ubuntu server guidepublic or private. Whether you want to deploy an OpenStack cloud, a Kubernetes cluster or a 50,000-node render farm, Ubuntu Server delivers the best value scale-out performance available. In this documentation can share your comments or let us know about bugs with any page. • Read our Code of Conduct • Get support • Join the Discourse forum • Download • Find out how to contribute to the Server Guide, or let us ation-with-docker Container customization with Docker 3 rock-images/multi-node-configuration-with-docker-compose Multi-node configuration with Docker-Compose 2 Software 3 package-management Package management0 码力 | 486 页 | 3.33 MB | 1 年前3
Ubuntu Server Guide 18.04.......................................................................................... 1 1. Support ................................................................................................ com 1 Introduction 1. Support There are a couple of different ways that Ubuntu Server Edition is supported: commercial support and community support. The main commercial support (and development funding) Ltd. They supply reasonably- priced support contracts on a per desktop or per server basis. For more information see the Ubuntu Advantage3 page. Community support is also provided by dedicated individuals0 码力 | 413 页 | 1.40 MB | 1 年前3
Referência Debian v2.124. . . . . . . . . . . . . . . . . . . . . 156 9.4.7 Identificação de um processo a usar ficheiros ou sockets . . . . . . . . . . . . . . . . . . . . . . . . . . 156 9.4.8 Repetir um comando com um intervalo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 11.4.2 Juntar dois ficheiros PS ou PDF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 11.4.3 Utilitários . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 9.1 List of programs to support console activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 90 码力 | 281 页 | 1.39 MB | 1 年前3
Référence Debian v2.124. . . . . . . . . . . . . . . . 153 9.4.7 Identification des processus qui utilisent des fichiers ou des sockets . . . . . . . . . . . . . . . . . . . . 154 9.4.8 Répéter une commande avec un intervalle de fichiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 10.1.6 Support d’archive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 11.4.2 Fusionner deux fichiers PS ou PDF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 11.4.3 Utilitaires0 码力 | 279 页 | 1.47 MB | 1 年前3
Cilium v1.5 DocumentationTroubleshoo�ng Monitoring & Metrics Exported Metrics Cilium as a Kubernetes pod Cilium as a host-agent on a node Troubleshoo�ng Component & Cluster Health Connec�vity Problems Policy Troubleshoo�ng Automa�c Diagnosis network packets emi�ed by the applica�on containers, allowing to validate the iden�ty at the receiving node. Security iden�ty management is performed using a key-value store. Secure access to and from external This means that each host can allocate IPs without any coordina�on between hosts. The following mul� node networking models are supported: Overlay: Encapsula�on based virtual network spawning all hosts.0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.11 DocumentationMesh) Getting Help FAQ Slack GitHub Training Enterprise support Security Bugs Operations System Requirements Summary Architecture Support Linux Distribution Compatibility & Considerations Linux Kernel Container Images Developer images Official release images Experimental Docker BuildKit and Buildx support Official Cilium repositories Update cilium-builder and cilium-runtime images Nightly Docker image packets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.10 DocumentationKubernetes Integration Multi-Cluster (Cluster Mesh) Getting Help FAQ Slack GitHub Training Enterprise support Security Bugs Operations System Requirements Summary Linux Distribution Compatibility & Considerations Container Images Developer images Official release images Experimental Docker BuildKit and Buildx support Official Cilium repositories Update cilium-builder and cilium-runtime images Nightly Docker image packets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.8 Documentationpackets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts io/docs/setup/learning-environment/minikube/] to demonstrate deployment and operation of Cilium in a single-node Kubernetes cluster. The minikube VM requires approximately 5GB of RAM and supports hypervisors like0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.9 DocumentationKubernetes Integration Multi-Cluster (Cluster Mesh) Getting Help FAQ Slack GitHub Training Enterprise support Security Bugs Operations System Requirements Summary Linux Distribution Compatibility Matrix Linux packets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.7 Documentationpackets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts io/docs/getting-started-guides/minikube/] to demonstrate deployment and operation of Cilium in a single-node Kubernetes cluster. The minikube VM requires approximately 5GB of RAM and supports hypervisors like0 码力 | 885 页 | 12.41 MB | 1 年前3
共 86 条
- 1
- 2
- 3
- 4
- 5
- 6
- 9













