Cilium v1.6 Documentationwith DNS-based policies Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access the tutorial from Step 1. Getting Started Securing Elasticsearch This document serves as an introduction for using Cilium to enforce Elasticsearch- aware security policies. It is a detailed walk-through the Cilium tradition, we will use a Star Wars-inspired example. The Empire has a large scale Elasticsearch cluster which is used for storing a variety of data including: index: troop_logs: Stormtroopers0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 DocumentationConnections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access the tutorial from Step 1. Getting Started Securing Elasticsearch This document serves as an introduction for using Cilium to enforce Elasticsearch- aware security policies. It is a detailed walk-through the Cilium tradition, we will use a Star Wars-inspired example. The Empire has a large scale Elasticsearch cluster which is used for storing a variety of data including: index: troop_logs: Stormtroopers0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.8 DocumentationConnections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access the tutorial from Step 1. Getting Started Securing Elasticsearch This document serves as an introduction for using Cilium to enforce Elasticsearch- aware security policies. It is a detailed walk-through the Cilium tradition, we will use a Star Wars-inspired example. The Empire has a large scale Elasticsearch cluster which is used for storing a variety of data including: index: troop_logs: Stormtroopers0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.10 DocumentationConnections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access the tutorial from Step 1. Getting Started Securing Elasticsearch This document serves as an introduction for using Cilium to enforce Elasticsearch- aware security policies. It is a detailed walk-through the Cilium tradition, we will use a Star Wars-inspired example. The Empire has a large scale Elasticsearch cluster which is used for storing a variety of data including: index: troop_logs: Stormtroopers0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.9 DocumentationConnections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access the tutorial from Step 1. Getting Started Securing Elasticsearch This document serves as an introduction for using Cilium to enforce Elasticsearch- aware security policies. It is a detailed walk-through the Cilium tradition, we will use a Star Wars-inspired example. The Empire has a large scale Elasticsearch cluster which is used for storing a variety of data including: index: troop_logs: Stormtroopers0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.11 DocumentationConnections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access the tutorial from Step 1. Getting Started Securing Elasticsearch This document serves as an introduction for using Cilium to enforce Elasticsearch- aware security policies. It is a detailed walk-through the Cilium tradition, we will use a Star Wars-inspired example. The Empire has a large scale Elasticsearch cluster which is used for storing a variety of data including: index: troop_logs: Stormtroopers0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.5 Documentationminikube delete A�er this, you can re-run the tutorial from Step 1. Getting Started Securing Elasticsearch This document serves as an introduc�on for using Cilium to enforce Elas�csearch-aware security minikube. Deploy the app using command below, which will create An elasticsearch service with the selector label component:elasticsearch and a pod running Elas�csearch. Three Elas�csearch clients one each com/cilium/cilium/v1.5/ex serviceaccount "elasticsearch" created service "elasticsearch" created replicationcontroller "es" created role "elasticsearch" created rolebinding "elasticsearch" created pod "outpost" created0 码力 | 740 页 | 12.52 MB | 1 年前3
openEuler 21.09 技术白皮书to other security mechanisms, such as AppArmor. Feature Description UI Prometheus MySQL Elasticsearch Data storage Application topology awareness Fault inference engine Configuration tracing Logs0 码力 | 36 页 | 3.40 MB | 1 年前3
openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)information and dependencies of software packages, then creates a knowledge map and saves it to Elasticsearch. Basic information includes software package name, version, description, and license, as well0 码力 | 116 页 | 3.16 MB | 1 年前3
共 9 条
- 1













