You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/usage/usage.md
+26-1Lines changed: 26 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,9 +8,11 @@ In this document we are describing how this configuration looks like for Cilium
8
8
9
9
Hubble is a fully distributed networking and security observability platform build on top of Cilium and BPF. It is optional and is deployed to the cluster when enabled in the `NetworkConfig`.
@@ -40,17 +42,20 @@ The `bpfSocketLBHostnsOnly.enabled` field describes whether socket LB will be sk
40
42
Setting the field `cni.exclusive` to `false` might be useful when additional plugins, such as Istio or Linkerd, wish to chain after Cilium. This action disables the default behavior of Cilium, which is to overwrite changes to the CNI configuration file.
41
43
42
44
The `egressGateway.enabled` field describes whether egress gateways are enabled or not (default). To use this feature kube-proxy must be disabled. This can be done with the following configuration in the Shoot:
45
+
43
46
```yaml
44
47
spec:
45
48
kubernetes:
46
49
kubeProxy:
47
50
enabled: false
48
51
```
52
+
49
53
The egress gateway feature is only supported in gardener with an overlay network (shoot.spec.networking.providerConfig.overlay.enabled: true) at the moment. This is due to the reason that bpf masquerading is required for the egress gateway feature. Once the overlay network is enabled `bpf.masquerade` is set to `true` in the cilium configmap.
50
54
51
55
The `snatToUpstreamDNS.enabled` field describes whether the traffic to the upstream dns server should be masqueraded or not (default). This is needed on some infrastructures where traffic to the dns server with the pod CIDR range is blocked.
52
56
53
57
The `policyAuditMode` field describes whether the [policy audit mode](https://docs.cilium.io/en/latest/security/policy-creation/#enable-policy-audit-mode-entire-daemon) is enabled for the entire Cilium Daemon or not (default). When enabled, this will log all dropped packets due to policy enforcement. It is useful for testing your network policies before enforcing them. Policy audit mode can be enabled on the shoot by adding the following configuration:
> :warning: When you have enabled the policy audit mode, network policies are NOT enforced but only observed. This means that traffic that would have been denied by a network policy is allowed, but logged as `AUDIT` in Hubble.
61
66
67
+
### Transparent Encryption
68
+
69
+
It is possible to enable transparent encryption of Cilium-managed host traffic and traffic between Cilium-managed endpoint.
70
+
Currently only [Wireguard encryption](https://docs.cilium.io/en/stable/security/network/encryption-wireguard/) is supported.
71
+
72
+
An example cilium networking configuration could look like this:
You can enable the feature [`node-to-node encryption`](https://docs.cilium.io/en/stable/security/network/encryption-wireguard/#node-to-node-encryption-beta) of cilium using the `nodeToNodeEnabled` field.
83
+
84
+
Find the API documentation for encryption [here](/hack/api-reference/cilium.md#cilium.networking.extensions.gardener.cloud/v1alpha1.Encryption)
85
+
62
86
## Example `Shoot` manifest
63
87
64
88
Please find below an example `Shoot` manifest with cilium networking configuration:
@@ -99,4 +123,5 @@ spec:
99
123
...
100
124
```
101
125
102
-
This setup prevents unnecessary node spin-ups and reduces the compute costs in single-node clusters.
126
+
This setup prevents unnecessary node spin-ups and reduces the compute costs in single-node clusters.
0 commit comments