 Cilium v1.5 Documentationconsume (topic = “deathstar-plans”) from empire-backup. The full policy can be reviewed by opening the URL in the command below in a browser. Apply this Ka�a-aware network security policy using kubectl in on top of HTTP, this can be achieved easily by understanding how a gRPC call is mapped to an HTTP URL, and then applying a Cilium HTTP-aware filter to allow public terminals to only invoke a subset of gRPC methods available on the door service. Each gRPC method is mapped to an HTTP POST call to a URL of the form /cloudcity.DoorManager/ Cilium v1.5 Documentationconsume (topic = “deathstar-plans”) from empire-backup. The full policy can be reviewed by opening the URL in the command below in a browser. Apply this Ka�a-aware network security policy using kubectl in on top of HTTP, this can be achieved easily by understanding how a gRPC call is mapped to an HTTP URL, and then applying a Cilium HTTP-aware filter to allow public terminals to only invoke a subset of gRPC methods available on the door service. Each gRPC method is mapped to an HTTP POST call to a URL of the form /cloudcity.DoorManager/- . As a result, the following CiliumNetworkPolicy 0 码力 | 740 页 | 12.52 MB | 1 年前3
 Cilium v1.11 Documentationsure to replace the variables with values from your environment: curl -sfL https://get.k3s.io | K3S_URL='https://${MASTER_IP}:6443' K3S_TOKEN=${NODE_TOKEN} sh - Should you encounter any issues during the privilege” security approach for communication between microservices. Note that path matches the exact url, if for example you want to allow anything under /v1/, you need to use a regular expression: path: consume (topic = “deathstar-plans”) from empire-backup. The full policy can be reviewed by opening the URL in the command below in a browser. Apply this Kafka-aware network security policy using kubectl in0 码力 | 1373 页 | 19.37 MB | 1 年前3 Cilium v1.11 Documentationsure to replace the variables with values from your environment: curl -sfL https://get.k3s.io | K3S_URL='https://${MASTER_IP}:6443' K3S_TOKEN=${NODE_TOKEN} sh - Should you encounter any issues during the privilege” security approach for communication between microservices. Note that path matches the exact url, if for example you want to allow anything under /v1/, you need to use a regular expression: path: consume (topic = “deathstar-plans”) from empire-backup. The full policy can be reviewed by opening the URL in the command below in a browser. Apply this Kafka-aware network security policy using kubectl in0 码力 | 1373 页 | 19.37 MB | 1 年前3
 Cilium v1.10 Documentationsure to replace the variables with values from your environment: curl -sfL https://get.k3s.io | K3S_URL='https://${MASTER_IP}:6443' K3S_TOKEN=${NODE_TOKEN} sh - Should you encounter any issues during the privilege” security approach for communication between microservices. Note that path matches the exact url, if for example you want to allow anything under /v1/, you need to use a regular expression: path: consume (topic = “deathstar-plans”) from empire-backup. The full policy can be reviewed by opening the URL in the command below in a browser. Apply this Kafka-aware network security policy using kubectl in0 码力 | 1307 页 | 19.26 MB | 1 年前3 Cilium v1.10 Documentationsure to replace the variables with values from your environment: curl -sfL https://get.k3s.io | K3S_URL='https://${MASTER_IP}:6443' K3S_TOKEN=${NODE_TOKEN} sh - Should you encounter any issues during the privilege” security approach for communication between microservices. Note that path matches the exact url, if for example you want to allow anything under /v1/, you need to use a regular expression: path: consume (topic = “deathstar-plans”) from empire-backup. The full policy can be reviewed by opening the URL in the command below in a browser. Apply this Kafka-aware network security policy using kubectl in0 码力 | 1307 页 | 19.26 MB | 1 年前3
 Cilium v1.6 Documentationconsume (topic = “deathstar-plans”) from empire-backup. The full policy can be reviewed by opening the URL in the command below in a browser. Apply this Kafka-aware network security policy using kubectl in on top of HTTP, this can be achieved easily by understanding how a gRPC call is mapped to an HTTP URL, and then applying a Cilium HTTP-aware filter to allow public terminals to only invoke a subset of gRPC methods available on the door service. Each gRPC method is mapped to an HTTP POST call to a URL of the form /cloudcity.DoorManager/ Cilium v1.6 Documentationconsume (topic = “deathstar-plans”) from empire-backup. The full policy can be reviewed by opening the URL in the command below in a browser. Apply this Kafka-aware network security policy using kubectl in on top of HTTP, this can be achieved easily by understanding how a gRPC call is mapped to an HTTP URL, and then applying a Cilium HTTP-aware filter to allow public terminals to only invoke a subset of gRPC methods available on the door service. Each gRPC method is mapped to an HTTP POST call to a URL of the form /cloudcity.DoorManager/- . As a result, the following CiliumNetworkPolicy rule 0 码力 | 734 页 | 11.45 MB | 1 年前3
