openEuler OS Technical Whitepaper Innovation Projects (June, 2023)
software repositories into three types based on the source, quality attribute, and package maintenance mode. You can configure software repositories according to their specific needs. The redistribution different repositories is subject to community rules, which are based on usage, stability, and maintenance status. Software Package Repositories EPOL Image EUR/oepkgs/... Desktop/SDS/ DB/Big data/ repository all comes from the openEuler community. However, the software package release quality and maintenance support requirements of the openEuler community cannot be fully met due to the package quality0 码力 | 116 页 | 3.16 MB | 1 年前3This Debian Reference (version 2.109)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 9.5 System maintenance tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . possible. If you are uncomfortable with vim(1), you can keep using mcedit(1) for most system maintenance tasks. 1.3.6 The internal viewer in MC MC is a very smart viewer. This is a great tool for searching locate -d . pattern find matching filenames using shell ”pattern” (quicker using regularly generated database) grep -e ”pattern” *.html find a ”pattern” in all files ending with ”.html” in current directory0 码力 | 266 页 | 1.25 MB | 1 年前3Moxa Industrial Linux 3.0 (Debian 11) Manual for Arm-based Computers Version 1.0, January 2023
......................................................................................... 88 Maintenance .............................................................................................. Intrusion Detection (AIDE preinstalled without pre- defined monitoring database) (AIDE with security monitoring database pre-defined) Intrusion Prevention (Fail2ban) (Fail2ban) Network provides addition operation and configuration that should only be used during development stage or maintenance. For Secure Model, the administrator password to access bootloader menu is set by default. The0 码力 | 111 页 | 2.94 MB | 1 年前3openEuler 21.03 技术白皮书
VMAP, and vmalloc significantly improve the memory application efficiency. Enhanced memory maintenance and test features, including KASAN, kmemleak, slub_debug, and out of memory (OOM), reduce the token management, creation, and modification functions for other OpenStack components, and uses a database such as MySQL to store authentication information. • Nova provides VM creation, running, migration a fault within 10 seconds and complete the switchover within 1 second. Application scenario 2: database and system service protection The HA cluster solution supports mainstream OSs and application software0 码力 | 21 页 | 948.66 KB | 1 年前3ubuntu server guide
STATUS DESCRIPTION esm-apps yes enabled Expanded Security Maintenance for Applications esm-infra yes enabled Expanded Security Maintenance for Infrastructure livepatch yes enabled Canonical Livepatch realtime-kernel yes disabled Ubuntu kernel with PREEMPT_RT patches integrated Note that Extended Security Maintenance (ESM) and Livepatch will auto-enable once your token has been attached to your machine. After user relies on the provider of the container image to perform the necessary software testing and maintenance updates. There is a rich ecosystem of container providers thanks to mainstream tools like Docker0 码力 | 486 页 | 3.33 MB | 1 年前3Ubuntu Server Guide 18.04
kernel flavors. These have been merged into a single -generic kernel flavor to help reduce the maintenance burden over the life of the release. When running a 64-bit version of Ubuntu on 64-bit processors Selects packages needed for an OpenSSH server. • PostgreSQL database: This task selects client and server packages for the PostgreSQL database. • Print server: This task sets up your system to be a print the array see Section 5.1.5, “RAID Maintenance” [p. 14] for details, or copy important data to another machine due to major hardware failure. 5.1.5. RAID Maintenance The mdadm utility can be used to view0 码力 | 413 页 | 1.40 MB | 1 年前3Cilium v1.5 Documentation
a Ka�a cluster How to secure gRPC Ge�ng Started Securing Elas�csearch How to Secure a Cassandra Database Ge�ng Started Securing Memcached Locking down external access using AWS metadata Advanced Networking call authoriza�on Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Ka�a cluster Getting Started Using MicroK8s This guide uses microk8s [h�ps://microk8s call authoriza�on Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Ka�a cluster Self-Managed Kubernetes Installa�on using kubeadm Standard Installa�on0 码力 | 740 页 | 12.52 MB | 1 年前3Cilium v1.6 Documentation
Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Advanced Networking call authorization Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using MicroK8s This guide uses microk8s [https://microk8s call authorization Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Self-Managed Kubernetes The following guides are available for installation0 码力 | 734 页 | 11.45 MB | 1 年前3Cilium v1.7 Documentation
Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Advanced Networking Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using MicroK8s This guide uses microk8s [https://microk8s Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using K3s This guide walks you through installation of0 码力 | 885 页 | 12.41 MB | 1 年前3Cilium v1.10 Documentation
Kafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Creating policies Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Installation using Rancher Pre-Requisites Rancher Version 2.x [https://rancher to the CNI configuration by Cilium during operations such as node reboots, updates or routine maintenance. This is notably the case with GKE (non-Dataplane V2), in which node reboots and upgrades will0 码力 | 1307 页 | 19.26 MB | 1 年前3
共 51 条
- 1
- 2
- 3
- 4
- 5
- 6