openEuler 21.03 技术白皮书radical memory, defragmentation, VMAP, and vmalloc significantly improve the memory application efficiency. Enhanced memory maintenance and test features, including KASAN, kmemleak, slub_debug, and huge pages to provide them with contiguous physical memory pages, improving the memory access efficiency on lightweight VMs. • I/O subsystem enhancement: StratoVirt provides the multi-channel concurrent pkgship helps developers quickly identify the scope of dependencies to improve the introduction efficiency. Application scenario 3: upgrading and deleting software packages Before upgrading or deleting0 码力 | 21 页 | 948.66 KB | 1 年前3
openEuler 21.09 技术白皮书quickly develop and deploy AI applications to the edge, and improving the training and deployment efficiency. Application Scenarios Edge computing can be used to shorten the gap between edge and cloud for Using the existing A-OPS fault tree or adding fault trees can effectively improve the maintenance efficiency and reduce potential downtime. secPaver: Security Policy Configuration Tool secPaver is an SELinux to mask mechanism details for policy developers, simplifying policy development and improving efficiency. It can be used to develop and simplify SELinux policies, and can be extended to other security0 码力 | 36 页 | 3.40 MB | 1 年前3
Cilium v1.10 DocumentationeBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does so in a completely transparent way, without requiring the identity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver among a lot of other information. Policy decision tracing:0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 DocumentationeBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does so in a completely transparent way, without requiring the identity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver among a lot of other information. Metrics export via Prometheus:0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.5 Documentationiden�ty management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access the tool doesn’t just report the source and des�na�on IP of the packet, the tool provides the full label informa�on of both the sender and receiver among a lot of other informa�on. Policy decision tracing: framework allows to trace the policy decision process for both, running workloads and based on arbitrary label defini�ons. Metrics export via Prometheus: Key metrics are exported via Prometheus for integra�on0 码力 | 740 页 | 12.52 MB | 1 年前3
Intro to Prometheus - With a dash of operations & observabilityselling points Highly dynamic, built-in service discovery No hierarchical model, n-dimensional label set PromQL: for processing, graphing, alerting, and export Simple operation Highly efficient Richard @TwitchiH & @fredbrancz Intro to Prometheus Introduction Background Operations & observability Outro Efficiency 1,000,000+ samples/second no problem on currect hardware 200,000 samples/second/core 16 bytes/sample labels...], \ rate(errors.value, 5m) / rate(total.value, 5m) \ FROM errors JOIN total ON [...all label equalities...] \ WHERE errors.job=" foo" AND total.job=" foo" Richard Hartmann & Frederic Branczyk0 码力 | 19 页 | 63.73 KB | 1 年前3
Cilium v1.6 Documentationidentity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver among a lot of other information. Policy decision tracing: framework allows to trace the policy decision process for both, running workloads and based on arbitrary label definitions. Metrics export via Prometheus: Key metrics are exported via Prometheus for integration0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.8 DocumentationBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does so in a completely transparent way, without requiring the identity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver among a lot of other information. Policy decision tracing:0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.9 DocumentationeBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does so in a completely transparent way, without requiring the identity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver among a lot of other information. Policy decision tracing:0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.7 Documentationidentity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver among a lot of other information. Policy decision tracing: framework allows to trace the policy decision process for both, running workloads and based on arbitrary label definitions. Metrics export via Prometheus: Key metrics are exported via Prometheus for integration0 码力 | 885 页 | 12.41 MB | 1 年前3
共 112 条
- 1
- 2
- 3
- 4
- 5
- 6
- 12













