Тёмный
Project Calico
Project Calico
Project Calico
Подписаться
Brought to you by Tigera, the creator of Calico Open Source. Tigera also provides commercial solutions, Calico Cloud and Calico Enterprise, which build on Calico Open Source to provide additional security and observability capabilities for containers and Kubernetes.

Project Calico is an open-source project with an active development and user community. Calico Open Source was born out of this project and has grown to be the most widely adopted solution for container networking and security, powering 8M+ nodes daily across 166 countries.

Free and open source, Calico Open Source is designed to simplify, scale, and secure container and Kubernetes networks. Invented and maintained by Tigera.
Calico Community Meeting June 2024
30:12
День назад
Calico Community Meeting May 2024
26:23
День назад
Calico Community Meeting April 2024
16:41
День назад
Calico Community Meeting March 2024
24:19
День назад
Calico Community Meeting July 2023
37:56
День назад
Calico Community Meeting August 2023
13:29
День назад
Calico Community Meeting June 2023
14:18
День назад
Calico Community Meeting May 2023
27:16
День назад
Solving Calico's Scalability Problems
5:06
Месяц назад
eBPF Connect Time Load Balancer
1:29
2 месяца назад
Integrating Service Meshes with eBPF CTLB
1:41
2 месяца назад
What is eBPF Direct Service Return (DSR)
1:52
2 месяца назад
Комментарии
@user-dh2wg9mf5u
@user-dh2wg9mf5u 14 дней назад
Thanks, I'm looking to achieve completely isolated namespaces so that if someone gains access to a pod, they can only see pods within the same namespace. I've already tried implementing network policies, but they didn't provide sufficient isolation (with arp-scan I can see all IPs). Could you please share any additional suggestions or best practices for achieving this level of namespace isolation effectively? Thank you for your help!
@Reza-Tigera
@Reza-Tigera 8 дней назад
If you head over to project calico's documentation website there are examples how to implement a default deny. You could also implement host endpoint policies to secure both namespace and non-namespaced resources within your cluster and establish full isolation.
@KrishnaKumar-ud9cj
@KrishnaKumar-ud9cj 22 дня назад
Very well explained underlying details this is the way I am looking for it 👍
@GauravGupta-vo4ii
@GauravGupta-vo4ii 2 месяца назад
Gooooddddddddddddaaaaa
@sujithadr
@sujithadr 3 месяца назад
Nicely explained.
@shawnkim9047
@shawnkim9047 3 месяца назад
'promo sm' 😕
@RuairiODonnellFOTO
@RuairiODonnellFOTO 3 года назад
The data/control planes can be outside a Kubernetes cluster?
@ProjectCalico
@ProjectCalico 3 года назад
Speaking broadly, generally as long as the control plane is reachable from the data plane it will work - however depending on the exact technologies bandwidth/latency/reliability considerations are important. Come and chat with us at slack.projectcalico.org/ if you have a particular case in mind!
@RuairiODonnellFOTO
@RuairiODonnellFOTO 3 года назад
Sounds good! 💙