Cilium v1.5 Documentation
443/TCP service/memcached-server ClusterIP None 11211/TC NAME READY STATUS RESTARTS AGE pod/a-wing-67db8d5fcc-dpwl4 protec�on mechanisms. Traffic Control Ingress/Egress: BPF programs a�ached to the traffic control (tc) ingress hook are a�ached to a networking interface, same as XDP, but will run a�er the networking applying L3/L4 endpoint policy and redirec�ng traffic to endpoints. For networking facing devices the tc ingress hook can be coupled with above XDP hook. When this is done it is reasonable to assume that 0 码力 | 740 页 | 12.52 MB | 1 年前3Cilium v1.6 Documentation
protection mechanisms. Traffic Control Ingress/Egress: BPF programs attached to the traffic control (tc) ingress hook are attached to a networking interface, same as XDP, but will run after the networking applying L3/L4 endpoint policy and redirecting traffic to endpoints. For networking facing devices the tc ingress hook can be coupled with above XDP hook. When this is done it is reasonable to assume that a veth pair which acts as a virtual wire connecting the container to the host. By attaching to the TC ingress hook of the host side of this veth pair Cilium can monitor and enforce policy on all traffic0 码力 | 734 页 | 11.45 MB | 1 年前3Cilium v1.7 Documentation
BPF sysctls Kernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter protection mechanisms. Traffic Control Ingress/Egress: BPF programs attached to the traffic control (tc) ingress hook are attached to a networking interface, same as XDP, but will run after the networking applying L3/L4 endpoint policy and redirecting traffic to endpoints. For networking facing devices the tc ingress hook can be coupled with above XDP hook. When this is done it is reasonable to assume that0 码力 | 885 页 | 12.41 MB | 1 年前3Cilium v1.8 Documentation
BPF sysctls Kernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter protection mechanisms. Traffic Control Ingress/Egress: BPF programs attached to the traffic control (tc) ingress hook are attached to a networking interface, same as XDP, but will run after the networking applying L3/L4 endpoint policy and redirecting traffic to endpoints. For networking facing devices the tc ingress hook can be coupled with above XDP hook. When this is done it is reasonable to assume that0 码力 | 1124 页 | 21.33 MB | 1 年前3Cilium v1.10 Documentation
BPF sysctls Kernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter level=warning msg="+ bpftool cgroup attach /var/run/cilium/cgroupv2 connect6 pinned /sys/fs/bpf/tc/globals/cilium_cgroups_connect6" subsys=datapath-loader level=warning msg="Error: failed to attach network facing interfaces, or matching the configuration of --encrypt- interface (if specified). $ tc filter show dev eth0 ingress filter protocol all pref 1 bpf chain 0 filter protocol all pref 1 bpf0 码力 | 1307 页 | 19.26 MB | 1 年前3Cilium v1.9 Documentation
BPF sysctls Kernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter level=warning msg="+ bpftool cgroup attach /var/run/cilium/cgroupv2 connect6 pinned /sys/fs/bpf/tc/globals/cilium_cgroups_connect6" subsys=datapath-loader level=warning msg="Error: failed to attach protection mechanisms. Traffic Control Ingress/Egress: BPF programs attached to the traffic control (tc) ingress hook are attached to a networking interface, same as XDP, but will run after the networking0 码力 | 1263 页 | 18.62 MB | 1 年前3Cilium v1.11 Documentation
BPF sysctls Kernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter level=warning msg="+ bpftool cgroup attach /var/run/cilium/cgroupv2 connect6 pinned /sys/fs/bpf/tc/globals/cilium_cgroups_connect6" subsys=datapath-loader level=warning msg="Error: failed to attach Namespace Cilium has built-in support for bypassing the socket-level loadbalancer and falling back to the tc loadbalancer at the veth interface when a custom redirection/operation relies on the original ClusterIP0 码力 | 1373 页 | 19.37 MB | 1 年前3Agda User Manual v2.6.3
particular implicit argument using the @(tactic t) attribute, where t : Term → TC ⊤. For instance: clever-search : Term → TC ⊤ clever-search hole = unify hole (lit (nat 17)) the-best-number : {@(tactic arguments to the function: default : {A : Set} → A → Term → TC ⊤ default x hole = bindTC (quoteTC x) (unify hole) search : (depth : Nat) → Term → TC ⊤ example : {@(tactic default 10) depth : Nat} monad TC: postulate TC : ∀ {a} → Set a → Set a returnTC : ∀ {a} {A : Set a} → A → TC A bindTC : ∀ {a b} {A : Set a} {B : Set b} → TC A → (A → TC B) → TC B {-# BUILTIN AGDATCM TC0 码力 | 379 页 | 354.83 KB | 1 年前3Agda User Manual v2.6.2
particular implicit argument using the @(tactic t) attribute, where t : Term → TC ⊤. For instance: clever-search : Term → TC ⊤ clever-search hole = unify hole (lit (nat 17)) the-best-number : {@(tactic arguments to the function: default : {A : Set} → A → Term → TC ⊤ default x hole = bindTC (quoteTC x) (unify hole) search : (depth : Nat) → Term → TC ⊤ example : {@(tactic default 10) depth : Nat} monad TC: postulate TC : ∀ {a} → Set a → Set a returnTC : ∀ {a} {A : Set a} → A → TC A bindTC : ∀ {a b} {A : Set a} {B : Set b} → TC A → (A → TC B) → TC B {-# BUILTIN AGDATCM TC0 码力 | 348 页 | 414.11 KB | 1 年前3Agda User Manual v2.6.2.2
particular implicit argument using the @(tactic t) attribute, where t : Term → TC ⊤. For instance: clever-search : Term → TC ⊤ clever-search hole = unify hole (lit (nat 17)) the-best-number : {@(tactic arguments to the function: default : {A : Set} → A → Term → TC ⊤ default x hole = bindTC (quoteTC x) (unify hole) search : (depth : Nat) → Term → TC ⊤ example : {@(tactic default 10) depth : Nat} monad TC: postulate TC : ∀ {a} → Set a → Set a returnTC : ∀ {a} {A : Set a} → A → TC A bindTC : ∀ {a b} {A : Set a} {B : Set b} → TC A → (A → TC B) → TC B {-# BUILTIN AGDATCM TC0 码力 | 354 页 | 433.60 KB | 1 年前3
共 39 条
- 1
- 2
- 3
- 4