 Cilium v1.9 Documentationand HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing cilium cilium/cilium --version $CILIUM_VERSION \\ --namespace $CILIUM_NAMESPACE \\ --set hubble.tls.auto.method="cronJob" \\ --set hubble.listenAddress=":4244" \\ --set hubble.relay.enabled=true cilium cilium/cilium --version $CILIUM_VERSION \\ --namespace $CILIUM_NAMESPACE \\ --set hubble.tls.auto.method="cronJob" \\ --set hubble.listenAddress=":4244" \\ --set hubble.relay.enabled=true0 码力 | 1263 页 | 18.62 MB | 1 年前3 Cilium v1.9 Documentationand HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing cilium cilium/cilium --version $CILIUM_VERSION \\ --namespace $CILIUM_NAMESPACE \\ --set hubble.tls.auto.method="cronJob" \\ --set hubble.listenAddress=":4244" \\ --set hubble.relay.enabled=true cilium cilium/cilium --version $CILIUM_VERSION \\ --namespace $CILIUM_NAMESPACE \\ --set hubble.tls.auto.method="cronJob" \\ --set hubble.listenAddress=":4244" \\ --set hubble.relay.enabled=true0 码力 | 1263 页 | 18.62 MB | 1 年前3
 Cilium v1.10 Documentationand HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing Inspecting TLS Encrypted Connections with Cilium This document serves as an introduction for how network security teams can use Cilium to transparently inspect TLS-encrypted connections. This TLS-aware inspection visibility and policy to function even for connections where client to server communication is protected by TLS, such as when a client accesses the API service via HTTPS. This capability is similar to what is possible0 码力 | 1307 页 | 19.26 MB | 1 年前3 Cilium v1.10 Documentationand HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing Inspecting TLS Encrypted Connections with Cilium This document serves as an introduction for how network security teams can use Cilium to transparently inspect TLS-encrypted connections. This TLS-aware inspection visibility and policy to function even for connections where client to server communication is protected by TLS, such as when a client accesses the API service via HTTPS. This capability is similar to what is possible0 码力 | 1307 页 | 19.26 MB | 1 年前3
 Cilium v1.11 Documentationand HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing standalone.enabled to true and optionally provide a volume to mount Hubble UI client certificates if TLS is enabled on Hubble Relay server side. Below is an example deploying Hubble UI as standalone, with this to false as Hubble relay is already installed enabled: false tls: server: # set this to true if tls is enabled on Hubble relay server side enabled: true ui: # enable0 码力 | 1373 页 | 19.37 MB | 1 年前3 Cilium v1.11 Documentationand HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing standalone.enabled to true and optionally provide a volume to mount Hubble UI client certificates if TLS is enabled on Hubble Relay server side. Below is an example deploying Hubble UI as standalone, with this to false as Hubble relay is already installed enabled: false tls: server: # set this to true if tls is enabled on Hubble relay server side enabled: true ui: # enable0 码力 | 1373 页 | 19.37 MB | 1 年前3
 Cilium v1.5 Documentationhow to prepare your Kubernetes environment. For CoreDNS: Enable reverse lookups In order for the TLS cer�ficates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to automa�c management of the etcd cluster including compac�on, restart on quorum loss, and automa�c use of TLS. There are several disadvantages which can become of relevance as you scale up your clusters: etcd In case you are not using a TLS-enabled etcd, comment out the configura�on op�ons in the ConfigMap referring to the key loca�ons like this: # In case you want to use TLS in etcd, uncomment the 'ca-file'0 码力 | 740 页 | 12.52 MB | 1 年前3 Cilium v1.5 Documentationhow to prepare your Kubernetes environment. For CoreDNS: Enable reverse lookups In order for the TLS cer�ficates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to automa�c management of the etcd cluster including compac�on, restart on quorum loss, and automa�c use of TLS. There are several disadvantages which can become of relevance as you scale up your clusters: etcd In case you are not using a TLS-enabled etcd, comment out the configura�on op�ons in the ConfigMap referring to the key loca�ons like this: # In case you want to use TLS in etcd, uncomment the 'ca-file'0 码力 | 740 页 | 12.52 MB | 1 年前3
 Cilium v1.6 Documentationrestarting the pods to reset the CrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to management of the etcd cluster including compaction, restart on quorum loss, and automatic use of TLS. There are several disadvantages which can become of relevance as you scale up your clusters: etcd kvstore. Consul is not supported by cluster mesh at this point. It is highly recommended to use a TLS protected etcd cluster with Cilium. The server certificate of etcd must whitelist the host name *.mesh0 码力 | 734 页 | 11.45 MB | 1 年前3 Cilium v1.6 Documentationrestarting the pods to reset the CrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to management of the etcd cluster including compaction, restart on quorum loss, and automatic use of TLS. There are several disadvantages which can become of relevance as you scale up your clusters: etcd kvstore. Consul is not supported by cluster mesh at this point. It is highly recommended to use a TLS protected etcd cluster with Cilium. The server certificate of etcd must whitelist the host name *.mesh0 码力 | 734 页 | 11.45 MB | 1 年前3
