installed Cilium via helm install, you may enable Hubble Relay and UI with the following command: --reuse-values \ --set hubble.listenAddress=":4244" \ --set hubble.relay.enabled=true \ --set hubble.ui.enabled=true On Cilium 1.9.1 and older, the Cilium agent pods will be restarted in the process. Installation installed Cilium 1.9.2 or newer via the provided quick-install.yaml, you may deploy Hubble Relay and UI on top of your existing installation with the following command: kubectl apply -f https://raw.githubusercontent0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.11 DocumentationObservability Setting up Hubble Observability Inspecting Network Flows with the CLI Service Map & Hubble UI Network Policy Security Tutorials Identity-Aware and HTTP-Aware Policy Enforcement Locking down external pods for more details), however this is not an option on AKS clusters: It is not possible to assign custom node taints such as node.cilium.io/agent-not-ready=true:NoExecute to system node pools, cf. Azure/AKS#2578 pool created for new AKS clusters, cf. Azure/AKS#1402 [https://github.com/Azure/AKS/issues/1402]. Custom node taints on user node pools cannot be properly managed at will anymore, cf. Azure/AKS#2934 [https://github0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.10 DocumentationObservability Setting up Hubble Observability Inspecting Network Flows with the CLI Service Map & Hubble UI Network Policy Security Tutorials Identity-Aware and HTTP-Aware Policy Enforcement Locking down external pods for more details), however this is not an option on AKS clusters: It is not possible to assign custom node taints such as node.cilium.io/agent-not-ready=true:NoExecute to system node pools, cf. Azure/AKS#2578 pool created for new AKS clusters, cf. Azure/AKS#1402 [https://github.com/Azure/AKS/issues/1402]. Custom node taints on user node pools cannot be properly managed at will anymore, cf. Azure/AKS#2934 [https://github0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.8 Documentationconnectivity provided by Cilium and NetworkPolicy applies to them: kubectl get pods --all-namespaces -o custom- columns=NAMESPACE:.metadata.namespace,NAME:.metadata.name,HOSTNETWORK:. spec.hostNetwork --no-headers=true allows Hubble Relay to communicate with all the Hubble instances in the cluster. Hubble CLI and Hubble UI in turn connect to Hubble Relay to provide cluster-wide networking visibility. Warning In Distributed enabled="{dns,drop,tcp,flow,port-distri --set global.hubble.relay.enabled=true \ --set global.hubble.ui.enabled=true Restart the Cilium daemonset to allow Cilium agent to pick up the ConfigMap changes:0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.7 Documentation$CILIUM_NAMESPACE \ --set metrics.enabled="{dns,drop,tcp,flow,port- distribution,icmp,http}" \ --set ui.enabled=true \ > hubble.yaml Deploy Hubble: kubectl apply -f hubble.yaml Next Steps Enable DNS connectivity provided by Cilium and NetworkPolicy applies to them: kubectl get pods --all-namespaces -o custom- columns=NAMESPACE:.metadata.namespace,NAME:.metadata.name,HOSTNETWORK:. spec.hostNetwork --no-headers=true $CILIUM_NAMESPACE \ --set metrics.enabled="{dns,drop,tcp,flow,port- distribution,icmp,http}" \ --set ui.enabled=true \ > hubble.yaml Deploy Hubble: kubectl apply -f hubble.yaml Next Steps Enable DNS0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.6 Documentationquick installation procedure. The default settings will store all required state using Kubernetes custom resource definitions (CRDs). This is the simplest installation method as it only depends on Kubernetes state propagation caused by Kubernetes events. If you do not want Cilium to store state in Kubernetes custom resources (CRDs). Requirements Make sure your Kubernetes environment is meeting the requirements: performed for kube- dns $ kubectl delete pods -n kube-system $(kubectl get pods -n kube-system -o custom-columns=NAME:.metadata.name,HOSTNETWORK:.spec.hostNetwork -- no-headers=true | grep '' | awk 0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.5 Documentationfrom a network failure, because Cilium operates at the API- layer, it can explicitly reply with an custom HTTP 403 Unauthorized error, indica�ng that the request was inten�onally denied for security reasons to events in the container run�me to learn when containers are started or stopped, and it creates custom BPF programs which the Linux kernel uses to control all network access in / out of those containers io/docs/concepts/extend- kubernetes/compute-storage-net/network-plugins/#support-hostport]. CRD Validation Custom Resource Valida�on was introduced in Kubernetes since version 1.8.0 . This is s�ll considered an0 码力 | 740 页 | 12.52 MB | 1 年前3
Building a Secure and Maintainable PaaScommand to help with troubleshooting ❏ Features to expose network traffic flows to teams ❏ Hubble UI ❏ Network flow logs exported to logging stack ❏ Tracking network traffic to specific binaries 160 码力 | 20 页 | 2.26 MB | 1 年前3
共 8 条
- 1













