openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)Technology Communication 10,000 + mainstream applications on cloud native, big data CND, MEC, industrial control,etc. Integrated ecosystems and extensive compatibility through distributed kits Arm, x86, RISC-V DPUs/IPUs are also supporting the offloading of management- and control- plane components. This means that all management and control components of the data center infrastructure can be offloaded to Pod Client Link reliability and concurrency performance Server storage Permission/Resource control/DR/Security vStore 1 FS1 FS2 vStore 2 FS3 FS4 vStore 3 FS5 FS6 IP network FS File sharing0 码力 | 116 页 | 3.16 MB | 1 年前3
openEuler 21.09 技术白皮书instructions which are not the intended target of a branch. BTIs and PACs combine to reduce control flow attacks. Optimized huge page memory management: The tail pages among HugeTLB pages are reducing pseudo-sharing. • Unified allocator: Data structures have a unified allocator, which breaks the barriers between different data structures and facilitates memory management. • Soft update: This Description openEuler 21.09 inherits the following features from its earlier version: • Process-level control: The etMem configuration file can be used to expand the memory. Compared with the native LRU- based0 码力 | 36 页 | 3.40 MB | 1 年前3
Buzzing Across Spaceconfiguration options, and store state through eBPF maps to save and retrieve data in a wide set of data structures. These maps can be accessed from eBPF programs as well as from applications in user space. Various aggregation of metrics allows flexible and efficient generation of observability events and data structures from a wide range of possible sources without having to export samples. Attaching eBPF programs all networking. This creates security systems operating with richer context and a better level of control than traditional solutions. Projects using eBPF for security purposes include Falco, Tetragon, or0 码力 | 32 页 | 32.98 MB | 1 年前3
Cilium v1.5 Documentationkernel technology called BPF, which enables the dynamic inser�on of powerful security visibility and control logic within Linux itself. Because BPF runs inside the Linux kernel, Cilium security policies can approaches to struggle to scale side by side with the applica�on as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a con�nuously growing and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services, tradi�onal CIDR based security policies0 码力 | 740 页 | 12.52 MB | 1 年前3
This Debian Reference (version 2.109) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.2.4 Control of permissions for newly created files: umask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 10.5.5 Other version control systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 11 Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 10.14List of other version control system tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 110 码力 | 266 页 | 1.25 MB | 1 年前3
Cilium v1.6 Documentationkernel technology called BPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because BPF runs inside the Linux kernel, Cilium security policies can approaches to struggle to scale side by side with the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously growing and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services, traditional CIDR based security policies0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 DocumentationKernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog kernel technology called BPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because BPF runs inside the Linux kernel, Cilium security policies can approaches to struggle to scale side by side with the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously growing0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.8 DocumentationKernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog kernel technology called BPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because BPF runs inside the Linux kernel, Cilium security policies can have resolved a particular DNS name? Why Cilium & Hubble? BPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.9 DocumentationKernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog technology called eBPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because eBPF runs inside the Linux kernel, Cilium security policies can have resolved a particular DNS name? Why Cilium & Hubble? eBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.10 DocumentationKernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog technology called eBPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because eBPF runs inside the Linux kernel, Cilium security policies can have resolved a particular DNS name? Why Cilium & Hubble? eBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does0 码力 | 1307 页 | 19.26 MB | 1 年前3
共 67 条
- 1
- 2
- 3
- 4
- 5
- 6
- 7













