Cilium v1.8 Documentation
resources outside the cluster (e.g., VMs in the VPC or AWS managed services) is masqueraded (i.e., SNAT) by Cilium to use the VPC IP address of the Kubernetes worker node. Excluding the lines for global { "type": "portmap", "capabilities": {"portMappings": true}, "snat": true }, { "name": "cilium", "type": "cilium-cni" } }, { "type": "portmap", "capabilities": {"portMappings": true}, "snat": true }, { "name": "cilium", "type": "cilium-cni" }0 码力 | 1124 页 | 21.33 MB | 1 年前3Cilium v1.9 Documentation
resources outside the cluster (e.g., VMs in the VPC or AWS managed services) is masqueraded (i.e., SNAT) by Cilium to use the VPC IP address of the Kubernetes worker node. Excluding the lines for eni=true }, { "type": "portmap", "capabilities": {"portMappings": true}, "snat": true }, { "name": "cilium", "type": "cilium-cni" } "/etc/cni/net.d/calico-kubeconfig" } }, { "type": "portmap", "snat": true, "capabilities": {"portMappings": true} }, { "type": "cilium-cni"0 码力 | 1263 页 | 18.62 MB | 1 年前3Cilium v1.10 Documentation
resources outside the cluster (e.g., VMs in the VPC or AWS managed services) is masqueraded (i.e., SNAT) by Cilium to use the VPC IP address of the Kubernetes worker node. Excluding the lines for eni.enabled=true }, { "type": "portmap", "capabilities": {"portMappings": true}, "snat": true }, { "name": "cilium", "type": "cilium-cni" } "/etc/cni/net.d/calico-kubeconfig" } }, { "type": "portmap", "snat": true, "capabilities": {"portMappings": true} }, { "type": "cilium-cni"0 码力 | 1307 页 | 19.26 MB | 1 年前3Cilium v1.11 Documentation
resources outside the cluster (e.g., VMs in the VPC or AWS managed services) is masqueraded (i.e., SNAT) by Cilium to use the VPC IP address of the Kubernetes worker node. To set up Cilium overlay mode default). 2. Flush iptables rules added by VPC CNI iptables -t nat -F AWS-SNAT-CHAIN-0 \\ && iptables -t nat -F AWS-SNAT-CHAIN-1 \\ && iptables -t nat -F AWS-CONNMARK-CHAIN-0 \\ && iptables -t }, { "type": "portmap", "capabilities": {"portMappings": true}, "snat": true }, { "name": "cilium", "type": "cilium-cni" }0 码力 | 1373 页 | 19.37 MB | 1 年前3Cilium v1.7 Documentation
resources outside the cluster (e.g., VMs in the VPC or AWS managed services) is masqueraded (i.e., SNAT) by Cilium to use the VPC IP address of the Kubernetes worker node. Excluding the lines for global }, { "type": "portmap", "capabilities": {"portMappings": true}, "snat": true }, { "name": "cilium", "type": "cilium-cni" } }, { "type": "portmap", "capabilities": {"portMappings": true}, "snat": true }, { "name": "cilium", "type": "cilium-cni" }0 码力 | 885 页 | 12.41 MB | 1 年前3Linux command line for you and me Documentation Release 0.1
works as a router PREROUTING for port forwarding POSTROUTING for Source Network Address Translation (SNAT), this applies to all packets leaving the system filter table filter is the default table of iptables iptables. It has 3 default chains. INPUT OUTPUT FORWARD nat table nat table is a special table for SNAT and DNAT (port forwarding). It has the following chains. PREROUTING POSTROUTING OUTPUT There are destination_ip | DNAT | | | -L (list) | USER_DEFINED_CHAINS | -i incoming | SNAT | | | -S (show) | | -o outgoing | LIMIT | |0 码力 | 124 页 | 510.85 KB | 1 年前3Linux command line for you and me Documentation Release 0.1
a router • PREROUTING for port forwarding • POSTROUTING for Source Network Address Translation (SNAT), this applies to all packets leaving the sys- tem 14.3 filter table filter is the default table 3 default chains. • INPUT • OUTPUT • FORWARD 14.4 nat table nat table is a special table for SNAT and DNAT (port forwarding). It has the following chains. • PREROUTING • POSTROUTING • OUTPUT There POSTROUTING | --dport destination_ip | ˓→DNAT | | | -L (list) | USER_DEFINED_CHAINS | -i incoming | ˓→SNAT | | | -S (show) | | -o outgoing | ˓→LIMIT | | | -Z (zero) | | -m mac | ˓→RETURN | | | -N | |0 码力 | 128 页 | 716.99 KB | 1 年前3Cilium v1.6 Documentation
{ "type": "portmap", "capabilities": {"portMappings": true}, "snat": true }, { "name": "cilium", "type": "cilium-cni" } }, { "type": "portmap", "capabilities": {"portMappings": true}, "snat": true }, { "name": "cilium", "type": "cilium-cni" } "/etc/cni/net.d/calico-kubeconfig" } }, { "type": "portmap", "snat": true, "capabilities": {"portMappings": true} }, { "type": "cilium-cni"0 码力 | 734 页 | 11.45 MB | 1 年前3North-South Load Balancing of Kubernetes Services with eBPF/XDP
svc = bpf_map_lookup_elem(..); if (svc) { b = select_backend(svc); dnat(skb, b); snat(skb); redirect(skb); } } CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=1222010 码力 | 11 页 | 444.46 KB | 1 年前3Cilium v1.5 Documentation
EKS cluster "ridiculous-gopher-1548608219" in "us-west-2" region is re Disable SNAT in aws-node agent Disable the SNAT behavior of the aws-node DaemonSet which causes all traffic leaving a node to be ACCEPT POSTROUTING (mangle) CILIUM_POST_mangle CILIUM_POST_nat ! -s HOST_IP -o cilium_host -j SNAT --to-source HOST_IP -s NODE_CIDR ! -d NODE_CIDR ! -o cilium_+ -j MASQUERADE iptables Rules Overview0 码力 | 740 页 | 12.52 MB | 1 年前3
共 10 条
- 1