 Cilium v1.7 Documentationand HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing restarting the pods to reset the CrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to management of the etcd cluster including compaction, restart on quorum loss, and automatic use of TLS. There are several disadvantages which can become of relevance as you scale up your clusters: etcd0 码力 | 885 页 | 12.41 MB | 1 年前3 Cilium v1.7 Documentationand HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing restarting the pods to reset the CrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to management of the etcd cluster including compaction, restart on quorum loss, and automatic use of TLS. There are several disadvantages which can become of relevance as you scale up your clusters: etcd0 码力 | 885 页 | 12.41 MB | 1 年前3
 Cilium v1.8 Documentationand HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing restarting the pods to reset the CrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to management of the etcd cluster including compaction, restart on quorum loss, and automatic use of TLS. There are several disadvantages which can become of relevance as you scale up your clusters: etcd0 码力 | 1124 页 | 21.33 MB | 1 年前3 Cilium v1.8 Documentationand HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies Inspecting TLS Encrypted Connections with Cilium Securing a Kafka cluster How to secure gRPC Getting Started Securing restarting the pods to reset the CrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to management of the etcd cluster including compaction, restart on quorum loss, and automatic use of TLS. There are several disadvantages which can become of relevance as you scale up your clusters: etcd0 码力 | 1124 页 | 21.33 MB | 1 年前3
 Ubuntu Server Guide 18.04for slapd.access4. 1.8. TLS When authenticating to an OpenLDAP server it is best to do so using an encrypted session. This can be accomplished using Transport Layer Security (TLS). Here, we will be our /etc/ssl/ldap01.info info file containing: organization = Example Company cn = ldap01.example.com tls_www_server encryption_key signing_key expiration_days = 3650 The above certificate is good for 10 'ssl-cert' group: sudo systemctl restart slapd.service Your server is now ready to accept the new TLS configuration. Create the file certinfo.ldif with the following contents (adjust accordingly, our0 码力 | 413 页 | 1.40 MB | 1 年前3 Ubuntu Server Guide 18.04for slapd.access4. 1.8. TLS When authenticating to an OpenLDAP server it is best to do so using an encrypted session. This can be accomplished using Transport Layer Security (TLS). Here, we will be our /etc/ssl/ldap01.info info file containing: organization = Example Company cn = ldap01.example.com tls_www_server encryption_key signing_key expiration_days = 3650 The above certificate is good for 10 'ssl-cert' group: sudo systemctl restart slapd.service Your server is now ready to accept the new TLS configuration. Create the file certinfo.ldif with the following contents (adjust accordingly, our0 码力 | 413 页 | 1.40 MB | 1 年前3
 openEuler 21.03 技术白皮书of interrupts and unbound kthreads further enhances the isolation of CPU cores and minimizes mutual interference between services. 3. Inter-process communication optimization: The optimized pipe_wait HA cluster solution offers multiple cluster options, including dual-node hot backup, dual-node mutual backup, and multi-node backup (N+M), with a combination of multiple physical machines or physical clock and no downtime is acceptable. The HA cluster software supports two-node hot backup, two-node mutual backup, and multi-node (N+M) modes. It automatically switches applications from the faulty server0 码力 | 21 页 | 948.66 KB | 1 年前3 openEuler 21.03 技术白皮书of interrupts and unbound kthreads further enhances the isolation of CPU cores and minimizes mutual interference between services. 3. Inter-process communication optimization: The optimized pipe_wait HA cluster solution offers multiple cluster options, including dual-node hot backup, dual-node mutual backup, and multi-node backup (N+M), with a combination of multiple physical machines or physical clock and no downtime is acceptable. The HA cluster software supports two-node hot backup, two-node mutual backup, and multi-node (N+M) modes. It automatically switches applications from the faulty server0 码力 | 21 页 | 948.66 KB | 1 年前3
 ubuntu server guideReplication 3 service-ldap-usage Simple LDAP user and group management 3 service-ldap-with-tls SSL/TLS 3 service-ldap-backup-restore Backup and restore 2 Kerberos 3 kerberos-introduction Introduction openssh-crypto-configuration OpenSSH crypto configuration 3 Level Path Navlink 3 troubleshooting-tls-ssl Troubleshooting TLS/SSL 2 Virtualisation and containers 3 Virtual machines 4 vm-tools-in-the-ubuntu-space OpenLDAP Introduction Installation Access control Replication Simple LDAP user and group management SSL/TLS Backup and restore Kerberos Introduction Kerberos server Service principals Kerberos encryption types0 码力 | 486 页 | 3.33 MB | 1 年前3 ubuntu server guideReplication 3 service-ldap-usage Simple LDAP user and group management 3 service-ldap-with-tls SSL/TLS 3 service-ldap-backup-restore Backup and restore 2 Kerberos 3 kerberos-introduction Introduction openssh-crypto-configuration OpenSSH crypto configuration 3 Level Path Navlink 3 troubleshooting-tls-ssl Troubleshooting TLS/SSL 2 Virtualisation and containers 3 Virtual machines 4 vm-tools-in-the-ubuntu-space OpenLDAP Introduction Installation Access control Replication Simple LDAP user and group management SSL/TLS Backup and restore Kerberos Introduction Kerberos server Service principals Kerberos encryption types0 码力 | 486 页 | 3.33 MB | 1 年前3
共 37 条
- 1
- 2
- 3
- 4














