 Cilium v1.11 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter Restarted unmanaged pod kube-system/event-exporter-gke-564fb97f9- rv8hg ♻ Restarted unmanaged pod kube-system/kube-dns-6465f78586-hlcrz ♻ Restarted unmanaged pod kube-system/kube-dns-autoscaler- 7f89fb6b79-fsmsg Restarted unmanaged pod kube-system/l7-default-backend-7fd66b8b88- qqhh5 ♻ Restarted unmanaged pod kube-system/metrics-server-v0.3.6- 7b5cdbcbb8-kjl65 ♻ Restarted unmanaged pod kube-system/stackdr0 码力 | 1373 页 | 19.37 MB | 1 年前3 Cilium v1.11 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter Restarted unmanaged pod kube-system/event-exporter-gke-564fb97f9- rv8hg ♻ Restarted unmanaged pod kube-system/kube-dns-6465f78586-hlcrz ♻ Restarted unmanaged pod kube-system/kube-dns-autoscaler- 7f89fb6b79-fsmsg Restarted unmanaged pod kube-system/l7-default-backend-7fd66b8b88- qqhh5 ♻ Restarted unmanaged pod kube-system/metrics-server-v0.3.6- 7b5cdbcbb8-kjl65 ♻ Restarted unmanaged pod kube-system/stackdr0 码力 | 1373 页 | 19.37 MB | 1 年前3
 Cilium v1.9 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter paths include with and without service load- balancing and various network policy combinations. The pod name indicates the connectivity variant and the readiness and liveness gate indicates success or failure 65s pod-to-a-79546bc469-rl2qq 1/1 Running 0 66s pod-to-a-allowed-cnp-58b7f7fb8f-lkq7p 1/1 Running 0 66s pod-to-a-de0 码力 | 1263 页 | 18.62 MB | 1 年前3 Cilium v1.9 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter paths include with and without service load- balancing and various network policy combinations. The pod name indicates the connectivity variant and the readiness and liveness gate indicates success or failure 65s pod-to-a-79546bc469-rl2qq 1/1 Running 0 66s pod-to-a-allowed-cnp-58b7f7fb8f-lkq7p 1/1 Running 0 66s pod-to-a-de0 码力 | 1263 页 | 18.62 MB | 1 年前3
 Cilium v1.8 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter paths include with and without service load- balancing and various network policy combinations. The pod name indicates the connectivity variant and the readiness and liveness gate indicates success or failure 67s pod-to-a-allowed-cnp-87b5895c8-bfw4x 1/1 Running 0 68s pod-to-a-b76ddb6b4-2v4kb 1/1 Running 0 68s pod-to-a-denie0 码力 | 1124 页 | 21.33 MB | 1 年前3 Cilium v1.8 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter paths include with and without service load- balancing and various network policy combinations. The pod name indicates the connectivity variant and the readiness and liveness gate indicates success or failure 67s pod-to-a-allowed-cnp-87b5895c8-bfw4x 1/1 Running 0 68s pod-to-a-b76ddb6b4-2v4kb 1/1 Running 0 68s pod-to-a-denie0 码力 | 1124 页 | 21.33 MB | 1 年前3
 Cilium v1.10 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter Restarted unmanaged pod kube-system/event-exporter-gke-564fb97f9- rv8hg ♻ Restarted unmanaged pod kube-system/kube-dns-6465f78586-hlcrz ♻ Restarted unmanaged pod kube-system/kube-dns-autoscaler- 7f89fb6b79-fsmsg Restarted unmanaged pod kube-system/l7-default-backend-7fd66b8b88- qqhh5 ♻ Restarted unmanaged pod kube-system/metrics-server-v0.3.6- 7b5cdbcbb8-kjl65 ♻ Restarted unmanaged pod kube-system/stackdr0 码力 | 1307 页 | 19.26 MB | 1 年前3 Cilium v1.10 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter Restarted unmanaged pod kube-system/event-exporter-gke-564fb97f9- rv8hg ♻ Restarted unmanaged pod kube-system/kube-dns-6465f78586-hlcrz ♻ Restarted unmanaged pod kube-system/kube-dns-autoscaler- 7f89fb6b79-fsmsg Restarted unmanaged pod kube-system/l7-default-backend-7fd66b8b88- qqhh5 ♻ Restarted unmanaged pod kube-system/metrics-server-v0.3.6- 7b5cdbcbb8-kjl65 ♻ Restarted unmanaged pod kube-system/stackdr0 码力 | 1307 页 | 19.26 MB | 1 年前3
