Cilium v1.11 DocumentationDistribution Compatibility & Considerations Linux Kernel Required Kernel Versions for Advanced Features Key-Value store clang+LLVM iproute2 Firewall Rules Mounted eBPF filesystem Privileges Upgrade Guide Running cilium-health cilium-operator cilium-operator-aws cilium-operator-azure cilium-operator-generic Key-Value Store Key-Value Store Layout Leases Debugging Further Reading Related Material Presentations Podcasts to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.10 DocumentationDistribution Compatibility & Considerations Linux Kernel Required Kernel Versions for Advanced Features Key-Value store clang+LLVM iproute2 Firewall Rules Mounted eBPF filesystem Privileges Upgrade Guide Running cilium-health cilium-operator cilium-operator-aws cilium-operator-azure cilium-operator-generic Key-Value Store Key-Value Store Layout Leases Debugging Further Reading Related Material Presentations Podcasts to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.9 DocumentationLinux Distribution Compatibility Matrix Linux Kernel Required Kernel Versions for Advanced Features Key-Value store clang+LLVM iproute2 Firewall Rules Mounted eBPF filesystem Privileges Upgrade Guide Running cilium-health cilium-operator cilium-operator-aws cilium-operator-azure cilium-operator-generic Key-Value Store Key-Value Store Layout Leases Debugging Further Reading Related Material Presentations Podcasts to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.6 DocumentationLinux Distribution Compatibility Matrix Linux Kernel Advanced Features and Required Kernel Version Key-Value store clang+LLVM iproute2 Firewall Rules Privileges Upgrade Guide Running pre-flight check Kubernetes examples: Command Reference cilium-agent cilium cilium-health cilium-operator Key-Value Store Key-Value Store Layout Leases Debugging Further Reading Related Material Presentations Podcasts to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 DocumentationLinux Distribution Compatibility Matrix Linux Kernel Advanced Features and Required Kernel Version Key-Value store clang+LLVM iproute2 Firewall Rules Privileges Upgrade Guide Running pre-flight check Kubernetes examples: Command Reference cilium-agent cilium cilium-health cilium-operator Key-Value Store Key-Value Store Layout Leases Debugging Further Reading Related Material Presentations Podcasts to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.5 DocumentationExtensions Administra�on System Requirements Summary Linux Distribu�on Compa�bility Matrix Linux Kernel Key-Value store clang+LLVM iproute2 Firewall Rules Privileges Upgrade Guide Running a pre-flight DaemonSet Command examples: Kubernetes examples: Command Reference cilium-agent cilium cilium-health Key-Value Store Key-Value Store Layout Leases Debugging Further Reading Related Material Presenta�ons Podcasts allowing to validate the iden�ty at the receiving node. Security iden�ty management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.8 DocumentationLinux Distribution Compatibility Matrix Linux Kernel Required Kernel Versions for Advanced Features Key-Value store clang+LLVM iproute2 Firewall Rules Mounted eBPF filesystem Privileges Upgrade Guide Running cilium-health cilium-operator cilium-operator-aws cilium-operator-azure cilium-operator-generic Key-Value Store Key-Value Store Layout Leases Debugging Further Reading Related Material Presentations Podcasts to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice0 码力 | 1124 页 | 21.33 MB | 1 年前3
Steering connections to sockets with BPF socket lookup hookecho_ports = { .type = BPF_MAP_TYPE_HASH, .max_entries = 1024, .key_size = sizeof(__u16), .value_size = sizeof(__u8), }; struct bpf_map_def SEC("maps") echo_socket = { .type = BPF_MAP_TYPE_SOCKMAP, .max_entries = 1, .key_size = sizeof(__u32), .value_size = sizeof(__u64), }; echo_dispatch.bpf.c - BPF 0x0 key 2B value 1B max_entries 1024 memlock 86016B # bpftool map pin id 28 ~vagrant/bpffs/echo_ports # bpftool map show id 29 29: sockmap name echo_socket flags 0x0 key 4B value 8B0 码力 | 23 页 | 441.22 KB | 1 年前3
Hardware Breakpoint implementation in BCCstruct stack_key_t { int pid; char name[16]; int user_stack_id; int kernel_stack_id; }; BPF_STACK_TRACE(stack_traces, 16384); BPF_HASH(counts, struct stack_key_t, uint64_t); int func(struct { struct stack_key_t key = {}; key.pid = bpf_get_current_pid_tgid() >> 32; bpf_get_current_comm(&key.name, sizeof(key.name)); key.kernel_stack_id = stack_traces.get_stackid(ctx, 0); key.user_stack_id = stack_traces.get_stackid(ctx, BPF_F_USER_STACK); u64 zero = 0, *val; val = counts.lookup_or_init(&key, &zero); (*val)++; bpf_trace_printk("Hello, World! Here I accessed am address!\\n"); return 0; 0 码力 | 8 页 | 2.02 MB | 1 年前3
eBPF Summit 2020 Lightning Talkto AMQP port • Extract source IP & port as BPF map key Extract AMQP Methods Use BPF Maps Use BPF Maps • Using the source IP & port as map key • Map is a counter for consumers per connection Using the source IP & port as map key • Map is a counter for consumers per connection • Increase when declare Use BPF Maps • Using the source IP & port as map key • Map is a counter for consumers Increase when declare • Decrease when cancel Use BPF Maps • Using the source IP & port as map key • Map is a counter for consumers per connection • Increase when declare • Decrease when cancel0 码力 | 22 页 | 1.81 MB | 1 年前3
共 11 条
- 1
- 2













