Cilium v1.10 DocumentationWhat services are communicating with each other? How frequently? What does the service dependency graph look like? What HTTP calls are being made? What Kafka topics does a service consume from or produce enables CNI chaining on top of any CNI plugin that is using a veth device model. The majority of CNI plugins use such a model. Note Some advanced Cilium features may be limited when chaining with other is not suitable. In that case, a full CNI chaining plugin is required which understands the device model of the underlying plugin. Writing such a plugin is trivial, contact us on Slack for more details.0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 DocumentationWhat services are communicating with each other? How frequently? What does the service dependency graph look like? What HTTP calls are being made? What Kafka topics does a service consume from or produce enables CNI chaining on top of any CNI plugin that is using a veth device model. The majority of CNI plugins use such a model. Note Some advanced Cilium features may be limited when chaining with other is not suitable. In that case, a full CNI chaining plugin is required which understands the device model of the underlying plugin. Writing such a plugin is trivial, contact us on Slack for more details.0 码力 | 1373 页 | 19.37 MB | 1 年前3
openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)/A /B /C /D /E /F Multipath NFS/RDMA or NFS/TCP Maximized cluster performance in client-server model Server Cloud Server 012 openEuler OS Technical White Paper Innovation Projects Repositories interference isolation openEuler HybridSched OpenStack Keystone Glance Nova Neutron Hybrid resource model Priority semantics Global CPU binding Cinder openEuler HybridSched QoS Manager (Skylark) QoS analysis solution Kubernetes cluster Worker node Service to be scheduled Injection-based feature analysis QoS model training Pre-analysis apiserver Interference-aware scheduler Online service Offline service Host0 码力 | 116 页 | 3.16 MB | 1 年前3
openEuler 21.03 技术白皮书improved user experience. 8. Early Departure Time (EDT) model for sending TCP packets: It breaks the limitation of the TCP framework. This model adds an EDT timestamp to each data packet based on the 03 Technical White Paper • Lightweight and low-noise: When StratoVirt uses a simplified device model, it can start within 50 ms, control the noise floor within 4 M, and process serverless workloads stability of I/O traffic management on VMs. • System call filtering: With the simplified device model design and the Seccomp filtering capability, StratoVirt requires calling only 35 systems in the0 码力 | 21 页 | 948.66 KB | 1 年前3
Cilium v1.5 Documentationsecurity policies to control Elas�csearch API access. Cilium follows the white-list, least privilege model for security. That is to say, a CiliumNetworkPolicy contains a list of rules that define allowed requests Container Pla�orm Network Plugin: Each container pla�orm (e.g., Docker, Kubernetes) has its own plugin model for how external networking pla�orms integrate. In the case of Docker, each Linux node runs a process addresses. Mul�ple applica�on containers can share the same IP address; a typical example for this model is a Kubernetes Pod . All applica�on containers which share a common address are grouped together0 码力 | 740 页 | 12.52 MB | 1 年前3
Ubuntu Desktop Guideabout your wireless network device. The way you fix many wireless problems depends on the make and model number of the wireless adapter, so you will need to make a note of these details. It can also be drivers for your wireless adapter (even if it only contains Windows drivers) The manufacturers and model numbers of your computer, wireless adapter and router. This information can usually be found on list for your distribution (for example, Ubuntu, Fedora or openSuSE) and see if your make and model of wireless adapter is listed. You may be able to use some of the information there to get your0 码力 | 1709 页 | 5.81 MB | 1 年前3
Cilium v1.6 Documentationenables CNI chaining on top of any CNI plugin that is using a veth device model. The majority of CNI plugins use such a model. Validate that the current CNI plugin is using veth 1. Log into one of the is not suitable. In that case, a full CNI chaining plugin is required which understands the device model of the underlying plugin. Writing such a plugin is trivial, contact us on Slack for more details. security policies to control Elasticsearch API access. Cilium follows the white-list, least privilege model for security. That is to say, a CiliumNetworkPolicy contains a list of rules that define allowed requests0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.9 DocumentationWhat services are communicating with each other? How frequently? What does the service dependency graph look like? What HTTP calls are being made? What Kafka topics does a service consume from or produce enables CNI chaining on top of any CNI plugin that is using a veth device model. The majority of CNI plugins use such a model. Note Some advanced Cilium features may be limited when chaining with other is not suitable. In that case, a full CNI chaining plugin is required which understands the device model of the underlying plugin. Writing such a plugin is trivial, contact us on Slack for more details.0 码力 | 1263 页 | 18.62 MB | 1 年前3
大学霸 Kali Linux 安全渗透教程root@kali:~# snmpwalk -c public 192.168.41.138 -v 2c iso.3.6.1.2.1.1.1.0 = STRING: "Hardware: x86 Family 6 Model 42 Stepping 7 AT/AT COMPATIBLE - Software: Windows Version 6.1 (Build 7601 Multiprocessor Free)" iso (5)使用res.graph()函数以图的形式显示路由跟踪结果。执行命令如下所示: >>> res.graph() 执行以上命令后,将显示如图4.1所示的界面。 大学霸 Kali Linux 安全渗透教程 124 4.2 测试网络范围 图4.1 路由跟踪图 如果要想保存该图,执行如下所示的命令: >>> res.graph(target=">/tmp/graph.svg") 执行以上命令后,图4 执行以上命令后,图4.1中的信息将会保存到/tmp/graph.svg文件中。此时不会有任 何信息输出。 (6)退出scapy程序,执行命令如下所示: >>> exit() 执行以上命令后,scapy程序将退出。还可以按下Ctrl+D组合键退出scapy程序。 大学霸 Kali Linux 安全渗透教程 125 4.2 测试网络范围 4.3 识别活跃的主机 尝试渗透测试之前,必须先识别在0 码力 | 444 页 | 25.79 MB | 1 年前3
Cilium v1.7 Documentationenables CNI chaining on top of any CNI plugin that is using a veth device model. The majority of CNI plugins use such a model. Validate that the current CNI plugin is using veth 1. Log into one of the is not suitable. In that case, a full CNI chaining plugin is required which understands the device model of the underlying plugin. Writing such a plugin is trivial, contact us on Slack for more details. pod/mediabot 1/1 Running 0 14s A Brief Overview of the TLS Certificate Model TLS is a protocol that “wraps” other protocols like HTTP and ensures that communication between client0 码力 | 885 页 | 12.41 MB | 1 年前3
共 46 条
- 1
- 2
- 3
- 4
- 5













