Cilium v1.9 Documentation
to secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular [https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/], Ingress [https://kubernetes.io/docs/concepts/services-networking/ingress/], Service [https://kubernetes.io/docs/concepts/services-networking/service/] TPROXY requirements of Cilium >= 1.6.0. minikube version minikube version: v1.3.1 commit: ca60a424ce69a4d79f502650199ca2b52f29e631 3. Create a minikube cluster: minikube start --network-plugin=cni --memory=40960 码力 | 1263 页 | 18.62 MB | 1 年前3Cilium v1.10 Documentation
to secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular kubectl create secret generic -n kube-system cilium-etcd-secrets \ --from-file=etcd-client-ca.crt=ca.crt \ --from-file=etcd-client.key=client.key \ --from-file=etcd-client.crt=client.crt Adjust Values=${infraID}-master-sg" | jq -r '.SecurityGroups[0].GroupId')" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp,FromPort=8472,ToPort=8472,UserIdGroupPairs=0 码力 | 1307 页 | 19.26 MB | 1 年前3Cilium v1.7 Documentation
to secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular [https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/], Ingress [https://kubernetes.io/docs/concepts/services-networking/ingress/], Service [https://kubernetes.io/docs/concepts/services-networking/service/] TPROXY requirements of Cilium >= 1.6.0. minikube version minikube version: v1.3.1 commit: ca60a424ce69a4d79f502650199ca2b52f29e631 3. Create a minikube cluster: minikube start --network-plugin=cni --memory=40960 码力 | 885 页 | 12.41 MB | 1 年前3Cilium v1.11 Documentation
to secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular kubectl create secret generic -n kube-system cilium-etcd-secrets \ --from-file=etcd-client-ca.crt=ca.crt \ --from-file=etcd-client.key=client.key \ --from-file=etcd-client.crt=client.crt Adjust the command cilium hubble enable as shown below: $ cilium hubble enable � Found existing CA in secret cilium-ca � Patching ConfigMap cilium-config to enable Hubble... ♻ Restarted Cilium pods � Generating0 码力 | 1373 页 | 19.37 MB | 1 年前3Cilium v1.5 Documentation
to secure access to and from external services, tradi�onal CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from applica�on containers to par�cular [h�ps://kubernetes.io/docs/concepts/overview/working-with- objects/labels/], Ingress [h�ps://kubernetes.io/docs/concepts/services- networking/ingress/], Service [h�ps://kubernetes.io/docs/concepts/services- networking/service/] kubectl create secret generic -n kube-system cilium-etcd-secrets \ --from-file=etcd-client-ca.crt=ca.crt \ --from-file=etcd-client.key=client.key \ --from-file=etcd-client.crt=client.crt0 码力 | 740 页 | 12.52 MB | 1 年前3Cilium v1.8 Documentation
to secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular [https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/], Ingress [https://kubernetes.io/docs/concepts/services-networking/ingress/], Service [https://kubernetes.io/docs/concepts/services-networking/service/] TPROXY requirements of Cilium >= 1.6.0. minikube version minikube version: v1.3.1 commit: ca60a424ce69a4d79f502650199ca2b52f29e631 3. Create a minikube cluster: minikube start --network-plugin=cni --memory=40960 码力 | 1124 页 | 21.33 MB | 1 年前3Cilium v1.6 Documentation
to secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular [https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/], Ingress [https://kubernetes.io/docs/concepts/services-networking/ingress/], Service [https://kubernetes.io/docs/concepts/services-networking/service/] TPROXY requirements of Cilium >= 1.6.0. minikube version minikube version: v1.3.1 commit: ca60a424ce69a4d79f502650199ca2b52f29e631 3. Create a minikube cluster: minikube start --network-plugin=cni --memory=40960 码力 | 734 页 | 11.45 MB | 1 年前3BAETYL 0.1.6 Documentation
username: [MUST] The client username, must be the username of cloud core device. ca: [MUST] The CA path for client to connect with cloud management suit. key: [MUST] The private key path certificate authentication configuration, if `ssl` or `wss` is enabled, it must be configured. ca: Server CA certificate path key: Server private key path cert: Server public key path principals: ACL that can be allowed to be transmitted. The maximum can be set to 268,435,455 Byte(about 256MB). ingress: Message receive configuration qos0: buffer: size: The default value is `10000`, means0 码力 | 119 页 | 11.46 MB | 1 年前3BAETYL 1.0.0 Documentation
username: [MUST] The client username, must be the username of cloud core device. ca: [MUST] The CA path for client to connect with cloud management suit. key: [MUST] The private key path certificate authentication configuration, if `ssl` or `wss` is enabled, it must be configured. ca: Server CA certificate path key: Server private key path cert: Server public key path principals: ACL that can be allowed to be transmitted. The maximum can be set to 268,435,455 Byte(about 256MB). ingress: Message receive configuration qos0: buffer: size: The default value is `10000`, means0 码力 | 135 页 | 15.44 MB | 1 年前3Apache Kyuubi 1.5.1 Documentation
timestamp '2018-11-17' 2021-10-28 13:56:27.540 INFO operation.ExecuteStatement: Processing kent's query[a46ca504-fe3a-4dfb-be1e-19770af8ac4c]: INITIALIZED_STATE - > PENDING_STATE, statement: select timestamp '2018-11-17' '2018-11-17' 2021-10-28 13:56:27.541 INFO operation.ExecuteStatement: Processing kent's query[a46ca504-fe3a-4dfb-be1e-19770af8ac4c]: PENDING_STATE -> RUNNING_STATE, statement: select timestamp '2018-11-17' User: kent 2021-10-28 13:56:27.604 INFO operation.ExecuteStatement: Processing kent's query[a46ca504-fe3a-4dfb-be1e-19770af8ac4c]: RUNNING_STATE -> RUNNING_STATE, statement: select timestamp '2018-11-17'0 码力 | 267 页 | 5.80 MB | 1 年前3
共 431 条
- 1
- 2
- 3
- 4
- 5
- 6
- 44