Cilium v1.6 DocumentationSecuring a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Advanced HTTP/REST API call authorization Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using MicroK8s This guide uses microk8s [https://microk8s HTTP/REST API call authorization Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Self-Managed Kubernetes The following guides are available for0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.5 DocumentationSecuring a Ka�a cluster How to secure gRPC Ge�ng Started Securing Elas�csearch How to Secure a Cassandra Database Ge�ng Started Securing Memcached Locking down external access using AWS metadata Advanced HTTP/REST API call authoriza�on Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Ka�a cluster Getting Started Using MicroK8s This guide uses microk8s [h�ps://microk8s HTTP/REST API call authoriza�on Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Ka�a cluster Self-Managed Kubernetes Installa�on using kubeadm Standard Installa�on0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.7 DocumentationSecuring a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Advanced HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using MicroK8s This guide uses microk8s [https://microk8s HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using K3s This guide walks you through installation0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.8 DocumentationSecuring a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Creating HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using MicroK8s This guide uses microk8s [https://microk8s HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using K3s This guide walks you through installation0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.9 DocumentationSecuring a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Creating HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using MicroK8s This guide uses microk8s [https://microk8s HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using K3s This guide walks you through installation0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.10 DocumentationSecuring a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Creating HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Installation using Rancher Pre-Requisites Rancher Version 2 brokers often handles many different topics at once (read this Introduction to Kafka [https://kafka.apache.org/intro] for more background). In our simple example, the Empire uses a Kafka cluster to handle0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 DocumentationSecuring a Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Creating HTTP-Aware Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Installation using Rancher Pre-Requisites Rancher Version 2 brokers often handles many different topics at once (read this Introduction to Kafka [https://kafka.apache.org/intro] for more background). In our simple example, the Empire uses a Kafka cluster to handle0 码力 | 1373 页 | 19.37 MB | 1 年前3
Ubuntu Server Guide 18.04................................................................................. 213 1. HTTPD - Apache2 Web Server .................................................................................... ......................................................................................... 226 5. Apache Tomcat ......................................................................................... server: Selects the BIND DNS server and its documentation. • LAMP server: Selects a ready-made Linux/Apache/MySQL/PHP server. • Mail server: This task selects a variety of packages useful for a general purpose0 码力 | 413 页 | 1.40 MB | 1 年前3
ubuntu server guidelamp-applications Get started with LAMP 3 how-to-install-apache2 Install Apache2 3 how-to-configure-apache2-settings Apache2 settings 3 how-to-use-apache2-modules Apache2 modules 3 how-to-install-nginx Install nginx Backup with shell scripts Web Proxy servers Install a Squid server Apache Install Apache2 Configure Apache2 Extend Apache2 with modules Nginx Install nginx Configure nginx 30 Extend nginx with Container Creation and Deletion Over the course of this tutorial we’ll explore deriving a customized Apache container, and then networking in a Postgres container backend for it. By the end you’ll have a working0 码力 | 486 页 | 3.33 MB | 1 年前3
鸟哥的Linux私房菜:服务器架设篇 第三版参考数据与延伸阅读 25. 第二十章、WWW 伺服器 25.1. 20.1 WWW 的簡史、資源以及伺服器軟體 25.2. 20.2 WWW (LAMP) 伺服器基本設定 25.3. 20.3 Apache 伺服器的進階設定 25.4. 20.4 登錄檔分析以及 PHP 強化模組 25.5. 20.5 建立連線加密網站 (https) 及防砍站腳本 25.6. 20.6 重點回顧 25.7 6. -------------------------------------------------------------------------- 7. 8. Apache/2.2.15 (CentOS) Server at localhost Port 80 画面最明显的地方就是告诉你,你并没有权限可以存取 index.html 的!见鬼了!明明权限是对的喔!那怎办? 也需要了解一下比较好。 在这个小节中,我们主要介绍一个比较简单的 Proxy 环境,就是单纯可以跑 而已的代理服务器。比较高阶的设定请参考后续小节的介绍啰。 达成代理服务器功能的软件很多,例如效能不是很好的 Apache 以及我们这个章节要介绍的八爪章鱼 squid 这一 套。 目前代理服务器在 Unix Like 的环境下,大多就是使用 squid ,因此我们这里以 squid 为准来介绍啦。 同样的, 请使用0 码力 | 795 页 | 17.63 MB | 1 年前3
共 52 条
- 1
- 2
- 3
- 4
- 5
- 6













