How and When You
Should Measure CPU
Overhead of eBPF
ProgramsHow and When You Should Measure CPU Overhead of eBPF Programs Bryce Kahle, Datadog October 28, 2020 Why should I profile eBPF programs? CI variance tracking Tools kernel.bpf_stats_enabled kernel0 码力 | 20 页 | 2.04 MB | 1 年前3
ubuntu server guideoduction Introduction 4 wireguard-vpn-peer2site-router On router 4 wireguard-vpn-peer2site-inside Inside device 3 wireguard-vpn-site2site Site-to-site 3 wireguard-vpn-defaultgw Default gateway 3 detail and can be applied to a broader set of applications. Take a look at our Reference section when you need to determine what commands are available, and how to interact with various tools. Finally need to set your computer to boot from the install media. 6 There should be an on-screen message when the computer starts telling you what key to press for settings or a boot menu. Depending on the manufacturer0 码力 | 486 页 | 3.33 MB | 1 年前3
Ubuntu Server Guide 18.04single -generic kernel flavor to help reduce the maintenance burden over the life of the release. When running a 64-bit version of Ubuntu on 64-bit processors you are not limited by memory addressing space GNU/Linux distribution is that, when installed, a package is also configured to reasonable defaults, eventually prompting you for additional required information. Likewise, when installing a task, the packages drive then "Create a new partition". 7. Use the rest of the free space on the drive and choose Continue, then Primary. 8. As with the swap partition, select the "Use as:" line at the top, changing it0 码力 | 413 页 | 1.40 MB | 1 年前3
This Debian Reference (version 2.109) . . . . . . . 31 1.6.2 Regular expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 1.6.3 Replacement expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 1.6.4 Global substitution with regular expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 1.6.5 Extracting data from counts • RTFM (read the fine manual) • Search the Internet before asking questions • Don’t be root when you don’t have to be • Don’t mess with the package management system • Don’t type anything you don’t0 码力 | 266 页 | 1.25 MB | 1 年前3
Cilium v1.10 Documentationinsertion of powerful security visibility and control logic within Linux itself. Because eBPF runs inside the Linux kernel, Cilium security policies can be applied and updated without any changes to the Currently VXLAN and Geneve are baked in but all encapsulation formats supported by Linux can be enabled. When to use this mode: This mode has minimal infrastructure and integration requirements. It works on almost host. The network is required to be capable to route the IP addresses of the application containers. When to use this mode: This mode is for advanced users and requires some awareness of the underlying networking0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 Documentationinsertion of powerful security visibility and control logic within Linux itself. Because eBPF runs inside the Linux kernel, Cilium security policies can be applied and updated without any changes to the Currently VXLAN and Geneve are baked in but all encapsulation formats supported by Linux can be enabled. When to use this mode: This mode has minimal infrastructure and integration requirements. It works on almost host. The network is required to be capable to route the IP addresses of the application containers. When to use this mode: This mode is for advanced users and requires some awareness of the underlying networking0 码力 | 1373 页 | 19.37 MB | 1 年前3
Ubuntu Desktop Guideyou can use them. Getting started with Unity The Launcher The Launcher appears automatically when you log in to your desktop, and gives you quick access to the applications you use most often Launcher to start applications The Launcher is one of the key components of the Unity desktop. When you log in to your desktop, it will appear along the left-hand side of the screen. The Launcher remove frequently-used program icons on the Launcher. Auto-hide the Launcher Show the Launcher only when you need it. Change the size of icons in the Launcher Make the icons in the Launcher larger or smaller0 码力 | 1709 页 | 5.81 MB | 1 年前3
Cilium v1.9 Documentationinsertion of powerful security visibility and control logic within Linux itself. Because eBPF runs inside the Linux kernel, Cilium security policies can be applied and updated without any changes to the Currently VXLAN and Geneve are baked in but all encapsulation formats supported by Linux can be enabled. When to use this mode: This mode has minimal infrastructure and integration requirements. It works on almost host. The network is required to be capable to route the IP addresses of the application containers. When to use this mode: This mode is for advanced users and requires some awareness of the underlying networking0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.8 Documentationinsertion of powerful security visibility and control logic within Linux itself. Because BPF runs inside the Linux kernel, Cilium security policies can be applied and updated without any changes to the Currently VXLAN and Geneve are baked in but all encapsulation formats supported by Linux can be enabled. When to use this mode: This mode has minimal infrastructure and integration requirements. It works on almost host. The network is required to be capable to route the IP addresses of the application containers. When to use this mode: This mode is for advanced users and requires some awareness of the underlying networking0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.7 Documentationinsertion of powerful security visibility and control logic within Linux itself. Because BPF runs inside the Linux kernel, Cilium security policies can be applied and updated without any changes to the Currently VXLAN and Geneve are baked in but all encapsulation formats supported by Linux can be enabled. When to use this mode: This mode has minimal infrastructure and integration requirements. It works on almost host. The network is required to be capable to route the IP addresses of the application containers. When to use this mode: This mode is for advanced users and requires some awareness of the underlying networking0 码力 | 885 页 | 12.41 MB | 1 年前3
共 75 条
- 1
- 2
- 3
- 4
- 5
- 6
- 8













