Building resilient systems inside the mesh:
abstraction and automation of Virtual Service
generationBuilding resilient systems inside the mesh: abstraction and automation of Virtual Service generation Vladimir Georgiev, Thought Machine #IstioCon Sync calls failures inside the mesh ● Everyone0 码力 | 9 页 | 1.04 MB | 1 年前3
AI大模型千问 qwen 中文文档data for aligning to human preferences. Qwen is capable of natural language understanding, text generation, vision understanding, audio understanding, tool use, role play, playing as AI agent, etc. 最新版本 AutoTokenizer device = "cuda" # the device to load the model onto # Now you do not need to add "trust_remote_code=True" model = AutoModelForCausalLM.from_pretrained( "Qwen/Qwen1.5-7B-Chat", torch_dtype="auto", device_map="auto" "user", "content": prompt} ] text = tokenizer.apply_chat_template( messages, tokenize=False, add_generation_prompt=True ) model_inputs = tokenizer([text], return_tensors="pt").to(device) # Directly use0 码力 | 56 页 | 835.78 KB | 1 年前3
Rancher Kubernetes Cryptographic Library
FIPS 140-2 Non-Proprietary Security PolicyCipher 11/17/2017 [SP 800-90A r1] NIST SP 800-90A Rev. 1, Recommendation for Random Number Generation Using Deterministic Random Bit Generators 6/24/2015 [SP 800-131A r2] NIST SP 800-131A Rev Lengths 3/21/2019 [SP 800-133 r2] NIST SP 800-133 Rev. 2, Recommendation for Cryptographic Key Generation 6/4/2020 [SP 800-135 r1] NIST SP 800-135 Rev. 1, Recommendation for Existing Application-Specific Encryption Standard (AES) 11/26/2001 [FIPS 198-1] FIPS 198-1, The Keyed Hash Message Authentication Code (HMAC) 7/16/2008 FIPS 140-2 Security Policy Rancher Kubernetes Cryptographic Library0 码力 | 16 页 | 551.69 KB | 1 年前3
《Efficient Deep Learning Book》[EDL] Chapter 3 - Learning Techniquesmodels. Over the years, a wide range of techniques have been developed to facilitate input data generation and transformation. These techniques help to overcome dataset shortcomings like: small size, skewed categories: label invariant transformations, label mixing transformations and synthetic sample generation. The label invariant techniques transform the input samples. The transformed samples are labeled predict a ‘dog’ with a probability of 30% and a ‘hamster’ with a probability of 70%. The sample generation techniques use models to generate samples for labels. Consider a training sample for English to0 码力 | 56 页 | 18.93 MB | 1 年前3
《Efficient Deep Learning Book》[EDL] Chapter 4 - Efficient Architecturesabstract concept). Here is a quick recipe to train embedding-based models: 1. Embedding Table Generation: Generate the embeddings for the inputs using machine learning algorithms of your choice. 2. Embedding 4-4: A high-level visualization of the embedding-based model training lifecycle. We start with generation of the embedding table, followed by looking up the embeddings for the inputs. Finally, we train train a model that takes the embeddings as input. In our petting zoo example: ● Embedding Table Generation: We have generated the embedding table. ● Embedding Lookup: For each input example, we will look0 码力 | 53 页 | 3.92 MB | 1 年前3
