Cilium v1.5 Documentationthe Cilium-specific variant of Pilot to inject the Cilium network policy filters into each Is�o sidecar proxy: $ curl -s https://raw.githubusercontent.com/cilium/cilium/v1.5/examples/ku $ awk -f cilium-pilot plates/ > istio-cilium-helm/charts/pilot/templates/deployment.yaml Configure the Is�o’s sidecar injec�on to setup the transparent proxy mode (TPROXY) as required by Cilium’s proxy filters: $ sed nfigmap.yaml Modify the Is�o sidecar injec�on template to add an init container that waits un�l DNS works and to mount Cilium’s API Unix domain sockets into each sidecar to allow Cilium’s Envoy filters0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.10 Documentationintegration allows Cilium to enforce HTTP L7 network policies for mTLS protected traffic within the Istio sidecar proxies. Note that Istio can also be deployed without Cilium integration by running a standard version version of istioctl. In that case Cilium will enforce HTTP L7 policies outside of the Istio sidecar proxy, but that will only work if mTLS is not used. If you haven’t read the Introduction to Cilium & Helm. Without this option, when Cilium does service resolution via socket load balancing, Istio sidecar will be bypassed, resulting in loss of Istio features including encryption and telemetry. Step 2:0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.9 Documentationintegration allows Cilium to enforce HTTP L7 network policies for mTLS protected traffic within the Istio sidecar proxies. Note that Istio can also be deployed without Cilium integration by running a standard version version of istioctl. In that case Cilium will enforce HTTP L7 policies outside of the Istio sidecar proxy, but that will only work if mTLS is not used. If you haven’t read the Introduction to Cilium & /cilium-istioctl install -y Add a namespace label to instruct Istio to automatically inject Envoy sidecar proxies when you deploy your application later: kubectl label namespace default istio-injection=enabled0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.11 Documentationintegration allows Cilium to enforce HTTP L7 network policies for mTLS protected traffic within the Istio sidecar proxies. Note that Istio can also be deployed without Cilium integration by running a standard version version of istioctl. In that case Cilium will enforce HTTP L7 policies outside of the Istio sidecar proxy, but that will only work if mTLS is not used. If you haven’t read the Introduction to Cilium & Helm. Without this option, when Cilium does service resolution via socket load balancing, Istio sidecar will be bypassed, resulting in loss of Istio features including encryption and telemetry. Step 2:0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.6 Documentation/cilium-istioctl manifest apply -y Add a namespace label to instruct Istio to automatically inject Envoy sidecar proxies when you deploy your application later: kubectl label namespace default istio-injection=enabled traffic to the microservice, specific to each service version. To deploy the application with manual sidecar injection, run: for service in productpage-service productpage-v1 details-v1 reviews-v1; do possible, from previous daemon (default true) --sidecar-istio-proxy-image string Regular expression matching compatible Istio sidecar istio-proxy container image names (default "0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.8 Documentationintegration allows Cilium to enforce HTTP L7 network policies for mTLS protected traffic within the Istio sidecar proxies. Note that Istio can also be deployed without Cilium integration by running a standard version version of istioctl. In that case Cilium will enforce HTTP L7 policies outside of the Istio sidecar proxy, but that will only work if mTLS is not used. If you haven’t read the Introduction to Cilium & /cilium-istioctl install -y Add a namespace label to instruct Istio to automatically inject Envoy sidecar proxies when you deploy your application later: kubectl label namespace default istio-injection=enabled0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.7 Documentation/cilium-istioctl manifest apply -y Add a namespace label to instruct Istio to automatically inject Envoy sidecar proxies when you deploy your application later: kubectl label namespace default istio-injection=enabled traffic to the microservice, specific to each service version. To deploy the application with manual sidecar injection, run: for service in productpage-service productpage-v1 details-v1 reviews-v1; do possible, from previous daemon (default true) --sidecar-istio-proxy-image string Regular expression matching compatible Istio sidecar istio-proxy container image names (default "cilium/istio_proxy")0 码力 | 885 页 | 12.41 MB | 1 年前3
Spring Boot 2.0.6.RELEASE Reference Documentationmanagement.metrics.export.wavefront.api-token=YOUR_API_TOKEN Alternatively, you may use a Wavefront sidecar or an internal proxy set up in your environment that forwards metrics data to the Wavefront API host:0 码力 | 662 页 | 633.20 KB | 1 年前3
Spring Boot 2.0.5.RELEASE Reference Documentationmanagement.metrics.export.wavefront.api-token=YOUR_API_TOKEN Alternatively, you may use a Wavefront sidecar or an internal proxy set up in your environment that forwards metrics data to the Wavefront API host:0 码力 | 656 页 | 627.70 KB | 1 年前3
Spring Boot 2.0.4.RELEASE Reference Guidemanagement.metrics.export.wavefront.api-token=YOUR_API_TOKEN Alternatively, you may use a Wavefront sidecar or an internal proxy set up in your environment that forwards metrics data to the Wavefront API host:0 码力 | 655 页 | 627.24 KB | 1 年前3
共 24 条
- 1
- 2
- 3













