Getting Started Using MicroK8s Install microk8s Next steps Getting Started Using MicroK8s This guide uses microk8s to demonstrate deployment and operation of Cilium in a sing...
Further Reading Related Material Presentations Podcasts Community blog posts Further Reading Related Material BPF for security—and chaos—in Kubernetes k8s-snowflake: Conf...
Further Reading Related Material Presentations Podcasts Community blog posts Further Reading Related Material BPF for security—and chaos—in Kubernetes k8s-snowflake: Co...
Concepts Deployment Networking For Existing Pods Default Ingress Allow from Local Host Concepts Deployment The configuration of a standard Cilium Kubernetes deployment consi...
API Reference Introduction How to access the API CLI Client Example Golang Package Example Compatibility Guarantees API Reference API Reference Introduction The Cilium ...
Feature Release Process On Freeze date For the final release Feature Release Process This document describes the process for creating a major or minor feature release of Cili...
CNI Chaining CNI Chaining CNI chaining allows to use Cilium in combination with other CNI plugins. With Cilium CNI chaining, the base network connectivity and IP address manag...
How to Secure a Cassandra Database Setup Cilium Deploy the Demo Application Step 3: Test Basic Cassandra Access The Danger of a Compromised Cassandra Client Securing Access to ...
Securing a Kafka cluster Setup Cilium Deploy the Demo Application Setup Client Terminals Test Basic Kafka Produce & Consume The Danger of a Compromised Kafka Client Securing A...
Endpoint Lifecycle Init Identity Endpoint Lifecycle This section specifies the lifecycle of Cilium endpoints. Every endpoint in Cilium is in one of the following states: re...