Cilium v1.6 Documentationdemand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination In order for the entire system to come up, the following components have to be running at the same time: kube-dns or coredns cilium-xxx cilium-etcd-operator etcd-operator etcd-xxx All timeouts are configured CrashLoopBackoff, bootstrapping can be expedited by restarting the pods to reset the CrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 Documentationdemand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination Cluster Mesh With Kind we can simulate Cluster Mesh in a sandbox too. Kind Configuration This time we need to create (2) config.yaml, one for each kubernetes cluster. We will explicitly configure their In order for the entire system to come up, the following components have to be running at the same time: kube-dns or coredns cilium-xxx cilium-etcd-operator etcd-operator etcd-xxx All timeouts are configured0 码力 | 885 页 | 12.41 MB | 1 年前3
Linux就该这么学 第2版系统安装所需信息的集合之处, 如图 1-34 所示(需要说明的是,在采用虚拟机安装时,该图就是这个样子,而非作者截图不 全)。该界面包含如下内容:Keyboard、Language Support、Time & Date、Installation Source、 Software Selection、Installation Destination、KDUMP、Network & Host Name、SECURITY 的 Keyboard 和 Language Support 分别指的是键盘类型和语言支持,这两项默认都是英文的,不 51 用修改(除非想换成中文界面)。 我们首先单击 Time & Date 按钮,设置系统的时区和时间。在地图上单击中国境内即可 显示出上海的当前时间,确认后单击左上角的 Done 按钮。 图 1-34 中的 Installation Source 时间的早晚,即数字越大,越靠近当前时间。该参数的使用方式以及显示结果如下所示: [root@linuxprobe~]# date "+%j" 306 timedatectl 命令用于设置系统的时间,英文全称为“time date control”,语法格式为 “timedatectl [参数]”。 发现电脑时间跟实际时间不符?如果只差几分钟的话,我们可以直接调整。但是,如果 差几个小时,那么除了调0 码力 | 552 页 | 22.25 MB | 1 年前3
Cilium v1.5 Documentationcluster You should see something like this: [ℹ] using region us-west-2 [ℹ] setting availability zones to [us-west-2b us-west-2a us-west-2c] [ℹ] subnets for us-west-2b - public:192.168.0.0/19 private:192 Cluster Note that you will need to specify the --master-zones and --zones for crea�ng the master and worker nodes. The number of master zones should be * odd (1, 3, …) for HA. For simplicity, you can --master-zones eu-west-1a,eu-west-1b,eu-west-1c : The 3 zones ensure the HA of master nodes, each belonging in a different Availability zones. --zones eu-west-1a,eu-west-1b,eu-west-1c : Zones where the0 码力 | 740 页 | 12.52 MB | 1 年前3
CentOS 7 操作命令-基础篇1.2Asia/Shanghai //设置时区为上海时区 #timedatectl set-ntp false //不使用 ntp,需要用的话把 false 改为 true #timedatectl set-time '2019-12-11 17:01:00' //设置日期及时间(不用 ntp 时) #timedatectl set-local-rtc 1 //将硬件时钟设为本地时间(这里指上海时区的)或者 //在该文件里添加 1 行(配置有点长,这里分 2 行写了 //配置的时候写成 1 行) auth required pam_tally2.so deny=3 unlock_time=300 even_deny_root root_unlock_time=360 保存即可 //deny 的次数要小于或等于 sshd 配置文件里的 MaxAuthTries 次数 #pam_tally2 //查看用户输错密码达到 #firewall-cmd --get-zones //显示预定义的区域 #firewall-cmd --get-default-zone //显示默认区域 #firewall-cmd --list-all //显示默认区域的所有规则 #firewall-cmd --set-default-zone=区域名 //设置接口的默认区域 #firewall-cmd --get-active-zones //显示已激活的所有区域0 码力 | 115 页 | 8.68 MB | 1 年前3
Cilium v1.8 Documentationdemand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination Cluster Mesh With Kind we can simulate Cluster Mesh in a sandbox too. Kind Configuration This time we need to create (2) config.yaml, one for each kubernetes cluster. We will explicitly configure their In order for the entire system to come up, the following components have to be running at the same time: kube-dns or coredns cilium-xxx cilium-operator-xxx cilium-etcd-operator etcd-operator cilium-etcd-xxx0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.9 Documentationdemand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination efficient service-to-backend translation right in the Linux kernel’s socket layer (e.g. at TCP connect time) such that per-packet NAT operations overhead can be avoided in lower layers. Bandwidth Management Management Cilium implements bandwidth management through efficient EDT-based (Earliest Departure Time) rate-limiting with eBPF for container traffic that is egressing a node. This allows to significantly reduce0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.10 Documentationdemand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination efficient service-to-backend translation right in the Linux kernel’s socket layer (e.g. at TCP connect time) such that per-packet NAT operations overhead can be avoided in lower layers. Bandwidth Management Management Cilium implements bandwidth management through efficient EDT-based (Earliest Departure Time) rate-limiting with eBPF for container traffic that is egressing a node. This allows to significantly reduce0 码力 | 1307 页 | 19.26 MB | 1 年前3
ubuntu server guidedhcp-server Install isc-dhcp-server 3 use-timedatectl-and-timesyncd Synchronise time 3 how-to-serve-the-network-time-protocol-with-chrony Serve the NTP 3 openvswitch-dpdk Use Open vSwitch with DPDK key concepts 3 network-configuration Configuring networks 3 network-dhcp About DHCP 3 network-ntp Time synchronisation 3 network-dpdk The DPDK library 2 Cryptography 3 introduction-to-crypto-libraries If this is not the first time an operating system has been installed on your computer, it is likely you will need to re-partition your disk to make room for Ubuntu. Any time you partition your disk, you0 码力 | 486 页 | 3.33 MB | 1 年前3
Cilium v1.11 Documentationdemand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination efficient service-to-backend translation right in the Linux kernel’s socket layer (e.g. at TCP connect time) such that per-packet NAT operations overhead can be avoided in lower layers. Bandwidth Management Management Cilium implements bandwidth management through efficient EDT-based (Earliest Departure Time) rate-limiting with eBPF for container traffic that is egressing a node. This allows to significantly reduce0 码力 | 1373 页 | 19.37 MB | 1 年前3
共 166 条
- 1
- 2
- 3
- 4
- 5
- 6
- 17













