DBeaver Ultimate User Guide v24.2.eaYou can connect to databases using secure authentication via Kerberos or GCP, AWS, and Azure cloud services. Kerberos is an authentication protocol, the default authentication technology used in Microsoft supported databases Learn more about authentication via Kerberos Users can connect to all company services using only one login and password. This is possible if you use SSO - Single Sign-On authentication When a user connects to the database, DBeaver opens a web browser with SSO authentication. DBeaver supports the following SSO authentication services: AWS SSO Password for one project Secure authentication0 码力 | 1171 页 | 94.65 MB | 1 年前3
DBeaver User Guide v24.2.eaYou can connect to databases using secure authentication via Kerberos or GCP, AWS, and Azure cloud services. Kerberos is an authentication protocol, the default authentication technology used in Microsoft supported databases Learn more about authentication via Kerberos Users can connect to all company services using only one login and password. This is possible if you use SSO - Single Sign-On authentication When a user connects to the database, DBeaver opens a web browser with SSO authentication. DBeaver supports the following SSO authentication services: AWS SSO GCP SSO Azure Password for one project0 码力 | 1171 页 | 94.79 MB | 1 年前3
Apache Cassandra™ 10 Documentation February 16, 2012Running the Portfolio Demo Sample Application 6 About the Portfolio Demo Use Case 6 Running the Demo Web Application 6 Exploring the Sample Data Model 7 Looking at the Schema Definitions in Cassandra-CLI Cluster Deployment 22 Selecting Hardware 22 Memory 22 CPU 22 Disk 23 Network 23 Planning an Amazon EC2 Cluster 23 Capacity Planning 24 Calculating Usable Disk Capacity 24 Calculating User Data Cassandra Binary Installations 32 Installing JNA 32 Next Steps 32 Initializing a Cassandra Cluster on Amazon EC2 Using the DataStax AMI 32 Creating an EC2 Security Group for DataStax Community Edition 330 码力 | 141 页 | 2.52 MB | 1 年前3
DBeaver Lite User Guide v24.2.eaYou can connect to databases using secure authentication via Kerberos or GCP, AWS, and Azure cloud services. Kerberos is an authentication protocol, the default authentication technology used in Microsoft supported databases Learn more about authentication via Kerberos Users can connect to all company services using only one login and password. This is possible if you use SSO - Single Sign-On authentication When a user connects to the database, DBeaver opens a web browser with SSO authentication. DBeaver supports the following SSO authentication services: AWS SSO Password for one project Secure authentication0 码力 | 1010 页 | 79.48 MB | 1 年前3
Ubuntu Desktop Training 2009a Wireless Card .............. 49 3.1.4. Using a Dial-up Connection ....... 50 3.2. Browsing the Web .............................. 53 3.3. Using an RSS feed reader .................... 56 3.3.1. Liferea ......... 317 8.9. Playing Online Media ........................ 324 8.9.1. Watching Videos in a Web Browser .......................................... 324 8.10. Editing Videos ..................... Support .......................... 355 9.4.1. Mailing Lists .......................... 355 9.4.2. Web Forums .......................... 358 9.4.3. IRC Channels ......................... 360 9.4.4. LoCo0 码力 | 428 页 | 57.45 MB | 1 年前3
Ozone meetup Nov 10, 2022 Ozone User Group Summitaccounts or tenants. Only administrators can create or delete volumes. • Buckets are similar to Amazon S3 buckets. A bucket can contain any number of keys, but buckets cannot contain other buckets. TYPES Problems • Directory rename and delete were slow and non-atomic – Could cause problems for services expecting Ozone to be a drop-in replacement for HDFS • Strict S3 compatibility was opt in/out All rights reserved. WHICH BUCKET TYPE SHOULD YOU USE? • FSO: – Services built for HDFS – Analytic workloads • OBS: – Services built for S3 – Object store workloads IMPALA + OZONE Featuring FSO0 码力 | 78 页 | 6.87 MB | 1 年前3
Istio at Scale: How eBay is building a massive Multitenant Service Mesh using Istio#IstioCon eBay Applications eBay is powered by ● More than 5,000 Microservices ranging from ○ API services, Search Engine, etc. ○ Databases, Key-Value stores - Oracle, MySQL, etc. ○ Big data systems & an AZ ○ Each K8s cluster ~ 200 - 5,000 nodes ○ Upto 100,000 Pods in a cluster ○ 10,000+ K8s services - including prod, pre-prod, staging, etc. ● Applications deployment for HA ○ In all regions Hosts global services - Global IPAM, Access-control Policy store, etc. ● AZ Control Plane ○ Syncs specs to workload K8s clusters in the AZ ○ Shared-Nothing Architecture ■ Hosts services catering to0 码力 | 22 页 | 505.96 KB | 1 年前3
Service mesh security best practices: from implementation to verification Service Proxy Ingress 1. Define ingress security policies to control accesses to services. Deploy web application firewall to defend against DDoS, injection, remote execution attacks. Edge0 码力 | 29 页 | 1.77 MB | 1 年前3
Django CMS 3.11.10 Documentationauthoring to being published. Overview django CMS is a modern web publishing platform built with Django [https://www.djangoproject.com], the web application framework “for perfectionists with deadlines”. django CMS is that it offers a powerful yet easy to use interface for most common tasks of setting up a web site. You can focus on any specific needs of your project. Before we begin the django CMS tutorial django-cms-quickstart docker compose build web docker compose up -d database_default docker compose run web python manage.py migrate docker compose run web python manage.py createsuperuser docker compose0 码力 | 493 页 | 1.44 MB | 6 月前0.03
Is Your Virtual Machine Really Ready-to-go with Istio?Jianfei Hu, Google Cloud Next ‘19 #IstioCon Why Add VMs to the Mesh? ● = Why Service Mesh? ○ More services = more complexity ○ Need consistent policy enforcement ○ Need consistent metrics aggregation ● Traffic management ○ Load balancing for VMs, failover, A/B testing, modern rollouts for VM services ● Security ○ Enforce the same policies in the same way, across compute environments ● Observability #IstioCon Legacy Scenarios ● Stateful applications ○ Data store ● Legacy software ○ Financial services ○ Enterprise/Workshop applications ○ Hard to lift and shift ● Packaged software ○ Non-Linux0 码力 | 50 页 | 2.19 MB | 1 年前3
共 13 条
- 1
- 2













