openEuler 21.03 技术白皮书radical memory, defragmentation, VMAP, and vmalloc significantly improve the memory application efficiency. Enhanced memory maintenance and test features, including KASAN, kmemleak, slub_debug, and huge pages to provide them with contiguous physical memory pages, improving the memory access efficiency on lightweight VMs. • I/O subsystem enhancement: StratoVirt provides the multi-channel concurrent pkgship helps developers quickly identify the scope of dependencies to improve the introduction efficiency. Application scenario 3: upgrading and deleting software packages Before upgrading or deleting0 码力 | 21 页 | 948.66 KB | 1 年前3
openEuler 21.09 技术白皮书quickly develop and deploy AI applications to the edge, and improving the training and deployment efficiency. Application Scenarios Edge computing can be used to shorten the gap between edge and cloud for Using the existing A-OPS fault tree or adding fault trees can effectively improve the maintenance efficiency and reduce potential downtime. secPaver: Security Policy Configuration Tool secPaver is an SELinux to mask mechanism details for policy developers, simplifying policy development and improving efficiency. It can be used to develop and simplify SELinux policies, and can be extended to other security0 码力 | 36 页 | 3.40 MB | 1 年前3
Cilium v1.10 DocumentationeBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does so in a completely transparent way, without requiring the identity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver among a lot of other information. Policy decision tracing:0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 DocumentationeBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does so in a completely transparent way, without requiring the identity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver among a lot of other information. Metrics export via Prometheus:0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.5 Documentationiden�ty management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access the tool doesn’t just report the source and des�na�on IP of the packet, the tool provides the full label informa�on of both the sender and receiver among a lot of other informa�on. Policy decision tracing: framework allows to trace the policy decision process for both, running workloads and based on arbitrary label defini�ons. Metrics export via Prometheus: Key metrics are exported via Prometheus for integra�on0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.6 Documentationidentity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver among a lot of other information. Policy decision tracing: framework allows to trace the policy decision process for both, running workloads and based on arbitrary label definitions. Metrics export via Prometheus: Key metrics are exported via Prometheus for integration0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.8 DocumentationBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does so in a completely transparent way, without requiring the identity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver among a lot of other information. Policy decision tracing:0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.9 DocumentationeBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does so in a completely transparent way, without requiring the identity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver among a lot of other information. Policy decision tracing:0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.7 Documentationidentity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver among a lot of other information. Policy decision tracing: framework allows to trace the policy decision process for both, running workloads and based on arbitrary label definitions. Metrics export via Prometheus: Key metrics are exported via Prometheus for integration0 码力 | 885 页 | 12.41 MB | 1 年前3
openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)deployment tuning assistant that significantly reduces deployment costs and improves optimization efficiency. Project Introduction HPCRunner is composed of two parts: HPC dependency management and HPC application applications. HPC Deployment Tuning Assistant: HPCRunner Objectives 20%↓ deployment cost 20%↑ tuning efficiency Unified deployment Flexible operation Template-based tuning One-click deployment One-click compilation communication library, and porting and tuning tool chain, significantly improving the application running efficiency of the Kunpeng platform. Repositories https://gitee.com/openeuler/hpcrunner Features • HPCRunner0 码力 | 116 页 | 3.16 MB | 1 年前3
共 48 条
- 1
- 2
- 3
- 4
- 5













