Ubuntu Server Guide 18.04client cert fingerprint sudo puppet agent --fingerprint Back on the Puppet server, view pending certificate signing requests: sudo puppet cert list 108 Remote Administration On the Puppet server, verify https://localhost/ or to the IP address of your remote server. As Zentyal creates its own self-signed SSL certificate, you will have to accept a security exception on your browser. Log in with the same username server for the configured domains. Allows to configure A, CNAME, MX, NS, TXT and SRV records. • zentyal-ca: integrates the management of a Certification Authority within Zentyal so users can use certificates0 码力 | 413 页 | 1.40 MB | 1 年前3
ubuntu server guideAppArmor 3 security-firewall Firewall 3 security-certificates Certificates 3 security-trust-store CA trust store 3 security-console Console 2 High Availability 3 ubuntu-ha-introduction Introduction +--------+-------------------+ [ 407.025766] cloud-init[1348]: ci-info: | encc000 | True | fe80::3ca7:10f f:fea5:c69e/64 | . | link | 72:5d:0d:09:ea:76 | [ 407.025802] cloud-init[1348]: ci-info: | encc000 global | 72:5d:0d:09:ea:76 | [ 407.025837] cloud-init[1348]: ci-info: | encc000.1234 | True | fe80::3ca7:10f f:fea5:c69e/64 | . | link | 72:5d:0d:09:ea:76 | [ 407.025874] cloud-init[1348]: ci-info: | lo0 码力 | 486 页 | 3.33 MB | 1 年前3
Cilium v1.11 DocumentationGetting a pull request merged Pull requests review process for committers Weekly duties Developer’s Certificate of Origin Development Setup Verifying Your Development Setup Requirements Vagrant Setup Local with the root certificate authority, and client-side key and certificate of etcd: kubectl create secret generic -n kube-system cilium-etcd-secrets \ --from-file=etcd-client-ca.crt=ca.crt \ --from-file=etcd-client the command cilium hubble enable as shown below: $ cilium hubble enable � Found existing CA in secret cilium-ca � Patching ConfigMap cilium-config to enable Hubble... ♻ Restarted Cilium pods � Generating0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.9 DocumentationGetting a pull request merged Pull requests review process for committers Weekly duties Developer’s Certificate of Origin Development Setup Requirements Vagrant Setup Local Development in Vagrant Box Making TPROXY requirements of Cilium >= 1.6.0. minikube version minikube version: v1.3.1 commit: ca60a424ce69a4d79f502650199ca2b52f29e631 3. Create a minikube cluster: minikube start --network-plugin=cni --memory=4096 with the root certificate authority, and client-side key and certificate of etcd: kubectl create secret generic -n kube-system cilium-etcd-secrets \ --from-file=etcd-client-ca.crt=ca.crt \ --from-file=etcd-client0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.10 DocumentationGetting a pull request merged Pull requests review process for committers Weekly duties Developer’s Certificate of Origin Development Setup Verifying Your Development Setup Requirements Vagrant Setup Local with the root certificate authority, and client-side key and certificate of etcd: kubectl create secret generic -n kube-system cilium-etcd-secrets \ --from-file=etcd-client-ca.crt=ca.crt \ --from-file=etcd-client the command cilium hubble enable as shown below: $ cilium hubble enable � Found existing CA in secret cilium-ca � Patching ConfigMap cilium-config to enable Hubble... ♻ Restarted Cilium pods � Generating0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.7 DocumentationTPROXY requirements of Cilium >= 1.6.0. minikube version minikube version: v1.3.1 commit: ca60a424ce69a4d79f502650199ca2b52f29e631 3. Create a minikube cluster: minikube start --network-plugin=cni --memory=4096 with the root certificate authority, and client-side key and certificate of etcd: kubectl create secret generic -n kube-system cilium-etcd-secrets \ --from-file=etcd-client-ca.crt=ca.crt \ -- network. In this guide we will learn about: Creating an internal Certificate Authority (CA) and associated certificates signed by that CA to enable TLS interception. Using Cilium network policy to select0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.8 DocumentationGetting a pull request merged Pull requests review process for committers Weekly duties Developer’s Certificate of Origin Development Setup Requirements Vagrant Setup Local Development in Vagrant Box Making TPROXY requirements of Cilium >= 1.6.0. minikube version minikube version: v1.3.1 commit: ca60a424ce69a4d79f502650199ca2b52f29e631 3. Create a minikube cluster: minikube start --network-plugin=cni --memory=4096 with the root certificate authority, and client-side key and certificate of etcd: kubectl create secret generic -n kube-system cilium-etcd-secrets \ --from-file=etcd-client-ca.crt=ca.crt \ --from-file=etcd-client0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.6 Documentationto contribute Pull request review process Building Container Images Documentation Developer’s Certificate of Origin Release Management Release Cadence Stable releases LTS Generic Release Process GitHub TPROXY requirements of Cilium >= 1.6.0. minikube version minikube version: v1.3.1 commit: ca60a424ce69a4d79f502650199ca2b52f29e631 3. Create a minikube cluster: minikube start --network-plugin=cni --memory=4096 with the root certificate authority, and client-side key and certificate of etcd: kubectl create secret generic -n kube-system cilium-etcd-secrets \ --from-file=etcd-client-ca.crt=ca.crt \ --0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.5 Documentationkubectl create secret generic -n kube-system cilium-etcd-secrets \ --from-file=etcd-client-ca.crt=ca.crt \ --from-file=etcd-client.key=client.key \ --from-file=etcd-client.crt=client.crt etcd, uncomment the 'ca-file' line # and create a kubernetes secret by following the tutorial in # https://cilium.link/etcd-config #ca-file: '/var/lib/etcd-secrets/etcd-client-ca.crt' # # In case you fe72cc39-dffb-45dc-8e5f-86c674a58951 | c5e79a70-bf57-11e8-98e6-f1a9f45fc4d 461f4176-eb4c-4bcc-a08a-46787ca01af3 | c6fefde0-bf57-11e8-98e6-f1a9f45fc4d 64dbf608-6947-4a23-98e9-63339c413136 | c8096900-bf57-10 码力 | 740 页 | 12.52 MB | 1 年前3
大学霸 Kali Linux 安全渗透教程------------------- Creation of the OpenVAS SSL Certificate ----------------------------------------------- Congratulations. Your server certificate was properly created. The following files were created: Certification authority: Certificate = /var/lib/openvas/CA/cacert.pem Private key = /var/lib/openvas/private/CA/cakey.pem . OpenVAS Server : Certificate = /var/lib/openvas/CA/servercert.pem Private Private key = /var/lib/openvas/private/CA/serverkey.pem Press [ENTER] to exit 大学霸 Kali Linux 安全渗透教程 191 5.2 使用OpenVAS 输出的信息显示了创建的OpenVAS证书及位置。此时按下Enter键,退出程序。 (2)使用OpenVAS NVT Feed同步OpenVAS NVT数据库,并且更新最新的漏洞检0 码力 | 444 页 | 25.79 MB | 1 年前3
共 44 条
- 1
- 2
- 3
- 4
- 5













