Zabbix 2.2 Manual
14 available for selection if authNoPriv is chosen as Security level or both SHA and AES options are available if authPriv is chosen as Security level: 5.17 Ability to extract matching part of a regular and made stricter for most of the methods. ** Even more changes and bug fixes ** For a fully detailed list of changes and bug fixes see the API changelog. 5.27 Miscellaneous ** Full 64-bit range for object start-up/shutdown. The scripts are located under directory misc/init.d. Supported platforms Due to the security requirements and mission-critical nature of server operation, UNIX is the only operating system0 码力 | 918 页 | 11.28 MB | 1 年前3Zabbix 2.0 Manual
Hosts: – Interface IP/DNS – Interface port • Passive proxy – Interface port • Items – SNMPv3 security name – SNMPv3 auth pass – SNMPv3 priv pass – SNMPv1/v2 community – SNMPv1/v2 OID – DB monitor username – Telnet password – Telnet script – Calculated item expression • Discovery – SNMPv3 security name – SNMPv3 auth pass – SNMPv3 priv pass – SNMPv1/v2 community – SNMPv1/v2 OID Additionally handle all SNMPv3 querying failures as a failure of the whole host. Since 2.0.4, if SNMPv3 security name or security auth passphrase are wrong, this will be detected and such items will turn unsupported. Item0 码力 | 791 页 | 9.66 MB | 1 年前3Zabbix 3.0 Manual
zero. 5.20.2 Configuration parameters Default configuration files have been changed to improve security and usability. • DBUser has been changed to zabbix for proxy and server • Default value for MaxHousekeeperDelete version does not have any functional changes. 37 What’s new in Zabbix 3.0.32 Enhanced URL widget security The URL dashboard widget and the URL screen element now put retrieved URL content into the sandbox attribute settings in the defines.inc.php file, however turning sandboxing off is not recommended for security reasons. To learn more about the sandbox attribute, please see the sandbox section of the iframe0 码力 | 1074 页 | 12.04 MB | 1 年前3openEuler 21.03 技术白皮书
Configuration and Power Interface (ACPI), memory management, file systems, media, kernel documents, bug fixes, and code rebuild. Over the past decade, Huawei has contributed more than 13,000 patches to the Linux storage media, and smooth expansion of system capacity • Live kernel upgrade: quick, hitless fixes of kernel vulnerabilities Cloud base: • iSula: iSulad supports local volume management. isula-build OS Vendors Participating in Multiple-computing power vendors Governments, telecom carriers, security, finance, and electricity Other upstream communities Upstream First openEuler Open Source Community0 码力 | 21 页 | 948.66 KB | 1 年前3Zabbix 2.4 Manual
start-up/shutdown. The scripts are located under directory misc/init.d. Supported platforms Due to the security requirements and mission-critical nature of server operation, UNIX is the only operating system recommended to run the database on a separate box for large installations. Supported platforms Due to security requirements and mission-critical nature of monitoring server, UNIX is the only operating system password. Attention: Running Zabbix as root, bin, or any other account with special rights is a security risk. 3 Create Zabbix database For Zabbix server and proxy daemons, as well as Zabbix frontend0 码力 | 910 页 | 10.81 MB | 1 年前3Cilium v1.7 Documentation
small Cilium setup on your laptop. Intended as an easy way to get your hands dirty applying Cilium security policies between containers. Concepts: Describes the components of Cilium, and the different models Installation Network Policy Security Tutorials Advanced Networking Operations Istio Other Orchestrators Concepts Component Overview Terminology Address Management Multi Host Networking Security Datapath Failure Failure Behavior Architecture Datapath Scale Kubernetes Integration Getting Help FAQ Slack GitHub Security Bugs Integrations Kubernetes Introduction Concepts Requirements Configuration Network Policy0 码力 | 885 页 | 12.41 MB | 1 年前3Zabbix 3.2 Manual
start-up/shutdown. The scripts are located under directory misc/init.d. Supported platforms Due to the security requirements and mission-critical nature of server operation, UNIX is the only operating system components (server, proxy, agent, zabbix_sender and zabbix_get utilities) using Transport Layer Security (TLS) protocol. 3 Agent Overview Zabbix agent is deployed on a monitoring target to actively recommended to run the database on a separate box for large installations. Supported platforms Due to security requirements and mission-critical nature of monitoring server, UNIX is the only operating system0 码力 | 1012 页 | 12.11 MB | 1 年前3Cilium v1.8 Documentation
small Cilium setup on your laptop. Intended as an easy way to get your hands dirty applying Cilium security policies between containers. Concepts: Describes the components of Cilium, and the different models Installation Network Policy Security Tutorials Advanced Networking Operations Istio Other Orchestrators Concepts Component Overview Terminology Networking Network Security eBPF Datapath Kubernetes Integration Integration Multi-Cluster (Cluster Mesh) Getting Help FAQ Slack GitHub Security Bugs Operations System Requirements Summary Linux Distribution Compatibility Matrix Linux Kernel Required Kernel Versions0 码力 | 1124 页 | 21.33 MB | 1 年前3Measuring Woody: The Size of Debian 3.0
to fix them (reporting fixes and problems upstream), follow new upstream developments, and build all the software glue needed for making the Debian system work. Bugs and security holes are discussed openly and modify their software at the same time that they prepare it for end users. • Bug reports and fixes. While every proprietary software system needs expensive debugging cycles, libre software can count count on the help of people external to the project, in the form of valuable bug reports, and even fixes for them. • Reuse, evolution, and inter-fertilization of code. It is common in libre software projects0 码力 | 15 页 | 111.82 KB | 1 年前3Cilium v1.5 Documentation
small Cilium setup on your laptop. Intended as an easy way to get your hands dirty applying Cilium security policies between containers. Concepts: Describes the components of Cilium, and the different models Guides Installa�on Security Tutorials Advanced Networking Opera�ons Is�o Other Orchestrators Concepts Component Overview Assurances Terminology Address Management Mul� Host Networking Security Architecture Datapath Datapath Scale Kubernetes Integra�on Ge�ng Help FAQ Slack GitHub Security Bugs Integra�ons Kubernetes Introduc�on Concepts Requirements Configura�on Network Policy Endpoint CRD Kubernetes Compa�bility0 码力 | 740 页 | 12.52 MB | 1 年前3
共 155 条
- 1
- 2
- 3
- 4
- 5
- 6
- 16