 Cilium v1.7 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter paths include with and without service load- balancing and various network policy combinations. The pod name indicates the connectivity variant and the readiness and liveness gate indicates success or failure 4m50s pod-to-a-59b5fcb7f6-gq4hd 1/1 Running 0 4m50s pod-to-a-allowed-cnp-55f885bf8b-5lxzz 1/1 Running 0 4m50s pod-to-a-ext0 码力 | 885 页 | 12.41 MB | 1 年前3 Cilium v1.7 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter paths include with and without service load- balancing and various network policy combinations. The pod name indicates the connectivity variant and the readiness and liveness gate indicates success or failure 4m50s pod-to-a-59b5fcb7f6-gq4hd 1/1 Running 0 4m50s pod-to-a-allowed-cnp-55f885bf8b-5lxzz 1/1 Running 0 4m50s pod-to-a-ext0 码力 | 885 页 | 12.41 MB | 1 年前3
 Cilium v1.5 DocumentationKubernetes Endpoint Lifecycle Troubleshoo�ng Monitoring & Metrics Exported Metrics Cilium as a Kubernetes pod Cilium as a host-agent on a node Troubleshoo�ng Component & Cluster Health Connec�vity Problems Policy transparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container iden�ty (in contrast to IP address iden�fica�on in tradi�onal systems) and can filter on official Kubernetes documenta�on [h�ps://kubernetes.io/docs/setup/independent/create-cluster- kubeadm/#pod-network]. Standard Installation This guides takes you through the steps required to set up Cilium0 码力 | 740 页 | 12.52 MB | 1 年前3 Cilium v1.5 DocumentationKubernetes Endpoint Lifecycle Troubleshoo�ng Monitoring & Metrics Exported Metrics Cilium as a Kubernetes pod Cilium as a host-agent on a node Troubleshoo�ng Component & Cluster Health Connec�vity Problems Policy transparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container iden�ty (in contrast to IP address iden�fica�on in tradi�onal systems) and can filter on official Kubernetes documenta�on [h�ps://kubernetes.io/docs/setup/independent/create-cluster- kubeadm/#pod-network]. Standard Installation This guides takes you through the steps required to set up Cilium0 码力 | 740 页 | 12.52 MB | 1 年前3
 Cilium v1.6 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS, check the CoreDNS ConfigMap and validate that in-addr.arpa listed as wildcards next to cluster.local. You can validate this by looking up a pod IP with the host utility from any pod: host 10.60.20.86 86.20.60.10.in-addr.arpa domain name pointer cilium-etcd- 972nprv9dp0 码力 | 734 页 | 11.45 MB | 1 年前3 Cilium v1.6 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS, check the CoreDNS ConfigMap and validate that in-addr.arpa listed as wildcards next to cluster.local. You can validate this by looking up a pod IP with the host utility from any pod: host 10.60.20.86 86.20.60.10.in-addr.arpa domain name pointer cilium-etcd- 972nprv9dp0 码力 | 734 页 | 11.45 MB | 1 年前3
