Cilium v1.10 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services under multi-queue NICs compared to traditional approaches such as HTB (Hierarchy Token Bucket) or TBF (Token Bucket Filter) as used in the bandwidth CNI plugin, for example. Monitoring and Troubleshooting Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.7 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver the creation of a dedicated S3 bucket in order to store the state and representation of the cluster. You will need to change the bucket name and provide your unique bucket name (for example a reverse of0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.11 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services under multi-queue NICs compared to traditional approaches such as HTB (Hierarchy Token Bucket) or TBF (Token Bucket Filter) as used in the bandwidth CNI plugin, for example. Monitoring and Troubleshooting Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.9 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services under multi-queue NICs compared to traditional approaches such as HTB (Hierarchy Token Bucket) or TBF (Token Bucket Filter) as used in the bandwidth CNI plugin, for example. Monitoring and Troubleshooting Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.5 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and des�na�on IP of the packet, the tool provides the full label informa�on of both the sender and receiver the crea�on of a dedicated S3 bucket in order to store the state and representa�on of the cluster. You will need to change the bucket name and provide your unique bucket name (for example a reverse of0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.8 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver the creation of a dedicated S3 bucket in order to store the state and representation of the cluster. You will need to change the bucket name and provide your unique bucket name (for example a reverse of0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.6 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver the creation of a dedicated S3 bucket in order to store the state and representation of the cluster. You will need to change the bucket name and provide your unique bucket name (for example a reverse of0 码力 | 734 页 | 11.45 MB | 1 年前3
Ubuntu Desktop Training 2009current or a modified form Initially, Linux was a very technical, hard core open source programming tool. Thousands of developers con- tributed to its evolution as it became more user friendly. This has an advanced way of installing packages. If you do not find a software programme in the Add/ Remove tool, you can search for it in Synaptic. It searches all software in the available repositories on Ubuntu connection uses a modem to connect to the Internet. You can use the ScanModem tool to identify the type of modem. This tool recognises the type of modem-whether it is a Peripheral Component Interconnect0 码力 | 428 页 | 57.45 MB | 1 年前3
User guide to IPC/DEBIAN10-81A-64 – a 64-bit Debian Linux
by Syslogic(Chromium) • Network servers: Samba (Windows file sharing) / Apache (WWW) / FTP / Telnet / SSH • A tool for automatic mounting of USB storage devices: udevil • OpenJDK 11 Java Development Kit including automatically detects and configures the serial ports. This can be overruled by the “setserial” or the “stty” tool. In the folder /SYSLOGIC/test_demos/serial/ are examples and test scripts which show how to configure space on the flash card may have randomly assigned bits, the compression result may be poor. You can fill up the free disk space with zeros “0x00” with host:/# dd if=/dev/zero of=myzerofile.bin before0 码力 | 24 页 | 468.63 KB | 1 年前3
ubuntu server guideClient to activate most of the Ubuntu Pro services, including Livepatch, FIPS, and the CIS Benchmark tool. Further reading • For more information about the Ubuntu Pro Client, you can read our documentation of two way communication, based on the contents of a crash report by using the standard apport-cli tool that is part of Ubuntu. Copy the crash report to another system, run: apport-cli /path/to/report can skip the whole section of the following manual setup instruction by using this non-official tool. The tool will setup your TFTP server to serve necessary files for netbooting. Necessary Files There0 码力 | 486 页 | 3.33 MB | 1 年前3
共 57 条
- 1
- 2
- 3
- 4
- 5
- 6













