Cilium v1.10 Documentationpods for more details), however this is not an option on AKS clusters: It is not possible to assign custom node taints such as node.cilium.io/agent-not-ready=true:NoExecute to system node pools, cf. Azure/AKS#2578 pool created for new AKS clusters, cf. Azure/AKS#1402 [https://github.com/Azure/AKS/issues/1402]. Custom node taints on user node pools cannot be properly managed at will anymore, cf. Azure/AKS#2934 [https://github not have a standard and foolproof alternative to recommend, hence the only solution is to craft a custom mechanism that will work in your environment to handle this scenario when adding new nodes to AKS0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 Documentationpods for more details), however this is not an option on AKS clusters: It is not possible to assign custom node taints such as node.cilium.io/agent-not-ready=true:NoExecute to system node pools, cf. Azure/AKS#2578 pool created for new AKS clusters, cf. Azure/AKS#1402 [https://github.com/Azure/AKS/issues/1402]. Custom node taints on user node pools cannot be properly managed at will anymore, cf. Azure/AKS#2934 [https://github not have a standard and foolproof alternative to recommend, hence the only solution is to craft a custom mechanism that will work in your environment to handle this scenario when adding new nodes to AKS0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.9 Documentationinstallation: # Set this to your installed Cilium version export CILIUM_VERSION=1.9.1 # Please set any custom Helm values you may need for Cilium, # such as for example `--set operator.replicas=1` on single-cluster connectivity provided by Cilium and NetworkPolicy applies to them: kubectl get pods --all-namespaces -o custom- columns=NAMESPACE:.metadata.namespace,NAME:.metadata.name,HOSTNETWORK:. spec.hostNetwork --no-headers=true installation: # Set this to your installed Cilium version export CILIUM_VERSION=1.9.1 # Please set any custom Helm values you may need for Cilium, # such as for example `--set operator.replicas=1` on single-cluster0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.6 Documentationquick installation procedure. The default settings will store all required state using Kubernetes custom resource definitions (CRDs). This is the simplest installation method as it only depends on Kubernetes propagation caused by Kubernetes events. If you do not want Cilium to store state in Kubernetes custom resources (CRDs). Requirements Make sure your Kubernetes environment is meeting the requirements: Kubernetes performed for kube- dns $ kubectl delete pods -n kube-system $(kubectl get pods -n kube-system -o custom-columns=NAME:.metadata.name,HOSTNETWORK:.spec.hostNetwork -- no-headers=true | grep '' | awk 0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.8 Documentationconnectivity provided by Cilium and NetworkPolicy applies to them: kubectl get pods --all-namespaces -o custom- columns=NAMESPACE:.metadata.namespace,NAME:.metadata.name,HOSTNETWORK:. spec.hostNetwork --no-headers=true quick installation procedure. The default settings will store all required state using Kubernetes custom resource definitions (CRDs). This is the simplest installation method as it only depends on Kubernetes propagation caused by Kubernetes events. If you do not want Cilium to store state in Kubernetes custom resources (CRDs). Requirements Make sure your Kubernetes environment is meeting the requirements: Kubernetes0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.7 Documentationconnectivity provided by Cilium and NetworkPolicy applies to them: kubectl get pods --all-namespaces -o custom- columns=NAMESPACE:.metadata.namespace,NAME:.metadata.name,HOSTNETWORK:. spec.hostNetwork --no-headers=true quick installation procedure. The default settings will store all required state using Kubernetes custom resource definitions (CRDs). This is the simplest installation method as it only depends on Kubernetes propagation caused by Kubernetes events. If you do not want Cilium to store state in Kubernetes custom resources (CRDs). Requirements Make sure your Kubernetes environment is meeting the requirements: Kubernetes0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.5 Documentationwith Cilium L7 security policies, we are able to permit �efighter to access only the required API resources on deathstar, thereby implemen�ng a “least privilege” security approach for communica�on between from a network failure, because Cilium operates at the API- layer, it can explicitly reply with an custom HTTP 403 Unauthorized error, indica�ng that the request was inten�onally denied for security reasons see, with Cilium L7 security policies, we are able to permit app2 to access only the required API resources on app1, thereby implemen�ng a “least privilege” security approach for communica�on between microservices0 码力 | 740 页 | 12.52 MB | 1 年前3
共 7 条
- 1













