 ubuntu server guidekey based authentication: each side of the connection has its own private and public key, and the peers’ public key, and this is enough to start encrypting and verifying the exchanged traffic. For more • listen port: the UDP port that WireGuard will be listening to for incoming traffic. • List of peers, each one with: – public key: the public counterpart of the private key. Generated from the private endpoint: where to send the encrypted traffic to. This is optional, but at least one of the corresponding peers must have it to bootstrap the connection. – allowed IPs: list of inner tunnel destination networks0 码力 | 486 页 | 3.33 MB | 1 年前3 ubuntu server guidekey based authentication: each side of the connection has its own private and public key, and the peers’ public key, and this is enough to start encrypting and verifying the exchanged traffic. For more • listen port: the UDP port that WireGuard will be listening to for incoming traffic. • List of peers, each one with: – public key: the public counterpart of the private key. Generated from the private endpoint: where to send the encrypted traffic to. This is optional, but at least one of the corresponding peers must have it to bootstrap the connection. – allowed IPs: list of inner tunnel destination networks0 码力 | 486 页 | 3.33 MB | 1 年前3
 Cilium v1.10 DocumentationIPv4 routes. protocol static { ipv4; route {{ POD_CIDR }} via "cilium_host"; } # BGP peers protocol bgp uplink0 { description "BGP uplink 0"; local {{ NODE_IP }} as {{ NODE_ASN }}; enabled (number of peers should correspond to a number of nodes subtracted by one): cilium status | grep Encryption Encryption: Wireguard [cilium_wg0 (Pubkey: <..>, Port: 51871, Peers: 2)] 2. Install { "listen-port": 51871, "name": "cilium_wg0", "peer-count": 1, "peers": [ { "allowed-ips": [ "10.154.1.107/32", "10.154.10 码力 | 1307 页 | 19.26 MB | 1 年前3 Cilium v1.10 DocumentationIPv4 routes. protocol static { ipv4; route {{ POD_CIDR }} via "cilium_host"; } # BGP peers protocol bgp uplink0 { description "BGP uplink 0"; local {{ NODE_IP }} as {{ NODE_ASN }}; enabled (number of peers should correspond to a number of nodes subtracted by one): cilium status | grep Encryption Encryption: Wireguard [cilium_wg0 (Pubkey: <..>, Port: 51871, Peers: 2)] 2. Install { "listen-port": 51871, "name": "cilium_wg0", "peer-count": 1, "peers": [ { "allowed-ips": [ "10.154.1.107/32", "10.154.10 码力 | 1307 页 | 19.26 MB | 1 年前3
 Cilium v1.11 DocumentationIPv4 routes. protocol static { ipv4; route {{ POD_CIDR }} via "cilium_host"; } # BGP peers protocol bgp uplink0 { description "BGP uplink 0"; local {{ NODE_IP }} as {{ NODE_ASN }}; enabled (number of peers should correspond to a number of nodes subtracted by one): cilium status | grep Encryption Encryption: Wireguard [cilium_wg0 (Pubkey: <..>, Port: 51871, Peers: 2)] 2. Install { "listen-port": 51871, "name": "cilium_wg0", "peer-count": 1, "peers": [ { "allowed-ips": [ "10.154.1.107/32", "10.154.10 码力 | 1373 页 | 19.37 MB | 1 年前3 Cilium v1.11 DocumentationIPv4 routes. protocol static { ipv4; route {{ POD_CIDR }} via "cilium_host"; } # BGP peers protocol bgp uplink0 { description "BGP uplink 0"; local {{ NODE_IP }} as {{ NODE_ASN }}; enabled (number of peers should correspond to a number of nodes subtracted by one): cilium status | grep Encryption Encryption: Wireguard [cilium_wg0 (Pubkey: <..>, Port: 51871, Peers: 2)] 2. Install { "listen-port": 51871, "name": "cilium_wg0", "peer-count": 1, "peers": [ { "allowed-ips": [ "10.154.1.107/32", "10.154.10 码力 | 1373 页 | 19.37 MB | 1 年前3
 Cilium v1.5 Documentationenvironment. For CoreDNS: Enable reverse lookups In order for the TLS cer�ficates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS ini�alized as well. For CoreDNS: Enable reverse lookups In order for the TLS cer�ficates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS des�na�on endpoint is not controlled by Cilium. En��es Based: En��es are used to describe remote peers which can be categorized without knowing their IP addresses. This includes connec�vity to the local0 码力 | 740 页 | 12.52 MB | 1 年前3 Cilium v1.5 Documentationenvironment. For CoreDNS: Enable reverse lookups In order for the TLS cer�ficates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS ini�alized as well. For CoreDNS: Enable reverse lookups In order for the TLS cer�ficates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS des�na�on endpoint is not controlled by Cilium. En��es Based: En��es are used to describe remote peers which can be categorized without knowing their IP addresses. This includes connec�vity to the local0 码力 | 740 页 | 12.52 MB | 1 年前3
 This Debian Reference (version 2.109) ports (”/dev/ttyS[0-3]”) dip limited access to serial ports for Dialup IP connection to trusted peers cdrom CD-ROM, DVD+/-RW drives audio audio device video video device scanner scanner(s) adm system defined configuration files for trusted peers in ”/etc/ppp/peers/”, you only need to belong to the dip group to create Dialup IP connection to those trusted peers using pppd(8), pon(1), and poff(1) commands0 码力 | 266 页 | 1.25 MB | 1 年前3 This Debian Reference (version 2.109) ports (”/dev/ttyS[0-3]”) dip limited access to serial ports for Dialup IP connection to trusted peers cdrom CD-ROM, DVD+/-RW drives audio audio device video video device scanner scanner(s) adm system defined configuration files for trusted peers in ”/etc/ppp/peers/”, you only need to belong to the dip group to create Dialup IP connection to those trusted peers using pppd(8), pon(1), and poff(1) commands0 码力 | 266 页 | 1.25 MB | 1 年前3
