Rancher Kubernetes Cryptographic Library FIPS 140-2 Non-Proprietary Security Policy
input parameters of the API functions. The Data Output interface consists of the output parameters of the API functions. The Control Input interface consists of the actual API input parameters. The Status API input parameters Data output Physical ports of the tested platforms API output parameters and return values Control input Physical ports of the tested platforms API input parameters Status calling application and does not store keys persistently. The calling application is responsible for parameters passed in and out of the module. The Operating System and the calling application are responsible0 码力 | 16 页 | 551.69 KB | 1 年前3Deploying and ScalingKubernetes with Rancher
creating a new type of object, you can use the create option on right top corner. You can input all parameters one by one or simply upload a JSON/YAML format file with specifications of the object to be created apiVersion: storage.k8s.io/v1beta1 metadata: name: fast provisioner: kubernetes.io/gce-pd parameters: type: disk-ssd And then you request a claim in the container spec for the available storage KUBERNETES WITH RANCHER We will first look at a couple of use cases from this list, then some parameters that can be fine- tuned to alter behavior of Deployments. First, let’s create a Deployment.0 码力 | 66 页 | 6.10 MB | 1 年前3CIS Benchmark Rancher Self-Assessment Guide - v2.4
/etc/kubernetes/manifests/kube- apiserver.yaml on the master node and set the kubelet client certificate and key parameters as below. --kubelet-client-certificate=--kubelet-client-ke /etc/kubernetes/manifests/kube- apiserver.yaml on the master node and set the etcd certificate and key file parameters. --etcd-certfile= --etcd-keyfile= /etc/kubernetes/manifests/kube-apiserver.yaml on the master node and set the TLS certificate and private key file parameters. --tls-cert-file= --tls-private-key-file= 0 码力 | 54 页 | 447.77 KB | 1 年前3CIS 1.5 Benchmark - Self-Assessment Guide - Rancher v2.5
/etc/kubernetes/manifests/kube- apiserver.yaml on the master node and set the kubelet client certificate and key parameters as below. --kubelet-client-certificate=--kubelet-client-ke /etc/kubernetes/manifests/kube- apiserver.yaml on the master node and set the etcd certificate and key file parameters. --etcd-certfile= --etcd-keyfile= /etc/kubernetes/manifests/kube-apiserver.yaml on the master node and set the TLS certificate and private key file parameters. --tls-cert-file= --tls-private-key-file= 0 码力 | 54 页 | 447.97 KB | 1 年前3CIS 1.6 Benchmark - Self-Assessment Guide - Rancher v2.5.4
/etc/kubernetes/manifests/kube- apiserver.yaml on the master node and set the kubelet client certificate and key parameters as below. --kubelet-client-certificate= -- kubelet-client-key= Audit: /bin/ps -ef | grep kube-apiserver server.yaml and CIS 1.6 Benchmark - Self-Assessment Guide - Rancher v2.5.4 37 set the below parameters. --enable-admission- plugins=...,EventRateLimit,... --admission-control-config-file= Audit: /bin/ps /etc/kubernetes/manifests/kube- apiserver.yaml on the master node and set the etcd certificate and key file parameters. --etcd-certfile= --etcd-keyfile= Audit: /bin/ps -ef | grep kube-apiserver | grep -v grep Expected0 码力 | 132 页 | 1.12 MB | 1 年前3Rancher Hardening Guide v2.3.5
Hardening Guide v2.3.5 1 3 3 4 5 6 14 21 Contents Overview Configure Kernel Runtime Parameters Configure etcd user and group Ensure that all Namespaces have Network Policies defined Reference Rancher v2.3.5. Configure Kernel Runtime Parameters The following sysctl configuration is recommended for all nodes type in the cluster. Set the following parameters in /etc/sysctl.d/90- kubelet.conf:0 码力 | 21 页 | 191.56 KB | 1 年前3Rancher Hardening Guide v2.4
4 Hardening Guide v2.4 1 3 4 4 5 7 14 21 Contents Overview Configure Kernel Runtime Parameters Configure etcd user and group Ensure that all Namespaces have Network Policies defined Reference assignments. Configure Kernel Runtime Parameters The following sysctl configuration is recommended for all nodes type in the cluster. Set the following parameters in /etc/sysctl.d/90- kubelet.conf:0 码力 | 22 页 | 197.27 KB | 1 年前3Rancher Kubernetes Engine 2, VMWare vSAN
interactive process for configuring and deploying SAP Data Intelligence 3.3. The table below lists some parameters available for an SAP Data Intelligence 3.3 installation: Parameter Condition Recommendation Kubernetes VMware vSAN and vSphere For more details about input parameters for an SAP Data Intelligence 3.3 installation, visit the section Required Input Parameters (https://help.sap.com/viewer/a8d90a56d61a49718e-0 码力 | 29 页 | 213.09 KB | 1 年前3Rancher Hardening Guide Rancher v2.1.x
Verify kernel.panic_on_oops = 1 sysctl kernel.panic_on_oops Remediation Set the following parameters in /etc/sysctl.conf on all nodes: vm.overcommit_memory=1 kernel.panic=10 kernel.panic_on_oops=1 proactively can be used to quickly detect malicious actions. Audit Verify that the audit log parameters were passed into the Rancher deployment. kubectl get deployment rancher -n cattle-system -o yaml0 码力 | 24 页 | 336.27 KB | 1 年前3[Buyers Guide_DRAFT_REVIEW_V3] Rancher 2.6, OpenShift, Tanzu, Anthos
clusters that only they or their team can see. This delegation of responsibility, along with the parameters for how and where clusters are deployed, gives developers access to the resources they need while and 24x7. However, many of the OpenShift components cannot be modified or used outside Red Hat's parameters without invalidating support. In addition, Red Hat's support subscription model is priced by0 码力 | 39 页 | 488.95 KB | 1 年前3
共 12 条
- 1
- 2