 Cilium v1.7 Documentationvalues from your environment: curl -sfL https://get.k3s.io | INSTALL_K3S_EXEC='--no-flannel' K3S_URL='https://${MASTER_IP}:6443' K3S_TOKEN=${NODE_TOKEN} Should you encounter any issues during the installation consume (topic = “deathstar-plans”) from empire-backup. The full policy can be reviewed by opening the URL in the command below in a browser. Apply this Kafka-aware network security policy using kubectl in on top of HTTP, this can be achieved easily by understanding how a gRPC call is mapped to an HTTP URL, and then applying a Cilium HTTP-aware filter to allow public terminals to only invoke a subset of0 码力 | 885 页 | 12.41 MB | 1 年前3 Cilium v1.7 Documentationvalues from your environment: curl -sfL https://get.k3s.io | INSTALL_K3S_EXEC='--no-flannel' K3S_URL='https://${MASTER_IP}:6443' K3S_TOKEN=${NODE_TOKEN} Should you encounter any issues during the installation consume (topic = “deathstar-plans”) from empire-backup. The full policy can be reviewed by opening the URL in the command below in a browser. Apply this Kafka-aware network security policy using kubectl in on top of HTTP, this can be achieved easily by understanding how a gRPC call is mapped to an HTTP URL, and then applying a Cilium HTTP-aware filter to allow public terminals to only invoke a subset of0 码力 | 885 页 | 12.41 MB | 1 年前3
 Cilium v1.9 Documentationsure to replace the variables with values from your environment: curl -sfL https://get.k3s.io | K3S_URL='https://${MASTER_IP}:6443' K3S_TOKEN=${NODE_TOKEN} sh - Should you encounter any issues during the privilege” security approach for communication between microservices. Note that path matches the exact url, if for example you want to allow anything under /v1/, you need to use a regular expression: path: consume (topic = “deathstar-plans”) from empire-backup. The full policy can be reviewed by opening the URL in the command below in a browser. Apply this Kafka-aware network security policy using kubectl in0 码力 | 1263 页 | 18.62 MB | 1 年前3 Cilium v1.9 Documentationsure to replace the variables with values from your environment: curl -sfL https://get.k3s.io | K3S_URL='https://${MASTER_IP}:6443' K3S_TOKEN=${NODE_TOKEN} sh - Should you encounter any issues during the privilege” security approach for communication between microservices. Note that path matches the exact url, if for example you want to allow anything under /v1/, you need to use a regular expression: path: consume (topic = “deathstar-plans”) from empire-backup. The full policy can be reviewed by opening the URL in the command below in a browser. Apply this Kafka-aware network security policy using kubectl in0 码力 | 1263 页 | 18.62 MB | 1 年前3
 Cilium v1.8 Documentationenvironment: curl -sfL https://get.k3s.io | INSTALL_K3S_EXEC='--disable-network- policy --no-flannel' K3S_URL='https://${MASTER_IP}:6443' K3S_TOKEN=${NODE_TOKEN} sh - Should you encounter any issues during the consume (topic = “deathstar-plans”) from empire-backup. The full policy can be reviewed by opening the URL in the command below in a browser. Apply this Kafka-aware network security policy using kubectl in on top of HTTP, this can be achieved easily by understanding how a gRPC call is mapped to an HTTP URL, and then applying a Cilium HTTP-aware filter to allow public terminals to only invoke a subset of0 码力 | 1124 页 | 21.33 MB | 1 年前3 Cilium v1.8 Documentationenvironment: curl -sfL https://get.k3s.io | INSTALL_K3S_EXEC='--disable-network- policy --no-flannel' K3S_URL='https://${MASTER_IP}:6443' K3S_TOKEN=${NODE_TOKEN} sh - Should you encounter any issues during the consume (topic = “deathstar-plans”) from empire-backup. The full policy can be reviewed by opening the URL in the command below in a browser. Apply this Kafka-aware network security policy using kubectl in on top of HTTP, this can be achieved easily by understanding how a gRPC call is mapped to an HTTP URL, and then applying a Cilium HTTP-aware filter to allow public terminals to only invoke a subset of0 码力 | 1124 页 | 21.33 MB | 1 年前3
共 7 条
- 1














