OpenShift Container Platform 4.6 网络of their respective owners. 摘要 摘要 本文档提供有关配置和管理 OpenShift Container Platform 集群网络的说明,其中包括 DNS、 Ingress 和 Pod 网络。 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 了解网 了解网络 络 1.1. OPENSHIFT CONTAINER PLATFORM DNS 1.2. OPENSHIFT CONTAINER PLATFORM INGRESS OPERATOR 1.2.1. 路由和 Ingress 的比较 第 第 2 章 章 访问 访问主机 主机 2.1. 访问安装程序置备的基础架构集群中 AMAZON WEB SERVICES 上的主机 第 第 3 章 章 章 网 网络 络 OPERATOR 概述 概述 3.1. CLUSTER NETWORK OPERATOR 3.2. DNS OPERATOR 3.3. INGRESS OPERATOR 第 第 4 章 章 OPENSHIFT CONTAINER PLATFORM 中的 中的 CLUSTER NETWORK OPERATOR 4.1. CLUSTER NETWORK OPERATOR 40 码力 | 256 页 | 2.78 MB | 1 年前3
OpenShift Container Platform 4.13 网络of their respective owners. 摘要 摘要 本文档提供有关配置和管理 OpenShift Container Platform 集群网络的说明,其中包括 DNS、 Ingress 和 Pod 网络。 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 第 第 2 章 章 了解网 了解网络 络 2.1. OPENSHIFT CONTAINER PLATFORM DNS 2.2. OPENSHIFT CONTAINER PLATFORM INGRESS OPERATOR 2.3. OPENSHIFT CONTAINER PLATFORM 网络的常见术语表 第 第 3 章 章 访问 访问主机 主机 3.1. 访问安装程序置备的基础架构集群中 网络 络 OPERATOR 概述 概述 4.1. CLUSTER NETWORK OPERATOR 4.2. DNS OPERATOR 4.3. INGRESS OPERATOR 4.4. 外部 DNS OPERATOR 4.5. INGRESS NODE FIREWALL OPERATOR 4.6. NETWORK OBSERVABILITY OPERATOR 第 第 5 章 章 OPENSHIFT0 码力 | 697 页 | 7.55 MB | 1 年前3
OpenShift Container Platform 4.9 网络of their respective owners. 摘要 摘要 本文档提供有关配置和管理 OpenShift Container Platform 集群网络的说明,其中包括 DNS、 Ingress 和 Pod 网络。 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 第 第 1 章 章 了解网 了解网络 络 1.1. OPENSHIFT CONTAINER PLATFORM DNS 1.2. OPENSHIFT CONTAINER PLATFORM INGRESS OPERATOR 1.3. OPENSHIFT CONTAINER PLATFORM 网络的常见术语表 第 第 2 章 章 访问 访问主机 主机 2.1. 访问安装程序置备的基础架构集群中 SERVICES 上的主机 第 第 3 章 章 网 网络 络 OPERATOR 概述 概述 3.1. CLUSTER NETWORK OPERATOR 3.2. DNS OPERATOR 3.3. INGRESS OPERATOR 第 第 4 章 章 OPENSHIFT CONTAINER PLATFORM 中的 中的 CLUSTER NETWORK OPERATOR 4.1. CLUSTER NETWORK0 码力 | 388 页 | 4.04 MB | 1 年前3
Cilium v1.5 Documentationto secure access to and from external services, tradi�onal CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from applica�on containers to par�cular [h�ps://kubernetes.io/docs/concepts/overview/working-with- objects/labels/], Ingress [h�ps://kubernetes.io/docs/concepts/services- networking/ingress/], Service [h�ps://kubernetes.io/docs/concepts/services- networking/service/] 3m19s $ kubectl -n kube-system exec cilium-1c2cz -- cilium endpoint list ENDPOINT POLICY (ingress) POLICY (egress) IDENTITY LABELS (source: ENFORCEMENT ENFORCEMENT 1080 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.6 Documentationto secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular [https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/], Ingress [https://kubernetes.io/docs/concepts/services-networking/ingress/], Service [https://kubernetes.io/docs/concepts/services-networking/service/] 3m19s $ kubectl -n kube-system exec cilium-1c2cz -- cilium endpoint list ENDPOINT POLICY (ingress) POLICY (egress) IDENTITY LABELS (source:key[=value]) IPv6 IPv40 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 Documentationto secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular [https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/], Ingress [https://kubernetes.io/docs/concepts/services-networking/ingress/], Service [https://kubernetes.io/docs/concepts/services-networking/service/] 3m19s $ kubectl -n kube-system exec cilium-1c2cz -- cilium endpoint list ENDPOINT POLICY (ingress) POLICY (egress) IDENTITY LABELS (source:key[=value]) IPv6 IPv40 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.8 Documentationto secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular [https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/], Ingress [https://kubernetes.io/docs/concepts/services-networking/ingress/], Service [https://kubernetes.io/docs/concepts/services-networking/service/] Values=${infraID}-master-sg" | jq -r '.SecurityGroups[0].GroupId')" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp,FromPort=8472,ToPort=8472,UserIdGroupPairs=0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.9 Documentationto secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular [https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/], Ingress [https://kubernetes.io/docs/concepts/services-networking/ingress/], Service [https://kubernetes.io/docs/concepts/services-networking/service/] Values=${infraID}-master-sg" | jq -r '.SecurityGroups[0].GroupId')" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp,FromPort=8472,ToPort=8472,UserIdGroupPairs=0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.10 Documentationto secure access to and from external services, traditional CIDR based security policies for both ingress and egress are supported. This allows to limit access to and from application containers to particular Values=${infraID}-master-sg" | jq -r '.SecurityGroups[0].GroupId')" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp,FromPort=8472,ToPort=8472,UserIdGroupPairs= [{GroupId=${worker_sg}},{GroupId=${master_sg}}]" \ --group-id "${worker_sg}" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp,FromPort=8472,ToPort=8472,UserIdGroupPairs=0 码力 | 1307 页 | 19.26 MB | 1 年前3
Kubernetes开源书 - 周立20-管理容器的计算资源 21-Kubernetes资源分配 22-将Pod分配到Node 23-容忍与污点 24-Secret 25-Pod优先级和抢占 26-Service 27-Ingress Resources 28-动态⽔平扩容 29-实战:使⽤K8s编排Wordpress博客 2 简介 Kubernetes开源书。不啰嗦了,JUST READ IT. GitHub地址:https://github loyments、HorizontalPodAutoscalers、Ingress、Jobs和ReplicaSets都被启⽤。可通 过在apiserver上设置 --runtime-config 来启⽤其他扩展资源。 --runtime-config 接受逗号分隔值。 例如:要禁⽤ Deployments和Ingress,可设置 --runtime-config=extensions/v 1beta1/deployments=false,extensions/v1beta1/ingress=false 05-Kubernetes API 19 原⽂ https://kubernetes.io/docs/concepts/overview/kubernetes-api/ 05-Kubernetes API 20 理解K8s对象 这个⻚⾯描述了Kubernetes对象在Kubernetes0 码力 | 135 页 | 21.02 MB | 1 年前3
共 317 条
- 1
- 2
- 3
- 4
- 5
- 6
- 32