 GitOps Continuous Delivery with Argo and Codefreshand Canary on K8s https://argoproj.github.io/argo-rollouts/ ● Autoscaling: Anti-affinity and horizontal pod scaling MyApp rollout manifest Current State 1. Commit 6. Get latest MyApp source code 20 码力 | 14 页 | 1.25 MB | 1 年前3 GitOps Continuous Delivery with Argo and Codefreshand Canary on K8s https://argoproj.github.io/argo-rollouts/ ● Autoscaling: Anti-affinity and horizontal pod scaling MyApp rollout manifest Current State 1. Commit 6. Get latest MyApp source code 20 码力 | 14 页 | 1.25 MB | 1 年前3
 Zabbix 5.2 ManualJava gateway using podman on Red Hat 8. 1. Create new pod with name zabbix and exposed ports (web-interface, Zabbix server trapper): podman pod create --name zabbix -p 80:8080 -p 10051:10051 2. (optional) (optional) Start Zabbix agent container in zabbix pod location: podman run --name zabbix-agent \ -eZBX_SERVER_HOST="127.0.0.1,localhost" \ --restart=always \ --pod=zabbix \ -d registry.connect.redhat.com/za x_pwd" \ -e MYSQL_ROOT_PASSWORD="root_pwd" \ -v ./mysql/:/var/lib/mysql/:Z \ --restart=always \ --pod=zabbix \ -d mysql:8.0 \ --character-set-server=utf8 --collation-server=utf8_bin \ --default-authen0 码力 | 1738 页 | 18.98 MB | 1 年前3 Zabbix 5.2 ManualJava gateway using podman on Red Hat 8. 1. Create new pod with name zabbix and exposed ports (web-interface, Zabbix server trapper): podman pod create --name zabbix -p 80:8080 -p 10051:10051 2. (optional) (optional) Start Zabbix agent container in zabbix pod location: podman run --name zabbix-agent \ -eZBX_SERVER_HOST="127.0.0.1,localhost" \ --restart=always \ --pod=zabbix \ -d registry.connect.redhat.com/za x_pwd" \ -e MYSQL_ROOT_PASSWORD="root_pwd" \ -v ./mysql/:/var/lib/mysql/:Z \ --restart=always \ --pod=zabbix \ -d mysql:8.0 \ --character-set-server=utf8 --collation-server=utf8_bin \ --default-authen0 码力 | 1738 页 | 18.98 MB | 1 年前3
 Zabbix 5.0 Manual5 What’s new in Zabbix 5.0.0 Vertical menu A modern vertical menu in a sidebar replaces the horizontal menu in the new version. The menu can be collapsed or hidden completely: 9 Collapsed menu with Java gateway using podman on Red Hat 8. 1. Create new pod with name zabbix and exposed ports (web-interface, Zabbix server trapper): podman pod create --name zabbix -p 80:8080 -p 10051:10051 2. (optional) (optional) Start Zabbix agent container in zabbix pod location: podman run --name zabbix-agent \ -e ZBX_SERVER_HOST="127.0.0.1,localhost" \ --restart=always \ --pod=zabbix \ -d registry.connect.redhat.com/za0 码力 | 1561 页 | 28.27 MB | 1 年前3 Zabbix 5.0 Manual5 What’s new in Zabbix 5.0.0 Vertical menu A modern vertical menu in a sidebar replaces the horizontal menu in the new version. The menu can be collapsed or hidden completely: 9 Collapsed menu with Java gateway using podman on Red Hat 8. 1. Create new pod with name zabbix and exposed ports (web-interface, Zabbix server trapper): podman pod create --name zabbix -p 80:8080 -p 10051:10051 2. (optional) (optional) Start Zabbix agent container in zabbix pod location: podman run --name zabbix-agent \ -e ZBX_SERVER_HOST="127.0.0.1,localhost" \ --restart=always \ --pod=zabbix \ -d registry.connect.redhat.com/za0 码力 | 1561 页 | 28.27 MB | 1 年前3
共 95 条
- 1
- 2
- 3
- 4
- 5
- 6
- 10














 
 