 Cilium v1.10 Documentationbe displayed in the UI as service dependencies between the different pods: In the bottom of the interface, you may also inspect each recent Hubble flow event in your current namespace individually. Inspecting TLS-encrypted connections. This TLS-aware inspection allows Cilium API-aware visibility and policy to function even for connections where client to server communication is protected by TLS, such as when a client failure detection. This feature also relies on peer side’s configuration. protocol bfd { interface "{{ grains['node_mgnt_device'] }}" { min rx interval 100 ms; min tx interval0 码力 | 1307 页 | 19.26 MB | 1 年前3 Cilium v1.10 Documentationbe displayed in the UI as service dependencies between the different pods: In the bottom of the interface, you may also inspect each recent Hubble flow event in your current namespace individually. Inspecting TLS-encrypted connections. This TLS-aware inspection allows Cilium API-aware visibility and policy to function even for connections where client to server communication is protected by TLS, such as when a client failure detection. This feature also relies on peer side’s configuration. protocol bfd { interface "{{ grains['node_mgnt_device'] }}" { min rx interval 100 ms; min tx interval0 码力 | 1307 页 | 19.26 MB | 1 年前3
 Cilium v1.11 Documentationdistributions use a different interface naming convention. If you use masquerading with the option egressMasqueradeInterfaces=eth0, remember to replace eth0 with the proper interface name. OpenShift To install be displayed in the UI as service dependencies between the different pods: In the bottom of the interface, you may also inspect each recent Hubble flow event in your current namespace individually. Inspecting TLS-encrypted connections. This TLS-aware inspection allows Cilium API-aware visibility and policy to function even for connections where client to server communication is protected by TLS, such as when a client0 码力 | 1373 页 | 19.37 MB | 1 年前3 Cilium v1.11 Documentationdistributions use a different interface naming convention. If you use masquerading with the option egressMasqueradeInterfaces=eth0, remember to replace eth0 with the proper interface name. OpenShift To install be displayed in the UI as service dependencies between the different pods: In the bottom of the interface, you may also inspect each recent Hubble flow event in your current namespace individually. Inspecting TLS-encrypted connections. This TLS-aware inspection allows Cilium API-aware visibility and policy to function even for connections where client to server communication is protected by TLS, such as when a client0 码力 | 1373 页 | 19.37 MB | 1 年前3
 Cilium v1.6 DocumentationCilium might not come up immediately on all nodes, since Flannel only sets up the bridge network interface that connects containers with the outside world when the first container is created on that node nodeEncryption=false \ > cilium.yaml Encryption interface If direct routing is being used an additional argument can be used to identify the network facing interface. If no interface is specified the default route link but depending on routing rules users may need to specify the encryption interface as follows: --set global.encryption.interface=ethX Node to node encryption In order to enable node-to-node encryption0 码力 | 734 页 | 11.45 MB | 1 年前3 Cilium v1.6 DocumentationCilium might not come up immediately on all nodes, since Flannel only sets up the bridge network interface that connects containers with the outside world when the first container is created on that node nodeEncryption=false \ > cilium.yaml Encryption interface If direct routing is being used an additional argument can be used to identify the network facing interface. If no interface is specified the default route link but depending on routing rules users may need to specify the encryption interface as follows: --set global.encryption.interface=ethX Node to node encryption In order to enable node-to-node encryption0 码力 | 734 页 | 11.45 MB | 1 年前3
 Cilium v1.9 DocumentationTLS-encrypted connections. This TLS-aware inspection allows Cilium API-aware visibility and policy to function even for connections where client to server communication is protected by TLS, such as when a client can conflict with a DHCP agent running on the node and assigning the primary IP of the ENI to the interface of the node. A common scenario where this happens is if NetworkManager is running on the node and failure detection. This feature also relies on peer side’s configuration. protocol bfd { interface "{{ grains['node_mgnt_device'] }}" { min rx interval 100 ms; min tx interval0 码力 | 1263 页 | 18.62 MB | 1 年前3 Cilium v1.9 DocumentationTLS-encrypted connections. This TLS-aware inspection allows Cilium API-aware visibility and policy to function even for connections where client to server communication is protected by TLS, such as when a client can conflict with a DHCP agent running on the node and assigning the primary IP of the ENI to the interface of the node. A common scenario where this happens is if NetworkManager is running on the node and failure detection. This feature also relies on peer side’s configuration. protocol bfd { interface "{{ grains['node_mgnt_device'] }}" { min rx interval 100 ms; min tx interval0 码力 | 1263 页 | 18.62 MB | 1 年前3
