ubuntu server guidepublic or private. Whether you want to deploy an OpenStack cloud, a Kubernetes cluster or a 50,000-node render farm, Ubuntu Server delivers the best value scale-out performance available. In this documentation ation-with-docker Container customization with Docker 3 rock-images/multi-node-configuration-with-docker-compose Multi-node configuration with Docker-Compose 2 Software 3 package-management Package management IBM LPAR autoinstall on s390x ROCK Images Introduction Container customization with Docker Multi-node configuration with Docker-Compose Software Package management Upgrade Third party APT repositories0 码力 | 486 页 | 3.33 MB | 1 年前3
Ubuntu Server Guide 18.04consider spreading your cards. If not at least allocate your memory to the node where the cards reside, for example in a two node all to node #2: -m 0, 2048. You can use the tool lstopo from the package hwloc-nox ovs-vsctl set Open_vSwitch . "other_config:dpdk-lcore-mask=0x1" # Allocate 2G huge pages (not Numa node aware) ovs-vsctl set Open_vSwitch . "other_config:dpdk-alloc-mem=2048" # group/permissions for vhost-user /var/log/openvswitch/ovs- vswitchd.log 2016-01-22T08:58:33.381Z|00003|ovs_numa|INFO|Discovered 12 CPU cores on NUMA node 0 2016-01-22T08:58:33.381Z|00004|ovs_numa|INFO|Discovered 1 NUMA nodes and 12 CPU cores 2016-01-22T08:58:330 码力 | 413 页 | 1.40 MB | 1 年前3
Référence Debian v2.124. . . . . . . . . . . . . . . . 153 9.4.7 Identification des processus qui utilisent des fichiers ou des sockets . . . . . . . . . . . . . . . . . . . . 154 9.4.8 Répéter une commande avec un intervalle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 11.4.2 Fusionner deux fichiers PS ou PDF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 11.4.3 Utilitaires les contributeurs ne pourront être tenus pour responsables des conséquences des erreurs, omissions ou ambiguïtés que comporte ce document. Ce qu’est Debian Le Projet Debian est une association de personnes0 码力 | 279 页 | 1.47 MB | 1 年前3
Referência Debian v2.124. . . . . . . . . . . . . . . . . . . . . 156 9.4.7 Identificação de um processo a usar ficheiros ou sockets . . . . . . . . . . . . . . . . . . . . . . . . . . 156 9.4.8 Repetir um comando com um intervalo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 11.4.2 Juntar dois ficheiros PS ou PDF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 11.4.3 Utilitários . . . . . . . . . . . . . . . . . . . . . . 250 Resumo Este livro é livre; pode redistribuí-lo e/ou modificá-lo sob os termos da Licença Pública Geral GNU de qualquer versão compatível com a Definição0 码力 | 281 页 | 1.39 MB | 1 年前3
Cilium v1.5 DocumentationTroubleshoo�ng Monitoring & Metrics Exported Metrics Cilium as a Kubernetes pod Cilium as a host-agent on a node Troubleshoo�ng Component & Cluster Health Connec�vity Problems Policy Troubleshoo�ng Automa�c Diagnosis network packets emi�ed by the applica�on containers, allowing to validate the iden�ty at the receiving node. Security iden�ty management is performed using a key-value store. Secure access to and from external This means that each host can allocate IPs without any coordina�on between hosts. The following mul� node networking models are supported: Overlay: Encapsula�on based virtual network spawning all hosts.0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.10 Documentationpackets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts EDT-based (Earliest Departure Time) rate-limiting with eBPF for container traffic that is egressing a node. This allows to significantly reduce transmission tail latencies for applications and to avoid locking0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 Documentationpackets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts EDT-based (Earliest Departure Time) rate-limiting with eBPF for container traffic that is egressing a node. This allows to significantly reduce transmission tail latencies for applications and to avoid locking0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.9 Documentationpackets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts EDT-based (Earliest Departure Time) rate-limiting with eBPF for container traffic that is egressing a node. This allows to significantly reduce transmission tail latencies for applications and to avoid locking0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.8 Documentationpackets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts io/docs/setup/learning-environment/minikube/] to demonstrate deployment and operation of Cilium in a single-node Kubernetes cluster. The minikube VM requires approximately 5GB of RAM and supports hypervisors like0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.7 Documentationpackets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts io/docs/getting-started-guides/minikube/] to demonstrate deployment and operation of Cilium in a single-node Kubernetes cluster. The minikube VM requires approximately 5GB of RAM and supports hypervisors like0 码力 | 885 页 | 12.41 MB | 1 年前3
共 42 条
- 1
- 2
- 3
- 4
- 5













