ubuntu server guide
key based authentication: each side of the connection has its own private and public key, and the peers’ public key, and this is enough to start encrypting and verifying the exchanged traffic. For more • listen port: the UDP port that WireGuard will be listening to for incoming traffic. • List of peers, each one with: – public key: the public counterpart of the private key. Generated from the private endpoint: where to send the encrypted traffic to. This is optional, but at least one of the corresponding peers must have it to bootstrap the connection. – allowed IPs: list of inner tunnel destination networks0 码力 | 486 页 | 3.33 MB | 1 年前3Raft在Curve存储中的工程实践
Closure* done); void remove_peer(const PeerId& peer, Closure* done); void change_peers(const Configuration& new_peers, Closure* done); StateMachine void on_apply(::raft::Iterator& iter); void on_s0 码力 | 29 页 | 2.20 MB | 5 月前3Cilium v1.10 Documentation
IPv4 routes. protocol static { ipv4; route {{ POD_CIDR }} via "cilium_host"; } # BGP peers protocol bgp uplink0 { description "BGP uplink 0"; local {{ NODE_IP }} as {{ NODE_ASN }}; enabled (number of peers should correspond to a number of nodes subtracted by one): cilium status | grep Encryption Encryption: Wireguard [cilium_wg0 (Pubkey: <..>, Port: 51871, Peers: 2)] 2. Install { "listen-port": 51871, "name": "cilium_wg0", "peer-count": 1, "peers": [ { "allowed-ips": [ "10.154.1.107/32", "10.154.10 码力 | 1307 页 | 19.26 MB | 1 年前3Cilium v1.11 Documentation
IPv4 routes. protocol static { ipv4; route {{ POD_CIDR }} via "cilium_host"; } # BGP peers protocol bgp uplink0 { description "BGP uplink 0"; local {{ NODE_IP }} as {{ NODE_ASN }}; enabled (number of peers should correspond to a number of nodes subtracted by one): cilium status | grep Encryption Encryption: Wireguard [cilium_wg0 (Pubkey: <..>, Port: 51871, Peers: 2)] 2. Install { "listen-port": 51871, "name": "cilium_wg0", "peer-count": 1, "peers": [ { "allowed-ips": [ "10.154.1.107/32", "10.154.10 码力 | 1373 页 | 19.37 MB | 1 年前3Cilium v1.5 Documentation
environment. For CoreDNS: Enable reverse lookups In order for the TLS cer�ficates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS ini�alized as well. For CoreDNS: Enable reverse lookups In order for the TLS cer�ficates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS des�na�on endpoint is not controlled by Cilium. En��es Based: En��es are used to describe remote peers which can be categorized without knowing their IP addresses. This includes connec�vity to the local0 码力 | 740 页 | 12.52 MB | 1 年前3This Debian Reference (version 2.109)
ports (”/dev/ttyS[0-3]”) dip limited access to serial ports for Dialup IP connection to trusted peers cdrom CD-ROM, DVD+/-RW drives audio audio device video video device scanner scanner(s) adm system defined configuration files for trusted peers in ”/etc/ppp/peers/”, you only need to belong to the dip group to create Dialup IP connection to those trusted peers using pppd(8), pon(1), and poff(1) commands0 码力 | 266 页 | 1.25 MB | 1 年前3Cilium v1.9 Documentation
CrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS IPv4 routes. protocol static { ipv4; route {{ POD_CIDR }} via "cilium_host"; } # BGP peers protocol bgp uplink0 { description "BGP uplink 0"; local {{ NODE_IP }} as {{ NODE_ASN }}; destination endpoint is not controlled by Cilium. Entities Based: Entities are used to describe remote peers which can be categorized without knowing their IP addresses. This includes connectivity to the local0 码力 | 1263 页 | 18.62 MB | 1 年前3Getting Started and Beyond: Istio Multicluster with GitOps
Posta (Tuesday) ● Taming Istio Configuration with Helm by Ryan Michela (Wednesday) ● Know your peers by Alex Van Boxel (Wednesday) Target Audience What to expect Istio Multicluster First Demo About0 码力 | 38 页 | 3.05 MB | 1 年前3Cilium v1.8 Documentation
CrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS IPv4 routes. protocol static { ipv4; route {{ POD_CIDR }} via "cilium_host"; } # BGP peers protocol bgp uplink0 { description "BGP uplink 0"; local {{ NODE_IP }} as {{ NODE_ASN }}; destination endpoint is not controlled by Cilium. Entities Based: Entities are used to describe remote peers which can be categorized without knowing their IP addresses. This includes connectivity to the local0 码力 | 1124 页 | 21.33 MB | 1 年前3A Seat at the Table - IT Leadership in the Age of Agility
technology in areas he or she does not directly control. To do so, the CIO must build relationships with peers; understand the outcomes they desire; demonstrate how his or her ideas can help them achieve their0 码力 | 7 页 | 387.48 KB | 5 月前3
共 40 条
- 1
- 2
- 3
- 4