Django CMS 3.11.10 Documentation
versions of django CMS, the core django CMS since version 4 has been stripped of some functionality to allow for better implementations. The two most important examples are the now separate apps django CMS versioning the menu. menu_pool.register_menu(PollsMenu) Content creation wizards Content creation wizards allow you to make use of the toolbar’s Create button in your own applications. It opens up a simple dialog integrated into django CMS, for example: django CMS would not be aware of it, and - for example - would allow your users to create a CMS page with the same /records slug, that could never be reached. The application’s0 码力 | 493 页 | 1.44 MB | 6 月前0.03DBeaver User Guide v24.2.ea
commands Changing current user password Authentication models overview Database native DBeaver profile Kerberos authentication Microsoft Entra ID Authentication MongoDB PostgreSQL Pgpass PostgreSQL PostgreSQL SSPI (Windows SSO) Oracle authentication models Authentication Salesforce Mysql two-factor authentication Cloud Explorer overview AWS Cloud Explorer Azure Cloud Explorer System operations and and security Databases authentication models Cloud databases configuration Cloud Explorer tools DBeaver User Guide 24.2.ea. Page 4 of 1171. Google Cloud Explorer Cloud Storage Managing AWS permissions0 码力 | 1171 页 | 94.79 MB | 1 年前3DBeaver Ultimate User Guide v24.2.ea
commands Changing current user password Authentication models overview Database native DBeaver profile Kerberos authentication Microsoft Entra ID Authentication MongoDB PostgreSQL Pgpass PostgreSQL PostgreSQL SSPI (Windows SSO) Oracle authentication models Authentication Salesforce Mysql two-factor authentication Cloud Explorer overview AWS Cloud Explorer Azure Cloud Explorer Google Cloud Explorer Explorer System operations and security Databases authentication models Cloud databases configuration Cloud Explorer tools DBeaver Ultimate User Guide 24.2.ea. Page 4 of 1171. Cloud Storage Managing AWS0 码力 | 1171 页 | 94.65 MB | 1 年前3DBeaver Lite User Guide v24.2.ea
commands Changing current user password Authentication models overview Database native DBeaver profile Kerberos authentication Microsoft Entra ID Authentication MongoDB PostgreSQL Pgpass PostgreSQL PostgreSQL SSPI (Windows SSO) Oracle authentication models Authentication Salesforce Mysql two-factor authentication Managing AWS permissions Working with AWS SSO AWS credentials System operations and security security Databases authentication models Cloud databases configuration Cloud settings in DBeaver DBeaver Lite User Guide 24.2.ea. Page 4 of 1010. Database drivers How to add additional artifacts to0 码力 | 1010 页 | 79.48 MB | 1 年前3Apache Cassandra™ 10 Documentation February 16, 2012
Settings Configuration 83 Heap Sizing Options 83 JMX Options 83 Further Reading on JVM Tuning 84 Authentication and Authorization Configuration 84 access.properties 84 passwd.properties 85 Logging Configuration with no single point of failure. Cassandra provides a powerful dynamic schema data model designed to allow for maximum flexibility and performance at scale. Getting Started with Cassandra Getting started http://localhost:8983/portfolio (if running on the local machine) or http://ip>:8983/portfolio (if running remotely - specify the correct IP address of the remote server). This will open the Portfolio Manager 0 码力 | 141 页 | 2.52 MB | 1 年前3Ubuntu Desktop Training 2009
comes in live-CD mode which means you can use the OS directly from the CD without installing it on a host computer. If you like what you see, install it. If you don't, pass it on to a friend. The live-CD external device is connected to your computer, Ubuntu automatically displays its icon on the desktop to allow easy access to the device. Figure 2.2. Desktop Icons Ubuntu Desktop Components 23 Student Guide connection. Note: Most broadband providers will use Dynamic Host Control Protocol (DHCP) to provide you with an IP address. If a Static IP address is required, it will be provided by your network administrator0 码力 | 428 页 | 57.45 MB | 1 年前3Service mesh security best practices: from implementation to verification
Ingress Token exchange 1. Istio authentication and authorization policies for every service: mTLS to defend against data exfiltration; deny by default. Credential (token, cookie, etc) lifecycle Demo Only allow authorized images Security Lifecycle Concepts Secure Monitor Enforce Verify Demo: mesh security lifecycle Demo Only allow authorized images Only allow authorized exceptions Concepts Secure Monitor Enforce Verify Demo: mesh security lifecycle Demo Only allow authorized images Only allow authorized exceptions Disallow non-strict mTLS Security Lifecycle Concepts Secure0 码力 | 29 页 | 1.77 MB | 1 年前3Performance tuning and best practices in a Knative based, large-scale serverless platform with Istio
51ch62kjrnd.svc.cluster.local http: route: - destination: host: {revision-3}. 51ch62kjrnd.svc.cluster.local weight: 10 - destination: host: {revision-2}. 51ch62kjrnd.svc.cluster.local weight: 90 Knative enabled • mutual TLS is enabled to secure the user application traffic end to end in production • Allow platform to use Istio authorization policy to control the access to each Knative service based on scalability solution. o Activator needs to probe the service endpoint since it cannot access pods by IP directly. And it takes time for Istiod to discover the endpoint of ready pods and then push them0 码力 | 23 页 | 2.51 MB | 1 年前3Is Your Virtual Machine Really Ready-to-go with Istio?
Virtual Machine Integration Odyssey, Jimmy Song #IstioCon V0.2 Mesh Expansion ● Prerequisites ○ IP connectivity to the endpoints in the mesh ○ Istio control plane services (Pilot, Mixer, CA) accessible Dnsmasq accepts DNS queries 2. Access the built-in Kube DNS (exposed by ILB) 3. Obtain the Cluster IP resolved 4. Traffic intercepted by the sidecar proxy 5. xDS ■ Traffic forwarded to ingress in the local SVC IP: 10.4.4.4 #IstioCon DNS Issues on VMs accessing K8s SVCs 1. DNS query for httpbin.ns1.svc.cluster.local 2. DNS response – no such host httpbin.ns1.svc.cluster.local SVC IP: 10.4.4.40 码力 | 50 页 | 2.19 MB | 1 年前3Accelerate Istio-CNI with ebpf
#IstioCon Accelerate Istio-CNI with ebpf Xu Yizhou & Guo Ruijing #IstioCon Agenda ● Istio-CNI ● tcp/ip stack overhead between sidecar and service ● Background knowledge of ebpf ● Acceleration for Inbound/Outbound/Envoy Tcp/ip stack overhead between sidecar and service Overhead sidecar traffic from 3 scopes ● Inbound ● Outbound ● Envoy to Envoy(same host) #IstioCon Dataflow After Acceleration(same host) In the case of Inbound, 4-tuple key may conflict due to same src/dst ip address #IstioCon Use pod ip as hash key Use pod_ip to generate a unique key is a way to distinguish socket from different0 码力 | 15 页 | 658.90 KB | 1 年前3
共 13 条
- 1
- 2