The Vitess 11.0 Documentation
access administrative web pages, start a proxy with: kubectl proxy --port=8001 Then use the following URLs: vtctld: http://localhost:8001/api/v1/namespaces/default/services/vtctld:web/proxy/app/ vtgate: vtgate: http://localhost:8001/api/v1/namespaces/default/services/vtgate-zone1:web/proxy/ Verify cluster You can check the state of your cluster with kubectl get pods,jobs. After a few minutes, it should show Architecture The Vitess platform consists of a number of server processes, command-line utilities, and web-based utilities, backed by a consistent metadata store. Depending on the current state of your application0 码力 | 481 页 | 3.14 MB | 1 年前3The Vitess 10.0 Documentation
access administrative web pages, start a proxy with: kubectl proxy --port=8001 74 Then use the following URLs: vtctld: http://localhost:8001/api/v1/namespaces/default/services/vtctld:web/proxy/app/ vtgate: vtgate: http://localhost:8001/api/v1/namespaces/default/services/vtgate-zone1:web/proxy/ Verify cluster You can check the state of your cluster with kubectl get pods,jobs. After a few minutes, it should Architecture The Vitess platform consists of a number of server processes, command-line utilities, and web-based utilities, backed by a consistent metadata store. Depending on the current state of your application0 码力 | 455 页 | 3.07 MB | 1 年前3The Vitess 12.0 Documentation
Architecture The Vitess platform consists of a number of server processes, command-line utilities, and web-based utilities, backed by a consistent metadata store. Depending on the current state of your application database performance. • Topology Management Tools – Cluster management tools (handles reparenting) – Web-based management GUI – Designed to work in multiple data centers / regions • Sharding – Virtually configurations for different workloads, like a primary database for writes, fast read-only replicas for web clients, slower read-only replicas for batch jobs, and so forth. If the database has horizontal sharding0 码力 | 534 页 | 3.32 MB | 1 年前3The Vitess 8.0 Documentation
access administrative web pages, start a proxy with: kubectl proxy --port=8001 Then use the following URLs: vtctld: http://localhost:8001/api/v1/namespaces/default/services/vtctld:web/proxy/app/ vtgate: vtgate: http://localhost:8001/api/v1/namespaces/default/services/vtgate-zone1:web/proxy/ Verify cluster You can check the state of your cluster with kubectl get pods,jobs. After a few minutes, it should show Architecture The Vitess platform consists of a number of server processes, command-line utilities, and web-based utilities, backed by a consistent metadata store. Depending on the current state of your application0 码力 | 331 页 | 1.35 MB | 1 年前3The Vitess 9.0 Documentation
access administrative web pages, start a proxy with: kubectl proxy --port=8001 Then use the following URLs: vtctld: http://localhost:8001/api/v1/namespaces/default/services/vtctld:web/proxy/app/ vtgate: vtgate: http://localhost:8001/api/v1/namespaces/default/services/vtgate-zone1:web/proxy/ Verify cluster You can check the state of your cluster with kubectl get pods,jobs. After a few minutes, it should show Architecture The Vitess platform consists of a number of server processes, command-line utilities, and web-based utilities, backed by a consistent metadata store. Depending on the current state of your application0 码力 | 417 页 | 2.96 MB | 1 年前3The Vitess 6.0 Documentation
access administrative web pages, start a proxy with: kubectl proxy --port=8001 Then use the following URLs: vtctld: http://localhost:8001/api/v1/namespaces/default/services/vtctld:web/proxy/app/ vtgate: vtgate: http://localhost:8001/api/v1/namespaces/default/services/vtgate-zone1:web/proxy/ Verify cluster You can check the state of your cluster with kubectl get pods,jobs. After a few minutes, it should show Architecture The Vitess platform consists of a number of server processes, command-line utilities, and web-based utilities, backed by a consistent metadata store. Depending on the current state of your application0 码力 | 210 页 | 846.79 KB | 1 年前3The Vitess 5.0 Documentation
/vitess/zone1 39 add zone1 CellInfo etcd start done... enter etcd2 env Starting vtctld... Access vtctld web UI at http://morgox1:15000 Send commands with: vtctlclient -server morgox1:15999 ... enter etcd2 env Architecture The Vitess platform consists of a number of server processes, command-line utilities, and web-based utilities, backed by a consistent metadata store. Depending on the current state of your application database performance. • Topology Management Tools – Master management tools (handles reparenting) – Web-based management GUI – Designed to work in multiple data centers / regions • Sharding – Virtually0 码力 | 206 页 | 875.06 KB | 1 年前3The Vitess 7.0 Documentation
access administrative web pages, start a proxy with: kubectl proxy --port=8001 Then use the following URLs: vtctld: http://localhost:8001/api/v1/namespaces/default/services/vtctld:web/proxy/app/ vtgate: vtgate: http://localhost:8001/api/v1/namespaces/default/services/vtgate-zone1:web/proxy/ Verify cluster You can check the state of your cluster with kubectl get pods,jobs. After a few minutes, it should show Architecture The Vitess platform consists of a number of server processes, command-line utilities, and web-based utilities, backed by a consistent metadata store. Depending on the current state of your application0 码力 | 254 页 | 949.63 KB | 1 年前3Vitess security audit
users can. VTAdmin consists of two components: 1. A web interface - VTAdmin-web 2. A server - VTAdmin-api 5 Vitess Security Audit, 2023 The web interface connects to the server which in turn forwards VTAdmin-api level, not VTAdmin-web; VTAdmin-web is merely a client. In other words, authentication and authorization are not enforced when using the web UI - VTAdmin-web - but when the web UI communicates with the boundaries for VTAdmin. We first consider the trust boundaries of VTAdmin-web and then of VTAdmin-api. VTAdmin-web VTAdmin-web is meant to be deployed in a trusted environment, meaning that an attacker0 码力 | 41 页 | 1.10 MB | 1 年前3Pentest-Report Vitess 02.2019
e3d16f ◦ The testers received unencumbered access to a Kubernetes test cluster hosted on Amazon Web Services, which was provided as a reference of an installation typical for a general Vitess deployment and no path traversal instructions can be submitted via the hook’s name. • The monitor and debug web interfaces were analyzed for common vulnerabilities like SQL injection or XSS. However, in all encountered options in undesirable locations like strings and similar. • The web interface was probed for XSS and other general web application flaws without any weaknesses being discovered. Additional0 码力 | 9 页 | 155.02 KB | 1 年前3
共 11 条
- 1
- 2