Kotlin 1.9.10 官方文档 中文版
平台间共享代码 接入平台相关 API 分层项目结构 Android 源代码集布局 添加依赖项 添加依赖项 添加 Android 依赖项 添加 iOS 依赖项 运行测试 构件编译项 配置编译项 构建最终原生二进制文件 多平台 Gradle DSL 参考 范例 FAQ 向团队介绍跨平台移动端开发 Kotlin 多平台兼容性指南 Kotlin 多平台移动端插件版本发布 平台 互操作性 与 Swift/Objective-C 互操作性 Kotlin/Native 开发 Apple framework——教程 CocoaPods 集成 CocoaPods 概述 添加对 Pod 库的依赖 使用 Kotlin Gradle 项目作为 CocoaPods 依赖项 CocoaPods Gradle 插件 DSL 参考 Kotlin/Native 库 平台库 Kotlin/Native 元数据(kotlinx-metadata-jvm)↗ Ktor↗ 语言参考 关键字与操作符 语法↗ 语言规范↗ 工具 构建工具 Gradle Gradle 概述 Gradle 入门——教程 配置 Gradle 项目 Kotlin Gradle 插件中的编译器选项 Kotlin Gradle 插件中的编译项与缓存 支持 Gradle 插件变体 Maven Ant Dokka 简介0 码力 | 3753 页 | 29.69 MB | 1 年前3
Cilium v1.10 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter OM" export AZURE_RESOURCE_GROUP="${NAME}-group" az group create --name "${AZURE_RESOURCE_GROUP}" -l westus2 # Create AKS cluster az aks create \ --resource-group "${AZURE_RESOURCE_GROUP}" \ --name none # Get the credentials to access the cluster with kubectl az aks get-credentials --resource-group "${AZURE_RESOURCE_GROUP}" -- name "${NAME}" AKS (Azure IPAM) Note Azure IPAM offers integration with0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.9 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter paths include with and without service load- balancing and various network policy combinations. The pod name indicates the connectivity variant and the readiness and liveness gate indicates success or failure 65s pod-to-a-79546bc469-rl2qq 1/1 Running 0 66s pod-to-a-allowed-cnp-58b7f7fb8f-lkq7p 1/1 Running 0 66s pod-to-a-de0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.11 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter OM" export AZURE_RESOURCE_GROUP="${NAME}-group" az group create --name "${AZURE_RESOURCE_GROUP}" -l westus2 # Create AKS cluster az aks create \ --resource-group "${AZURE_RESOURCE_GROUP}" \ --name none # Get the credentials to access the cluster with kubectl az aks get-credentials --resource-group "${AZURE_RESOURCE_GROUP}" -- name "${NAME}" AKS (Azure IPAM) Note Azure IPAM offers integration with0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.8 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter paths include with and without service load- balancing and various network policy combinations. The pod name indicates the connectivity variant and the readiness and liveness gate indicates success or failure 67s pod-to-a-allowed-cnp-87b5895c8-bfw4x 1/1 Running 0 68s pod-to-a-b76ddb6b4-2v4kb 1/1 Running 0 68s pod-to-a-denie0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.7 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter paths include with and without service load- balancing and various network policy combinations. The pod name indicates the connectivity variant and the readiness and liveness gate indicates success or failure 4m50s pod-to-a-59b5fcb7f6-gq4hd 1/1 Running 0 4m50s pod-to-a-allowed-cnp-55f885bf8b-5lxzz 1/1 Running 0 4m50s pod-to-a-ext0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.6 Documentationtransparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter installation procedure. The default settings will store all required state using Kubernetes custom resource definitions (CRDs). This is the simplest installation method as it only depends on Kubernetes and for the TLS certificates between etcd peers to work correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS, check the CoreDNS ConfigMap and validate that in-addr.arpa0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.5 DocumentationKubernetes Endpoint Lifecycle Troubleshoo�ng Monitoring & Metrics Exported Metrics Cilium as a Kubernetes pod Cilium as a host-agent on a node Troubleshoo�ng Component & Cluster Health Connec�vity Problems Policy transparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container iden�ty (in contrast to IP address iden�fica�on in tradi�onal systems) and can filter on official Kubernetes documenta�on [h�ps://kubernetes.io/docs/setup/independent/create-cluster- kubeadm/#pod-network]. Standard Installation This guides takes you through the steps required to set up Cilium0 码力 | 740 页 | 12.52 MB | 1 年前3
Apache Kyuubi 1.9.0-SNAPSHOT Documentationplays the role of a unified gateway. The server enables simplified, secure access to any cluster resource through an entry point to deploy different workloads for end(remote) users. Behind this single entry plane, the Kyuubi server provides a centralized authentication layer to reduce the risk of data and resource breaches. It supports various protocols, such as LDAP and Kerberos, for securing networking between themselves. The resource acquirement and data and metadata access all happen within their own engine. Thus, cluster managers and storage providers can easily guarantee data and resource security. Besides0 码力 | 405 页 | 4.96 MB | 1 年前3
Apache Kyuubi 1.8.1 Documentationplays the role of a unified gateway. The server enables simplified, secure access to any cluster resource through an entry point to deploy different workloads for end(remote) users. Behind this single entry plane, the Kyuubi server provides a centralized authentication layer to reduce the risk of data and resource breaches. It supports various protocols, such as LDAP and Kerberos, for securing networking between themselves. The resource acquirement and data and metadata access all happen within their own engine. Thus, cluster managers and storage providers can easily guarantee data and resource security. Besides0 码力 | 405 页 | 5.28 MB | 1 年前3
共 615 条
- 1
- 2
- 3
- 4
- 5
- 6
- 62













