技能 linkerd-patterns
🔗

linkerd-patterns

低風險 ⚙️ 外部命令🌐 網路存取

Deploy Linkerd Service Mesh

也可從以下取得: wshobson

This skill provides production-ready patterns for deploying and configuring Linkerd service mesh on Kubernetes, enabling automatic mTLS, traffic management, and zero-trust security policies.

支援: Claude Codex Code(CC)
📊 71 充足
1

下載技能 ZIP

2

在 Claude 中上傳

前往 設定 → 功能 → 技能 → 上傳技能

3

開啟並開始使用

測試它

正在使用「linkerd-patterns」。 Install Linkerd on my Kubernetes cluster

預期結果:

Here is how to install Linkerd:

1. Install the Linkerd CLI:
curl --proto '=https' --tlsv1.2 -sSfL https://run.linkerd.io/install | sh

2. Validate your cluster:
linkerd check --pre

3. Install CRDs:
linkerd install --crds | kubectl apply -f -

4. Install control plane:
linkerd install | kubectl apply -f -

5. Verify installation:
linkerd check

正在使用「linkerd-patterns」。 Create a canary deployment setup

預期結果:

Here is a TrafficSplit configuration for canary deployment:

```yaml
apiVersion: split.smi-spec.io/v1alpha1
kind: TrafficSplit
metadata:
name: my-service-canary
namespace: my-namespace
spec:
service: my-service
backends:
- service: my-service-stable
weight: 900m
- service: my-service-canary
weight: 100m
```

This routes 90% to stable and 10% to canary.

正在使用「linkerd-patterns」。 How do I enable automatic retries?

預期結果:

Create a ServiceProfile with retry configuration:

```yaml
apiVersion: linkerd.io/v1alpha2
kind: ServiceProfile
metadata:
name: my-service.my-namespace.svc.cluster.local
spec:
routes:
- name: GET /api/users
condition:
method: GET
pathRegex: /api/users
isRetryable: true
retryBudget:
retryRatio: 0.2
minRetriesPerSecond: 10
ttl: 10s
```

The retryBudget allows up to 20% additional traffic from retries.

安全審計

低風險
v1 • 2/25/2026

This skill provides Linkerd service mesh documentation and YAML templates. The static findings are false positives: shell commands are example documentation blocks, URLs point to official Linkerd resources, and the pipe-to-shell pattern is the standard installation method from Linkerd's official docs. No malicious intent detected.

1
已掃描檔案
324
分析行數
5
發現項
1
審計總數
中風險問題 (2)
Shell Commands in Documentation
The skill contains shell command examples (e.g., 'linkerd install', 'kubectl apply'). These are documentation/templates, not executable code. No user input is processed or executed.
External URLs in Documentation
The skill references external URLs including official Linkerd installation script and documentation links. These are legitimate resources from the official Linkerd project.
低風險問題 (1)
Example IP CIDR Range
A sample CIDR range (10.0.0.0/8) is used in a ServerAuthorization policy example. This is a standard private network range used in documentation.
審計者: claude

品質評分

38
架構
100
可維護性
87
內容
50
社群
78
安全
100
規範符合性

你能建構什麼

DevOps Engineer Setting Up Service Mesh

A DevOps engineer needs to secure microservice communications with automatic mTLS and implement traffic splitting for canary deployments.

Security Engineer Implementing Zero-Trust

A security engineer wants to enforce zero-trust network policies by restricting traffic between services using Linkerd's ServerAuthorization.

Platform Team Managing Multi-Cluster

A platform team needs to extend Linkerd across multiple Kubernetes clusters for high availability and disaster recovery.

試試這些提示

Basic Linkerd Installation
Install Linkerd on my Kubernetes cluster and verify the installation is working correctly.
Enable Automatic mTLS
Show me how to enable automatic mTLS for all pods in namespace 'my-app' and explain how Linkerd handles certificate rotation.
Configure Canary Deployment
Create a TrafficSplit configuration to route 10% of traffic to 'my-service-canary' and 90% to 'my-service-stable' for canary deployment.
Set Up Service Authorization
Create ServerAuthorization and Server resources to allow only the 'frontend' service account to access 'my-service' on port 8080 with mesh TLS.

最佳實務

  • Always run 'linkerd check' after any configuration change to verify correctness
  • Enable ServiceProfiles for all services to get per-route metrics and enable retries
  • Start with permissive policies and tighten gradually; use Linkerd's visibility to understand traffic patterns first

避免

  • Skipping the pre-installation check with 'linkerd check --pre'
  • Applying configurations without understanding the impact on existing traffic
  • Setting overly broad ServerAuthorization policies that defeat zero-trust goals

常見問題

What is Linkerd?
Linkerd is a service mesh for Kubernetes that provides automatic mTLS, traffic management, observability, and security policies for microservice communications.
Does Linkerd require code changes?
No, Linkerd works by injecting a proxy sidecar into pods. Most features work without any code changes to your applications.
How does automatic mTLS work?
Linkerd automatically issues and rotates TLS certificates for all pod-to-pod communications. Services authenticate each other using mutual TLS without any configuration.
Can I use Linkerd with ingress controllers?
Yes, Linkerd integrates with ingress controllers like NGINX and Traefik. You may need to mark the ingress as 'unauthenticated' in ServerAuthorization for external traffic.
What is a ServiceProfile?
A ServiceProfile is a Linkerd custom resource that defines per-route metrics, retries, timeouts, and traffic splits for a service. It enables advanced traffic management features.
How do I monitor Linkerd?
Install the Linkerd Viz extension for built-in dashboards. Use 'linkerd viz top' for live traffic views, 'linkerd viz stat' for metrics, and 'linkerd viz edges' for service dependencies.

開發者詳情

檔案結構

📄 SKILL.md