Cilium v1.8 Documentation
firewalls on all servers to be manipulated whenever a container is started anywhere in the cluster. In order to avoid this situation which limits scale, Cilium assigns a security identity to groups of application external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services, traditional CIDR based security policies for both Configuring kind cluster creation is done using a YAML configuration file. This step is necessary in order to disable the default CNI and replace it with Cilium. Create a kind-config.yaml file based on the0 码力 | 1124 页 | 21.33 MB | 1 年前3Cilium v1.7 Documentation
firewalls on all servers to be manipulated whenever a container is started anywhere in the cluster. In order to avoid this situation which limits scale, Cilium assigns a security identity to groups of application external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services, traditional CIDR based security policies for both Tiller) in the same cluster, there should be no issue as both version are mutually compatible in order to support gradual migration [https://helm.sh/docs/topics/v2_v3_migration/]. Cilium chart is targeting0 码力 | 885 页 | 12.41 MB | 1 年前3Cilium v1.6 Documentation
firewalls on all servers to be manipulated whenever a container is started anywhere in the cluster. In order to avoid this situation which limits scale, Cilium assigns a security identity to groups of application external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services, traditional CIDR based security policies for both running and healthy in the kube- system namespace. A functioning Kubernetes DNS is strictly required in order for Cilium to resolve the ClusterIP of the etcd cluster. If either kube- dns or coredns were already0 码力 | 734 页 | 11.45 MB | 1 年前3Cilium v1.5 Documentation
firewalls on all servers to be manipulated whenever a container is started anywhere in the cluster. In order to avoid this situa�on which limits scale, Cilium assigns a security iden�ty to groups of applica�on external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services, tradi�onal CIDR based security policies for both ingress instruc�on on how to prepare your Kubernetes environment. For CoreDNS: Enable reverse lookups In order for the TLS cer�ficates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must0 码力 | 740 页 | 12.52 MB | 1 年前3Cilium v1.9 Documentation
firewalls on all servers to be manipulated whenever a container is started anywhere in the cluster. In order to avoid this situation which limits scale, Cilium assigns a security identity to groups of application external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services, traditional CIDR based security policies for both Configuring kind cluster creation is done using a YAML configuration file. This step is necessary in order to disable the default CNI and replace it with Cilium. Create a kind-config.yaml file based on the0 码力 | 1263 页 | 18.62 MB | 1 年前3Cilium v1.10 Documentation
firewalls on all servers to be manipulated whenever a container is started anywhere in the cluster. In order to avoid this situation which limits scale, Cilium assigns a security identity to groups of application external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services, traditional CIDR based security policies for both environment to handle this scenario when adding new nodes to AKS clusters. Create a Service Principal: In order to allow cilium-operator to interact with the Azure API, a Service Principal with Contributor privileges0 码力 | 1307 页 | 19.26 MB | 1 年前3Cilium v1.11 Documentation
firewalls on all servers to be manipulated whenever a container is started anywhere in the cluster. In order to avoid this situation which limits scale, Cilium assigns a security identity to groups of application external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services, traditional CIDR based security policies for both environment to handle this scenario when adding new nodes to AKS clusters. Create a Service Principal: In order to allow cilium-operator to interact with the Azure API, a Service Principal with Contributor privileges0 码力 | 1373 页 | 19.37 MB | 1 年前3Ubuntu Server Guide 18.04
"RAID1", but if you are using a different setup choose the appropriate type (RAID0 RAID1 RAID5). In order to use RAID5 you need at least three drives. Using RAID0 or RAID1 only two drives are required. 5 your iSCSI target and navigate tothen hit ENTER 4. If authentication is required in order to access the iSCSI device, provide the username in the next field. Otherwise leave it blank. 5. Enter the IP address and navigate to then hit ENTER 5. If authentication is required in order to access the iSCSI device, provide the username in the next field or leave it blank. 6. If your 0 码力 | 413 页 | 1.40 MB | 1 年前3Ubuntu Desktop Guide
is running, right click on the application icon and select Lock to Launcher. The Launcher icon order can be changed by dragging an icon off of the Launcher, and then back onto it in the desired location plug-in Some websites use small Java programs, which require a Java plugin to be installed in order to run. Install the icedtea6-plugin package to view Java programs in your browser. More Information or the DVD might be from a different region. Installing the right codecs for DVD playback In order to play DVDs, you need to have the right codecs installed. A codec is a piece of software that0 码力 | 1709 页 | 5.81 MB | 1 年前3This Debian Reference (version 2.109)
language. Although tutorial books and documentation are helpful, you have to practice it yourself. In order to help you get started smoothly, I elaborate a few basic points. The powerful design of Debian GNU/Linux information in the order given. • Type of file (first character) • Access permission of the file (nine characters, consisting of three characters each for user, group, and other in this order) • Number of prevents a file in the directory from being removed by a user who is not the owner of the file. In order to secure contents of a file in world-writable directories such as ”/tmp” or in group-writable directories0 码力 | 266 页 | 1.25 MB | 1 年前3
共 57 条
- 1
- 2
- 3
- 4
- 5
- 6