ubuntu server guideInstallation 3 service-ldap-access-control Access control 3 service-ldap-replication Replication 3 service-ldap-usage Simple LDAP user and group management 3 service-ldap-with-tls SSL/TLS 3 service-ldap-backup-restore partitioned into several partitions, or even be used as part of another RAID device or LVM volume group. 25 Logical Volume Manager (LVM) The LVM is a system of managing logical volumes, or filesystems RAID, a LVM volume group can be created out of entire disks or unformatted partitions. Select the “Create LVM volume group” button to open the creation dialog. Once a volume group has been created, it0 码力 | 486 页 | 3.33 MB | 1 年前3
Ubuntu Server Guide 18.04(PV): physical hard disk, disk partition or software RAID partition formatted as LVM PV. • Volume Group (VG): is made from one or more physical volumes. A VG can can be extended by adding more PVs. A VG a LVM volume. During the initial install only one Physical Volume (PV) will be part of the Volume Group (VG). Another PV will be added after install to demonstrate how a VG can be extended. There are several changes to disk. 7. For the "LVM configuration action" on the next screen, choose "Create volume group". Enter a name for the VG such as vg01, or something more descriptive. After entering a name, select0 码力 | 413 页 | 1.40 MB | 1 年前3
openEuler 21.03 技术白皮书user groups: Components of isula-build can run in designated user groups. Common users in a user group can run isula-build to improve security. 5. Batch importing and exporting of images. Multiple images manager: Shows different windows in different workspaces. Developers can manage the windows by group using the window manager. 3. Desktop widgets: Allows developers to set the wallpaper and screen openEuler's capabilities in the office desktop field. Xfce is ported by Xfce Special Interest Group (SIG) led by TurboLinux. Feature Description • Application Finder (xfce4-appfinder): Quickly runs0 码力 | 21 页 | 948.66 KB | 1 年前3
openEuler 21.09 技术白皮书the local node is preferentially used for object allocation. During garbage collection, memory replication is preferentially performed on the same node to ensure data affinity of applications after garbage Technical Committee Special Interest Group User Committee Brand Promotion Committee openEuler 21.09 Technical White Paper 28 Special Interest Group A Special Interest Group (SIG) is a team designated to a and must comply with the openEuler code of conduct. Anyone can join an SIG and contribute to the group projects. You can find all SIGs at: https://openeuler.org/en/sig/sig-list/.Technical Committee User0 码力 | 36 页 | 3.40 MB | 1 年前3
Cilium v1.6 DocumentationRESOURCE_GROUP_NAME=group1 export CLUSTER_NAME=aks-test1 export LOCATION=westus az group create --name $RESOURCE_GROUP_NAME --location $LOCATION az aks create \ --resource-group $RESOURCE_GROUP_NAME \ commands to configure kubectl to connect to this AKS cluster: az aks get-credentials --resource-group $RESOURCE_GROUP_NAME --name $CLUSTER_NAME To verify, you should see AKS in the name of the nodes when you up IAM Group and User Assuming you have all the prerequisites, run the following commands to create the kops user and group: # Create IAM group named kops and grant access aws iam create-group --group-name0 码力 | 734 页 | 11.45 MB | 1 年前3
大学霸 Kali Linux 安全渗透教程UAC is set to Default [+] BypassUAC can bypass this setting, continuing… [+] Part of Administrators group! Continuing… [*] Uploaded the agent to the filesystem…. [*] Uploading the bypass UAC executable to service'); log = client.sys.eventlog.open('dns server'); log = client.sys.eventlog.open('file replication service')。 这里清除所有日志。执行命令如下所示: >> log = client.sys.eventlog.open('system') >> log = client.sys service') >> log = client.sys.eventlog.open('dns server') >> log = client.sys.eventlog.open('file replication service') 执行以上命令后,表示指定了要清除的日志。接下来需要执行log.clear命令才可以 清除日志文件。执行命令如下所示: >> log.clear 执行以上命令后,将会隐藏用户的踪迹。0 码力 | 444 页 | 25.79 MB | 1 年前3
Cilium v1.7 DocumentationRESOURCE_GROUP_NAME=group1 export CLUSTER_NAME=aks-test1 export LOCATION=westus az group create --name $RESOURCE_GROUP_NAME --location $LOCATION az aks create \ --resource-group $RESOURCE_GROUP_NAME \ commands to configure kubectl to connect to this AKS cluster: az aks get-credentials --resource-group $RESOURCE_GROUP_NAME --name $CLUSTER_NAME To verify, you should see AKS in the name of the nodes when you up IAM Group and User Assuming you have all the prerequisites, run the following commands to create the kops user and group: # Create IAM group named kops and grant access aws iam create-group --group-name0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.8 DocumentationRESOURCE_GROUP_NAME=aks-test export CLUSTER_NAME=aks-test export LOCATION=westeurope az group create --name $RESOURCE_GROUP_NAME --location $LOCATION az aks create \ --resource-group $RESOURCE_GROUP_NAME AZURE_NODE_RESOURCE_GROUP="$(az aks show --resource-group $RESOURCE_GROUP_NAME --name $CLUSTER_NAME | jq -r .nodeResourceGroup)" Note AZURE_NODE_RESOURCE_GROUP must be set to the resource group of the node node pool, not the resource group of the AKS cluster. Retrieve Credentials to access cluster az aks get-credentials --name $CLUSTER_NAME --resource-group $RESOURCE_GROUP_NAME Deploy Cilium Note First0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.10 Documentationexport AZURE_RESOURCE_GROUP="${NAME}-group" az group create --name "${AZURE_RESOURCE_GROUP}" -l westus2 # Create AKS cluster az aks create \ --resource-group "${AZURE_RESOURCE_GROUP}" \ --name "${NAME}" the credentials to access the cluster with kubectl az aks get-credentials --resource-group "${AZURE_RESOURCE_GROUP}" -- name "${NAME}" AKS (Azure IPAM) Note Azure IPAM offers integration with the Azure export AZURE_RESOURCE_GROUP="${NAME}-group" az group create --name "${AZURE_RESOURCE_GROUP}" -l westus2 # Create AKS cluster az aks create \ --resource-group "${AZURE_RESOURCE_GROUP}" \ --name "${NAME}"0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.9 DocumentationValues=${infraID}-master-sg" | jq -r '.SecurityGroups[0].GroupId')" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp,FromPort=8472,ToPort=8472 UserIdGroupPairs= [{GroupId=${worker_sg}},{GroupId=${master_sg}}]" \ --group-id "${worker_sg}" aws ec2 authorize-security-group-ingress --region "${aws_region}" \ --ip-permissions \ "IpProtocol=udp FromPort=4240,ToPort=4240,UserIdGroupPairs= [{GroupId=${worker_sg}},{GroupId=${master_sg}}]" \ --group-id "${master_sg}" GCP: enable Cilium ports This script depends on jq & Google Cloud SDK (gcloud)0 码力 | 1263 页 | 18.62 MB | 1 年前3
共 70 条
- 1
- 2
- 3
- 4
- 5
- 6
- 7













