Cilium v1.6 DocumentationReject all other Kafka messages. Require the HTTP header X-Token: [0-9]+ to be present in all REST calls. See the section Layer 7 Policy [http://docs.cilium.io/en/stable/policy/#layer-7] in our documentation strongest security (i.e., enforce least-privilege isolation) between microservices, each service that calls deathstar’s API should be limited to making only the set of HTTP requests it requires for legitimate limiting tiefighter to making only a POST /v1/request-landing API call, but disallowing all other calls (including PUT /v1/exhaust-port). apiVersion: "cilium.io/v2" kind: CiliumNetworkPolicy description:0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 DocumentationReference Guide BPF Architecture Instruction Set Helper Functions Maps Object Pinning Tail Calls BPF to BPF Calls JIT Hardening Offloads Toolchain Development Environment LLVM iproute2 bpftool BPF sysctls Reject all other Kafka messages. Require the HTTP header X-Token: [0-9]+ to be present in all REST calls. See the section Layer 7 Policy [http://docs.cilium.io/en/stable/policy/#layer-7] in our documentation strongest security (i.e., enforce least-privilege isolation) between microservices, each service that calls deathstar’s API should be limited to making only the set of HTTP requests it requires for legitimate0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.10 DocumentationReference Guide BPF Architecture Instruction Set Helper Functions Maps Object Pinning Tail Calls BPF to BPF Calls JIT Hardening Offloads Toolchain Development Environment LLVM iproute2 bpftool BPF sysctls communicating with each other? How frequently? What does the service dependency graph look like? What HTTP calls are being made? What Kafka topics does a service consume from or produce to? Network monitoring & Reject all other Kafka messages. Require the HTTP header X-Token: [0-9]+ to be present in all REST calls. See the section Layer 7 Policy [http://docs.cilium.io/en/stable/policy/#layer-7] in our documentation0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.9 DocumentationReference Guide BPF Architecture Instruction Set Helper Functions Maps Object Pinning Tail Calls BPF to BPF Calls JIT Hardening Offloads Toolchain Development Environment LLVM iproute2 bpftool BPF sysctls communicating with each other? How frequently? What does the service dependency graph look like? What HTTP calls are being made? What Kafka topics does a service consume from or produce to? Network monitoring & Reject all other Kafka messages. Require the HTTP header X-Token: [0-9]+ to be present in all REST calls. See the section Layer 7 Policy [http://docs.cilium.io/en/stable/policy/#layer-7] in our documentation0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.8 DocumentationReference Guide BPF Architecture Instruction Set Helper Functions Maps Object Pinning Tail Calls BPF to BPF Calls JIT Hardening Offloads Toolchain Development Environment LLVM iproute2 bpftool BPF sysctls communicating with each other? How frequently? What does the service dependency graph look like? What HTTP calls are being made? What Kafka topics does a service consume from or produce to? Network monitoring & Reject all other Kafka messages. Require the HTTP header X-Token: [0-9]+ to be present in all REST calls. See the section Layer 7 Policy [http://docs.cilium.io/en/stable/policy/#layer-7] in our documentation0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.11 DocumentationReference Guide BPF Architecture Instruction Set Helper Functions Maps Object Pinning Tail Calls BPF to BPF Calls JIT Hardening Offloads Toolchain Development Environment LLVM iproute2 bpftool BPF sysctls communicating with each other? How frequently? What does the service dependency graph look like? What HTTP calls are being made? What Kafka topics does a service consume from or produce to? Network monitoring & Reject all other Kafka messages. Require the HTTP header X-Token: [0-9]+ to be present in all REST calls. See the section Layer 7 Policy [http://docs.cilium.io/en/stable/policy/#layer-7] in our documentation0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.5 DocumentationReject all other Ka�a messages. Require the HTTP header X-Token: [0-9]+ to be present in all REST calls. See the sec�on Layer 7 Policy [h�p://docs.cilium.io/en/stable/policy/#layer-7] in our documenta�on strongest security (i.e., enforce least-privilege isola�on) between microservices, each service that calls deathstar’s API should be limited to making only the set of HTTP requests it requires for legi�mate limi�ng �efighter to making only a POST /v1/request- landing API call, but disallowing all other calls (including PUT /v1/exhaust- port). apiVersion: "cilium.io/v2" kind: CiliumNetworkPolicy description:0 码力 | 740 页 | 12.52 MB | 1 年前3
共 7 条
- 1













