Cilium v1.6 DocumentationOperations Istio Other Orchestrators Concepts Component Overview Terminology Address Management Multi Host Networking Security Datapath Failure Behavior Architecture Datapath Scale Kubernetes Integration clusters connects all application containers. IP allocation is kept simple by using host scope allocators. This means that each host can allocate IPs without any coordination between hosts. The following multi hosts which is typically already given. Native Routing: Use of the regular routing table of the Linux host. The network is required to be capable to route the IP addresses of the application containers. When0 码力 | 734 页 | 11.45 MB | 1 年前3
 Cilium v1.7 DocumentationOperations Istio Other Orchestrators Concepts Component Overview Terminology Address Management Multi Host Networking Security Datapath Failure Behavior Architecture Datapath Scale Kubernetes Integration clusters connects all application containers. IP allocation is kept simple by using host scope allocators. This means that each host can allocate IPs without any coordination between hosts. The following multi hosts which is typically already given. Native Routing: Use of the regular routing table of the Linux host. The network is required to be capable to route the IP addresses of the application containers. When0 码力 | 885 页 | 12.41 MB | 1 年前3
 Cilium v1.8 DocumentationNetwork Policy Policy Enforcement Modes Rule Basics Layer 3 Examples Layer 4 Examples Layer 7 Examples Host Policies Layer 7 Protocol Visibility Using Kubernetes constructs in policy Endpoint Lifecycle Troubleshooting clusters connects all application containers. IP allocation is kept simple by using host scope allocators. This means that each host can allocate IPs without any coordination between hosts. The following multi hosts which is typically already given. Native Routing: Use of the regular routing table of the Linux host. The network is required to be capable to route the IP addresses of the application containers. When0 码力 | 1124 页 | 21.33 MB | 1 年前3
 Cilium v1.9 DocumentationPolicy Enforcement Modes Rule Basics Layer 3 Examples Layer 4 Examples Layer 7 Examples Deny Policies Host Policies Layer 7 Protocol Visibility Using Kubernetes constructs in policy Endpoint Lifecycle Troubleshooting clusters connects all application containers. IP allocation is kept simple by using host scope allocators. This means that each host can allocate IPs without any coordination between hosts. The following multi hosts which is typically already given. Native Routing: Use of the regular routing table of the Linux host. The network is required to be capable to route the IP addresses of the application containers. When0 码力 | 1263 页 | 18.62 MB | 1 年前3
 Cilium v1.10 DocumentationPolicy Enforcement Modes Rule Basics Layer 3 Examples Layer 4 Examples Layer 7 Examples Deny Policies Host Policies Layer 7 Protocol Visibility Using Kubernetes constructs in policy Endpoint Lifecycle Troubleshooting clusters connects all application containers. IP allocation is kept simple by using host scope allocators. This means that each host can allocate IPs without any coordination between hosts. The following multi hosts which is typically already given. Native Routing: Use of the regular routing table of the Linux host. The network is required to be capable to route the IP addresses of the application containers. When0 码力 | 1307 页 | 19.26 MB | 1 年前3
 Cilium v1.11 DocumentationPolicy Enforcement Modes Rule Basics Layer 3 Examples Layer 4 Examples Layer 7 Examples Deny Policies Host Policies Layer 7 Protocol Visibility Using Kubernetes constructs in policy Endpoint Lifecycle Troubleshooting clusters connects all application containers. IP allocation is kept simple by using host scope allocators. This means that each host can allocate IPs without any coordination between hosts. The following multi hosts which is typically already given. Native Routing: Use of the regular routing table of the Linux host. The network is required to be capable to route the IP addresses of the application containers. When0 码力 | 1373 页 | 19.37 MB | 1 年前3
 Cilium v1.5 DocumentationIs�o Other Orchestrators Concepts Component Overview Assurances Terminology Address Management Mul� Host Networking Security Architecture Datapath Scale Kubernetes Integra�on Ge�ng Help FAQ Slack GitHub Lifecycle Troubleshoo�ng Monitoring & Metrics Exported Metrics Cilium as a Kubernetes pod Cilium as a host-agent on a node Troubleshoo�ng Component & Cluster Health Connec�vity Problems Policy Troubleshoo�ng clusters connects all applica�on containers. IP alloca�on is kept simple by using host scope allocators. This means that each host can allocate IPs without any coordina�on between hosts. The following mul�0 码力 | 740 页 | 12.52 MB | 1 年前3
 ubuntu server guidever-amd64.iso As you can see, this downloads the ISO from Ubuntu’s servers. You may well want to host it somewhere on your infrastructure and change the URL to match. This configuration is obviously from SBE side 0 on master proc=00050000 5.60502|ISTEP 6. 5 - host_init_fsi 5.87228|ISTEP 6. 6 - host_set_ipl_parms 6.11032|ISTEP 6. 7 - host_discover_targets 6.67868|HWAS|PRESENT> DIMM[03]=A0A0000000000000 98988|ISTEP 6. 8 - host_update_master_tpm 7.22711|SECURE|Security Access Bit> 0xC000000000000000 7.22711|SECURE|Secure Mode Disable (via Jumper)> 0x0000000000000000 7.22731|ISTEP 6. 9 - host_gard 7.43353|HWAS|FUNCTIONAL>0 码力 | 486 页 | 3.33 MB | 1 年前3
 Ubuntu Server Guide 18.04................................................................................... 48 3. Dynamic Host Configuration Protocol (DHCP) ................................................................... systems. • Tomcat Java server: Installs Apache Tomcat and needed dependencies. • Virtual Machine host: Includes packages needed to run KVM virtual machines. • Manually select packages: Executes aptitude Installation sudo kdump-config propagate Need to generate a new ssh key... The authenticity of host 'kdump-netcrash (192.168.1.74)' can't be established. ECDSA key fingerprint is SHA256:iMp+5Y28qh0 码力 | 413 页 | 1.40 MB | 1 年前3
 User guide to IPC/DEBIAN10-81A-64 – a 64-bit Debian Linux
by SyslogicIPC/DEBIAN10-81A-64 from Windows 13 8.3 Exchange files with SCP 13 8.4 Remote shell with SSH 13 9 Virtual host 14 9.1 Installation 14 9.2 USB performance 14 9.3 Shared folders 14 User guide Assuming that your industrial computer has the IP 192.168.1.228, remotely login onto it with host:/# ssh netipc@192.168.1.228 and password “netipc”. The output of a graphical application, e.g “-X”: host:/# ssh –X root@192.168.1.228 host:/# chromium User guide to IPC/DEBIAN10-81A-64 | © 2020 Syslogic Datentechnik AG | All rights reserved Seite 14 von 24 9 Virtual host A0 码力 | 24 页 | 468.63 KB | 1 年前3
共 66 条
- 1
 - 2
 - 3
 - 4
 - 5
 - 6
 - 7
 













