Cilium v1.7 Documentationalternative certificates for external destinations. This model requires each client workload to also trust this new certificate, otherwise the client’s TLS library will reject the connection as invalid. In Ensure that all clients where TLS inspection is have the CA certificate installed so that they will trust all certificates signed by that CA. 5. Given that Cilium will be terminating the initial TLS connection creating a new TLS connection to the destination, Cilium must be told the set of CAs that it should trust when validating the new TLS connection to the destination service. Note In a non-demo environment0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.8 Documentationalternative certificates for external destinations. This model requires each client workload to also trust this new certificate, otherwise the client’s TLS library will reject the connection as invalid. In Ensure that all clients where TLS inspection is have the CA certificate installed so that they will trust all certificates signed by that CA. 5. Given that Cilium will be terminating the initial TLS connection creating a new TLS connection to the destination, Cilium must be told the set of CAs that it should trust when validating the new TLS connection to the destination service. Note In a non-demo environment0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.11 Documentationalternative certificates for external destinations. This model requires each client workload to also trust this new certificate, otherwise the client’s TLS library will reject the connection as invalid. In Ensure that all clients where TLS inspection is have the CA certificate installed so that they will trust all certificates signed by that CA. 5. Given that Cilium will be terminating the initial TLS connection creating a new TLS connection to the destination, Cilium must be told the set of CAs that it should trust when validating the new TLS connection to the destination service. Note In a non-demo environment0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.10 Documentationalternative certificates for external destinations. This model requires each client workload to also trust this new certificate, otherwise the client’s TLS library will reject the connection as invalid. In Ensure that all clients where TLS inspection is have the CA certificate installed so that they will trust all certificates signed by that CA. 5. Given that Cilium will be terminating the initial TLS connection creating a new TLS connection to the destination, Cilium must be told the set of CAs that it should trust when validating the new TLS connection to the destination service. Note In a non-demo environment0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.9 Documentationalternative certificates for external destinations. This model requires each client workload to also trust this new certificate, otherwise the client’s TLS library will reject the connection as invalid. In Ensure that all clients where TLS inspection is have the CA certificate installed so that they will trust all certificates signed by that CA. 5. Given that Cilium will be terminating the initial TLS connection creating a new TLS connection to the destination, Cilium must be told the set of CAs that it should trust when validating the new TLS connection to the destination service. Note In a non-demo environment0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.6 Documentationmonotonically increasing every re-key with a rollover from 16 to 0. The cilium agent will default to KEYID of zero if its not specified in the secret. Troubleshooting Make sure that the Cilium pods have kvstore related resources that produce working binaries of Cilium. As such it represents a significant level of trust in an individual’s commitment to working with other committers and the community at large for the benefit of the project. It can not be granted lightly and, in the worst case, must be revocable if the trust placed in an individual was inappropriate. This document suggests guidelines for granting and revoking0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.5 Documentationrelated resources that produce working binaries of Cilium. As such it represents a significant level of trust in an individual’s commitment to working with other commi�ers and the community at large for the benefit benefit of the project. It can not be granted lightly and, in the worst case, must be revocable if the trust placed in an individual was inappropriate. This document suggests guidelines for gran�ng and revoking granted commit access the candidate must receive yes votes from a majority of the exis�ng commi�ers and zero no votes. Since a no vote is effec�vely a veto of the candidate it should be accompanied by a reason0 码力 | 740 页 | 12.52 MB | 1 年前3
共 7 条
- 1













