Cilium v1.9 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter paths include with and without service load- balancing and various network policy combinations. The pod name indicates the connectivity variant and the readiness and liveness gate indicates success or failure 65s pod-to-a-79546bc469-rl2qq 1/1 Running 0 66s pod-to-a-allowed-cnp-58b7f7fb8f-lkq7p 1/1 Running 0 66s pod-to-a-de0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.10 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter this: ♻ Restarted unmanaged pod kube-system/event-exporter-gke-564fb97f9- rv8hg ♻ Restarted unmanaged pod kube-system/kube-dns-6465f78586-hlcrz ♻ Restarted unmanaged pod kube-system/kube-dns-autoscaler- Restarted unmanaged pod kube-system/l7-default-backend-7fd66b8b88- qqhh5 ♻ Restarted unmanaged pod kube-system/metrics-server-v0.3.6- 7b5cdbcbb8-kjl65 ♻ Restarted unmanaged pod kube-system/stackdr0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.8 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter paths include with and without service load- balancing and various network policy combinations. The pod name indicates the connectivity variant and the readiness and liveness gate indicates success or failure 67s pod-to-a-allowed-cnp-87b5895c8-bfw4x 1/1 Running 0 68s pod-to-a-b76ddb6b4-2v4kb 1/1 Running 0 68s pod-to-a-denie0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.11 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter this: ♻ Restarted unmanaged pod kube-system/event-exporter-gke-564fb97f9- rv8hg ♻ Restarted unmanaged pod kube-system/kube-dns-6465f78586-hlcrz ♻ Restarted unmanaged pod kube-system/kube-dns-autoscaler- Restarted unmanaged pod kube-system/l7-default-backend-7fd66b8b88- qqhh5 ♻ Restarted unmanaged pod kube-system/metrics-server-v0.3.6- 7b5cdbcbb8-kjl65 ♻ Restarted unmanaged pod kube-system/stackdr0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.7 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter paths include with and without service load- balancing and various network policy combinations. The pod name indicates the connectivity variant and the readiness and liveness gate indicates success or failure 4m50s pod-to-a-59b5fcb7f6-gq4hd 1/1 Running 0 4m50s pod-to-a-allowed-cnp-55f885bf8b-5lxzz 1/1 Running 0 4m50s pod-to-a-ext0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.6 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS, check the CoreDNS ConfigMap and validate that in-addr.arpa listed as wildcards next to cluster.local. You can validate this by looking up a pod IP with the host utility from any pod: host 10.60.20.86 86.20.60.10.in-addr.arpa domain name pointer cilium-etcd- 972nprv9dp0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.5 DocumentationKubernetes Endpoint Lifecycle Troubleshoo�ng Monitoring & Metrics Exported Metrics Cilium as a Kubernetes pod Cilium as a host-agent on a node Troubleshoo�ng Component & Cluster Health Connec�vity Problems Policy transparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container iden�ty (in contrast to IP address iden�fica�on in tradi�onal systems) and can filter on official Kubernetes documenta�on [h�ps://kubernetes.io/docs/setup/independent/create-cluster- kubeadm/#pod-network]. Standard Installation This guides takes you through the steps required to set up Cilium0 码力 | 740 页 | 12.52 MB | 1 年前3
OpenShift Container Platform 4.14 OperatorOPERATOR 条件 4.8. 允许非集群管理员安装 OPERATOR 4.9. 管理自定义目录 4.10. 在受限网络中使用 OPERATOR LIFECYCLE MANAGER 4.11. 目录源 POD 调度 4.12. 管理平台 OPERATOR (技术预览) 4.13. TROUBLESHOOTING OPERATOR 的问题 第 第 5 章 章 开 开发 发 OPERATOR 5.1. 关于 OPERATOR 5.5. 基于 HELM 的 OPERATOR 5.6. 基于 JAVA 的 OPERATOR 5.7. 定义集群服务版本(CSV) 5.8. 使用捆绑包镜像 5.9. 遵守 POD 安全准入 5.10. 云供应商上的 OPERATOR 的令牌身份验证 5.11. 使用 SCORECARD 工具验证 OPERATOR 5.12. 验证 OPERATOR 捆绑包 5.13. 和解包容器镜像的内容一 样,pod 才能开始使用它们,使用 Bundle 对象来引用可能需要拉取和解包的内容。因此,捆绑包是镜像 概念的规范化,可用于表示任何类型的内容。 第 第 2 章 章 了解 了解 OPERATOR 19 捆绑包无法自行执行;它们需要置备程序来解包并在集群中提供其内容。它们可以解包到任何任意存储介 质,如挂载到 provisioner pod 目录中的 tar.gz 文件。每个0 码力 | 423 页 | 4.26 MB | 1 年前3
Serverless Kubernetes - KubeCon按照集群节点数量付费 ECS Pod Pod Pod Pod ECS Pod Pod Pod Pod ECS Pod Pod Pod Pod 经典Kubernetes集群 容器调度与编排 Pod Pod Pod Pod Pod Pod Pod Pod Pod Pod Pod Pod Serverless Kubernetes集群 addon混合集群 容器调度与编排 Pod Pod Pod … Elastic Container Instance (ECI) Pod Pod Node-2 Pod Pod Node-1 Pod Pod Node-N ECI Provider 虚拟节点 • 无限弹性,敏捷扩容 • 支持pod之间互联互通 无需管理服务器 Without • 系统监控和长期维护 极致弹性 Scale your pods elastically • 直接基于pod扩容,而不是node,不再受限于node数量 • 无需预留计算容量 Pod Pod Pod Pod Pod Pod Pod Pod Pod Pod kubectl scale deployment scale in seconds “unlimited”0 码力 | 16 页 | 4.25 MB | 1 年前3
CIS Benchmark Rancher Self-Assessment Guide - v2.4Worker Node Configuration Files 4.2 Kubelet 5 Kubernetes Policies 5.1 RBAC and Service Accounts 5.2 Pod Security Policies 5.3 Network Policies and CNI CIS Benchmark Rancher Self-Assessment Guide - v2.4 Node Security Configuration 1.1 Master Node Configuration Files 1.1.1 Ensure that the API server pod specification file permissions are set to 644 or more restrictive (Scored) Result: Not Applicable All configuration is passed in as arguments at container run time. 1.1.2 Ensure that the API server pod specification file ownership is set to root:root (Scored) Result: Not Applicable Remediation: RKE0 码力 | 54 页 | 447.77 KB | 1 年前3
共 298 条
- 1
- 2
- 3
- 4
- 5
- 6
- 30