 Cilium v1.9 DocumentationCrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS IPv4 routes. protocol static { ipv4; route {{ POD_CIDR }} via "cilium_host"; } # BGP peers protocol bgp uplink0 { description "BGP uplink 0"; local {{ NODE_IP }} as {{ NODE_ASN }}; destination endpoint is not controlled by Cilium. Entities Based: Entities are used to describe remote peers which can be categorized without knowing their IP addresses. This includes connectivity to the local0 码力 | 1263 页 | 18.62 MB | 1 年前3 Cilium v1.9 DocumentationCrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS IPv4 routes. protocol static { ipv4; route {{ POD_CIDR }} via "cilium_host"; } # BGP peers protocol bgp uplink0 { description "BGP uplink 0"; local {{ NODE_IP }} as {{ NODE_ASN }}; destination endpoint is not controlled by Cilium. Entities Based: Entities are used to describe remote peers which can be categorized without knowing their IP addresses. This includes connectivity to the local0 码力 | 1263 页 | 18.62 MB | 1 年前3
 Cilium v1.8 DocumentationCrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS IPv4 routes. protocol static { ipv4; route {{ POD_CIDR }} via "cilium_host"; } # BGP peers protocol bgp uplink0 { description "BGP uplink 0"; local {{ NODE_IP }} as {{ NODE_ASN }}; destination endpoint is not controlled by Cilium. Entities Based: Entities are used to describe remote peers which can be categorized without knowing their IP addresses. This includes connectivity to the local0 码力 | 1124 页 | 21.33 MB | 1 年前3 Cilium v1.8 DocumentationCrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS IPv4 routes. protocol static { ipv4; route {{ POD_CIDR }} via "cilium_host"; } # BGP peers protocol bgp uplink0 { description "BGP uplink 0"; local {{ NODE_IP }} as {{ NODE_ASN }}; destination endpoint is not controlled by Cilium. Entities Based: Entities are used to describe remote peers which can be categorized without knowing their IP addresses. This includes connectivity to the local0 码力 | 1124 页 | 21.33 MB | 1 年前3
 Cilium v1.7 DocumentationCrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS IPv4 routes. protocol static { ipv4; route {{ POD_CIDR }} via "cilium_host"; } # BGP peers protocol bgp uplink0 { description "BGP uplink 0"; local {{ NODE_IP }} as {{ NODE_ASN }}; This indicates that the PodCIDR 10.5.48.0/24 on this node has been successfully announced to the BGP peers. Monitoring bird_exporter [https://github.com/czerwonk/bird_exporter] could collect bird daemon0 码力 | 885 页 | 12.41 MB | 1 年前3 Cilium v1.7 DocumentationCrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS IPv4 routes. protocol static { ipv4; route {{ POD_CIDR }} via "cilium_host"; } # BGP peers protocol bgp uplink0 { description "BGP uplink 0"; local {{ NODE_IP }} as {{ NODE_ASN }}; This indicates that the PodCIDR 10.5.48.0/24 on this node has been successfully announced to the BGP peers. Monitoring bird_exporter [https://github.com/czerwonk/bird_exporter] could collect bird daemon0 码力 | 885 页 | 12.41 MB | 1 年前3
 Referência Debian v2.124direto a portas série (”/dev/ttyS[0-3]”) dip Acesso limitado a portas série para ligação Dialup IP a peers de confiança cdrom drives CD-ROM, DVD+/-RW audio aparelho de áudio video aparelho de vídeo scanner de configuração pré-definidos para peers de confiança em ”/etc/ppp/peers/”, apenas precisa de pertencer ao grupo dip para criar uma ligação Dialup IP para esses peers de confiança a utilizar os comandos0 码力 | 281 页 | 1.39 MB | 1 年前3 Referência Debian v2.124direto a portas série (”/dev/ttyS[0-3]”) dip Acesso limitado a portas série para ligação Dialup IP a peers de confiança cdrom drives CD-ROM, DVD+/-RW audio aparelho de áudio video aparelho de vídeo scanner de configuração pré-definidos para peers de confiança em ”/etc/ppp/peers/”, apenas precisa de pertencer ao grupo dip para criar uma ligação Dialup IP para esses peers de confiança a utilizar os comandos0 码力 | 281 页 | 1.39 MB | 1 年前3
 Cilium v1.6 DocumentationCrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS destination endpoint is not controlled by Cilium. Entities Based: Entities are used to describe remote peers which can be categorized without knowing their IP addresses. This includes connectivity to the local last resort as it requires stable IP or subnet assignments. DNS based: Selects remote, non-cluster, peers using DNS names converted to IPs via DNS lookups. It shares all limitations of the IP/CIDR based rules0 码力 | 734 页 | 11.45 MB | 1 年前3 Cilium v1.6 DocumentationCrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS destination endpoint is not controlled by Cilium. Entities Based: Entities are used to describe remote peers which can be categorized without knowing their IP addresses. This includes connectivity to the local last resort as it requires stable IP or subnet assignments. DNS based: Selects remote, non-cluster, peers using DNS names converted to IPs via DNS lookups. It shares all limitations of the IP/CIDR based rules0 码力 | 734 页 | 11.45 MB | 1 年前3
共 17 条
- 1
- 2














