Cilium v1.10 Documentationpackets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts EDT-based (Earliest Departure Time) rate-limiting with eBPF for container traffic that is egressing a node. This allows to significantly reduce transmission tail latencies for applications and to avoid locking0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.9 Documentationpackets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts EDT-based (Earliest Departure Time) rate-limiting with eBPF for container traffic that is egressing a node. This allows to significantly reduce transmission tail latencies for applications and to avoid locking0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.8 Documentationpackets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts io/docs/setup/learning-environment/minikube/] to demonstrate deployment and operation of Cilium in a single-node Kubernetes cluster. The minikube VM requires approximately 5GB of RAM and supports hypervisors like0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.11 Documentationpackets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts EDT-based (Earliest Departure Time) rate-limiting with eBPF for container traffic that is egressing a node. This allows to significantly reduce transmission tail latencies for applications and to avoid locking0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.5 DocumentationTroubleshoo�ng Monitoring & Metrics Exported Metrics Cilium as a Kubernetes pod Cilium as a host-agent on a node Troubleshoo�ng Component & Cluster Health Connec�vity Problems Policy Troubleshoo�ng Automa�c Diagnosis network packets emi�ed by the applica�on containers, allowing to validate the iden�ty at the receiving node. Security iden�ty management is performed using a key-value store. Secure access to and from external This means that each host can allocate IPs without any coordina�on between hosts. The following mul� node networking models are supported: Overlay: Encapsula�on based virtual network spawning all hosts.0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.7 Documentationpackets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts io/docs/getting-started-guides/minikube/] to demonstrate deployment and operation of Cilium in a single-node Kubernetes cluster. The minikube VM requires approximately 5GB of RAM and supports hypervisors like0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.6 Documentationpackets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts io/docs/getting-started-guides/minikube/] to demonstrate deployment and operation of Cilium in a single-node Kubernetes cluster. The minikube VM requires approximately 5GB of RAM and supports hypervisors like0 码力 | 734 页 | 11.45 MB | 1 年前3
Apache Kyuubi 1.6.1 DocumentationYARN [https://hadoop.apache.org/docs/current/hadoop-yarn/hadoop-yarn-site/YARN.html], Kubernetes (K8s) [https://kubernetes.io/] to create the Spark application; 2) a user account can only access data and URL by running these commands: export NODE_PORT=$(kubectl get --namespace kyuubi -o jsonpath=" {.spec.ports[0].nodePort}" services kyuubi-svc) export NODE_IP=$(kubectl get nodes --namespace kyuubi kyuubi -o jsonpath=" {.items[0].status.addresses[0].address}") echo $NODE_IP:$NODE_PORT Using hive beeline Using Hive Beeline to opening a connection. Remove kyuubi helm uninstall kyuubi-helm -n ${namespace_name}0 码力 | 401 页 | 5.42 MB | 1 年前3
Apache Kyuubi 1.6.0 DocumentationYARN [https://hadoop.apache.org/docs/current/hadoop-yarn/hadoop-yarn-site/YARN.html], Kubernetes (K8s) [https://kubernetes.io/] to create the Spark application; 2) a user account can only access data and URL by running these commands: export NODE_PORT=$(kubectl get --namespace kyuubi -o jsonpath=" {.spec.ports[0].nodePort}" services kyuubi-svc) export NODE_IP=$(kubectl get nodes --namespace kyuubi kyuubi -o jsonpath=" {.items[0].status.addresses[0].address}") echo $NODE_IP:$NODE_PORT Using hive beeline Using Hive Beeline to opening a connection. Remove kyuubi helm uninstall kyuubi-helm -n ${namespace_name}0 码力 | 391 页 | 5.41 MB | 1 年前3
Apache Kyuubi 1.8.0-rc0 Documentationdistributed backend or can schedule distributed tasks at runtime. They can process data on single-node machines or clusters, such as YARN and Kubernetes. Besides, the Kyuubi server also supports running true (deprecated) When true, the engine registers with hostname to zookeeper. When Spark runs on K8s with cluster mode, set to false to ensure that server can connect to engine bool ean 1.3.0 kyuubi Period to tolerant Driver Pod ephemerally invisible after submitting. In some Resource Managers, e.g. K8s, the Driver Pod is not visible immediately after spark-submit is returned. durat ion 1.7.1 kyuubi0 码力 | 428 页 | 5.28 MB | 1 年前3
共 512 条
- 1
- 2
- 3
- 4
- 5
- 6
- 52