 Cilium v1.7 DocumentationTLS-encrypted connections. This TLS-aware inspection allows Cilium API-aware visibility and policy to function even for connections where client to server communication is protected by TLS, such as when a client can conflict with a DHCP agent running on the node and assigning the primary IP of the ENI to the interface of the node. A common scenario where this happens is if NetworkManager is running on the node and failure detection. This feature also relies on peer side’s configuration. protocol bfd { interface "{{ grains['node_mgnt_device'] }}" { min rx interval 100 ms; min tx interval0 码力 | 885 页 | 12.41 MB | 1 年前3 Cilium v1.7 DocumentationTLS-encrypted connections. This TLS-aware inspection allows Cilium API-aware visibility and policy to function even for connections where client to server communication is protected by TLS, such as when a client can conflict with a DHCP agent running on the node and assigning the primary IP of the ENI to the interface of the node. A common scenario where this happens is if NetworkManager is running on the node and failure detection. This feature also relies on peer side’s configuration. protocol bfd { interface "{{ grains['node_mgnt_device'] }}" { min rx interval 100 ms; min tx interval0 码力 | 885 页 | 12.41 MB | 1 年前3
 Cilium v1.8 DocumentationTLS-encrypted connections. This TLS-aware inspection allows Cilium API-aware visibility and policy to function even for connections where client to server communication is protected by TLS, such as when a client can conflict with a DHCP agent running on the node and assigning the primary IP of the ENI to the interface of the node. A common scenario where this happens is if NetworkManager is running on the node and failure detection. This feature also relies on peer side’s configuration. protocol bfd { interface "{{ grains['node_mgnt_device'] }}" { min rx interval 100 ms; min tx interval0 码力 | 1124 页 | 21.33 MB | 1 年前3 Cilium v1.8 DocumentationTLS-encrypted connections. This TLS-aware inspection allows Cilium API-aware visibility and policy to function even for connections where client to server communication is protected by TLS, such as when a client can conflict with a DHCP agent running on the node and assigning the primary IP of the ENI to the interface of the node. A common scenario where this happens is if NetworkManager is running on the node and failure detection. This feature also relies on peer side’s configuration. protocol bfd { interface "{{ grains['node_mgnt_device'] }}" { min rx interval 100 ms; min tx interval0 码力 | 1124 页 | 21.33 MB | 1 年前3
 Buzzing Across Spaceprovides an interface for applications to interact with the underlying hardware). The kernel has visibility across the entire system and is highly performant, but needs to provide a stable interface to applications flexibility, eBPF programs are also composable with the concept of tail and function calls. eBPF programs can make function calls into a set of dedicated kernel functions (eBPF helpers/kfuncs) to help0 码力 | 32 页 | 32.98 MB | 1 年前3 Buzzing Across Spaceprovides an interface for applications to interact with the underlying hardware). The kernel has visibility across the entire system and is highly performant, but needs to provide a stable interface to applications flexibility, eBPF programs are also composable with the concept of tail and function calls. eBPF programs can make function calls into a set of dedicated kernel functions (eBPF helpers/kfuncs) to help0 码力 | 32 页 | 32.98 MB | 1 年前3
 Cilium v1.5 DocumentationMAC address and IP address which allows the genera�on dedicated BPF programs for those pods. # Interface to be used when running Cilium on top of a CNI plugin. # For flannel, use "cni0" flannel-master-device: policy enforcement enabled on top of a CNI plugi # the BPF programs will be installed on the network interface specified in # 'flannel-master-device' and on all network interfaces belonging to # a container Cilium might not come up immediately on all nodes, since Flannel only sets up the bridge network interface that connects containers with the outside world when the first container is created on that node0 码力 | 740 页 | 12.52 MB | 1 年前3 Cilium v1.5 DocumentationMAC address and IP address which allows the genera�on dedicated BPF programs for those pods. # Interface to be used when running Cilium on top of a CNI plugin. # For flannel, use "cni0" flannel-master-device: policy enforcement enabled on top of a CNI plugi # the BPF programs will be installed on the network interface specified in # 'flannel-master-device' and on all network interfaces belonging to # a container Cilium might not come up immediately on all nodes, since Flannel only sets up the bridge network interface that connects containers with the outside world when the first container is created on that node0 码力 | 740 页 | 12.52 MB | 1 年前3
 Zero instrumentation
monitoring with your first
steps in eBPF28, 2020 2 What will we be doing? 3 How are we going to do it? 4 Demo time 5 Tracing Go function with uprobes 6 Demo time 7 Conclusions ● eBPF programs can be attached to different events:0 码力 | 7 页 | 618.37 KB | 1 年前3 Zero instrumentation
monitoring with your first
steps in eBPF28, 2020 2 What will we be doing? 3 How are we going to do it? 4 Demo time 5 Tracing Go function with uprobes 6 Demo time 7 Conclusions ● eBPF programs can be attached to different events:0 码力 | 7 页 | 618.37 KB | 1 年前3
 bpfbox: Simple Precise
Process Confinement
with eBPF and KRSIof rules ▶ Add additional context to a block of rules 5 / 7 Our Policy Language Policy at the Function Call Level ▶ #[func " foo" ] → Apply rules only within a call to foo() ▶ #[kfunc " foo" ] → Same0 码力 | 8 页 | 528.12 KB | 1 年前3 bpfbox: Simple Precise
Process Confinement
with eBPF and KRSIof rules ▶ Add additional context to a block of rules 5 / 7 Our Policy Language Policy at the Function Call Level ▶ #[func " foo" ] → Apply rules only within a call to foo() ▶ #[kfunc " foo" ] → Same0 码力 | 8 页 | 528.12 KB | 1 年前3
共 12 条
- 1
- 2