OpenShift Container Platform 4.4 构建(build)annotations: release.openshift.io/create-only: "true" creationTimestamp: "2019-05-17T13:44:26Z" generation: 2 name: cluster resourceVersion: "107233" selfLink: /apis/config.openshift.io/v1/builds/cluster 服务证书生成失败 如果您的资源访问请求遭到拒绝: 问题 问题 如果服务证书生成失败并显示以下信息(服务的 service.alpha.openshift.io/serving-cert- generation-error 注解包含以下信息): secret/ssl-key references serviceUID 62ad25ca-d703-11e6-9d6f-0e9c0057b608, which serviceUID 。您必须移除旧 secret 并清除服务注解 service.alpha.openshift.io/serving-cert-generation-error 和 service.alpha.openshift.io/serving- cert-generation-error-num,以强制重新生成证书: $ oc delete secret$ oc annotate 0 码力 | 101 页 | 1.12 MB | 1 年前3
Istio Security Assessmentits control plane. The goal of the assessment was to identify security issues related to the Istio code base, highlight high risk configurations commonly used by administrators, and provide perspective areas of focus for subsequent phases of the assessment. A test plan was created which matched areas of code with specific security controls (e.g. service discovery, certificate lifecycle, side car injection) architectures were used to provide testers with a way of validating that security expectations in the code were implemented when deployed. Each environment was deployed following Istio Documentation using0 码力 | 51 页 | 849.66 KB | 1 年前3
OpenShift Container Platform 4.9 节点io/v1 kind: VerticalPodAutoscalerController metadata: creationTimestamp: "2021-04-21T19:29:49Z" generation: 2 name: default namespace: openshift-vertical-pod-autoscaler resourceVersion: "142172" 群内或服务内通信,也用于重新加密路由。 2.6.5. secret 故障排除 如果服务证书生成失败并显示以下信息( 服务的 service.beta.openshift.io/serving-cert-generation- error 注解包含): 生成证书的服务不再存在,或者具有不同的 serviceUID 。您必须删除旧 secret 并清除服务上的以下注解 service 。您必须删除旧 secret 并清除服务上的以下注解 service.beta.openshift.io/serving-cert-generation-error, service.beta.openshift.io/serving-cert- generation-error-num 以强制重新生成证书: 1. 删除 secret: 2. 清除注解: 注意 注意 在用于移除注解的命令中,要移除的注解后面有一个0 码力 | 374 页 | 3.80 MB | 1 年前3
OpenShift Container Platform 4.14 镜像218:5000/test/origin-ruby- sample@sha256:47463d94eb5c049b2d23b03a9530bf944f8f967a0fe79147dd6b9135bf7dd13d 3 generation: 2 image: sha256:909de62d1f609a717ec433cc25ca5cf00941545c83a01fb31527771e1fab3fc5 4 - 218:5000/test/origin-ruby- sample@sha256:909de62d1f609a717ec433cc25ca5cf00941545c83a01fb31527771e1fab3fc5 generation: 1 image: sha256:47463d94eb5c049b2d23b03a9530bf944f8f967a0fe79147dd6b9135bf7dd13d tag: 218:5000/test/origin-ruby- sample@sha256:47463d94eb5c049b2d23b03a9530bf944f8f967a0fe79147dd6b9135bf7dd13d generation: 2 image: sha256:909de62d1f609a717ec433cc25ca5cf00941545c83a01fb31527771e1fab3fc5 - created:0 码力 | 118 页 | 1.13 MB | 1 年前3
Kubernetes Native DevOps Practiceand Features • CRD and operator design • Pipeline/Stage/Task/Task Template/Version Control/UI generation/Volume... • Logging, monitoring, autoscaling, high availability • Extensibility/Integration ConfigMap Job - pod template - volumes user build task • build the docker images init task • prepare code repository - volumes DevOps Operator Manage the Job environment variables image information completes - volumes Storage APIs user build task • build the application package init task • prepare code repository sidecar build task lifecycle - preStop - volumes storage config using secret Query0 码力 | 21 页 | 6.39 MB | 1 年前3
共 358 条
- 1
- 2
- 3
- 4
- 5
- 6
- 36
相关搜索词
BuildingresilientsystemsinsidethemeshabstractionandautomationofVirtualServicegenerationAI模型千问qwen中文文档RancherKubernetesCryptographicLibraryFIPS140NonProprietarySecurityPolicyEfficientDeepLearningBookEDLChapterTechniquesArchitecturesOpenShiftContainerPlatform4.4构建buildIstioAssessment4.9节点4.14镜像CNCFTenxCloudNativeDevOps













