DBeaver User Guide v24.2.eaLocal client configuration Connection types Multiple datasource connections Configure connection initialization settings Managing Master password Security in DBeaver PRO SSH configuration SSL configuration Proxy configuration User Guide Table of contents Configure connection Network configuration settings DBeaver User Guide 24.2.ea. Page 3 of 1171. Kubernetes configuration AWS SSM configuration Shell Explorer overview AWS Cloud Explorer Azure Cloud Explorer System operations and security Databases authentication models Cloud databases configuration Cloud Explorer tools DBeaver User Guide 24.2.ea. Page0 码力 | 1171 页 | 94.79 MB | 1 年前3
DBeaver Ultimate User Guide v24.2.eaLocal client configuration Connection types Multiple datasource connections Configure connection initialization settings Managing Master password Security in DBeaver PRO SSH configuration SSL configuration configuration Proxy configuration Kubernetes configuration User Guide Table of contents Configure connection Network configuration settings DBeaver Ultimate User Guide 24.2.ea. Page 3 of 1171. AWS AWS SSM configuration Shell commands Changing current user password Authentication models overview Database native DBeaver profile Kerberos authentication Microsoft Entra ID Authentication MongoDB0 码力 | 1171 页 | 94.65 MB | 1 年前3
DBeaver Lite User Guide v24.2.eaLocal client configuration Connection types Multiple datasource connections Configure connection initialization settings Managing Master password Security in DBeaver PRO SSH configuration SSL configuration configuration Proxy configuration Kubernetes configuration User Guide Table of contents Configure connection Network configuration settings DBeaver Lite User Guide 24.2.ea. Page 3 of 1010. AWS SSM SSM configuration Shell commands Changing current user password Authentication models overview Database native DBeaver profile Kerberos authentication Microsoft Entra ID Authentication MongoDB PostgreSQL0 码力 | 1010 页 | 79.48 MB | 1 年前3
Apache Cassandra™ 10 Documentation February 16, 2012Planning 24 Calculating Usable Disk Capacity 24 Calculating User Data Size 24 Choosing Node Configuration Options 25 Storage Settings 25 Gossip Settings 25 Purging Gossip State on a Node 25 Partitioner 67 Deleting Columns and Rows 67 Dropping Column Families and Keyspaces 68 Configuration 68 Node and Cluster Configuration (cassandra.yaml) 68 Node and Cluster Initialization Properties 70 auto_bootstrap keystore_password 77 truststore 77 truststore_password 77 Keyspace and Column Family Storage Configuration 77 Keyspace Attributes 78 name 78 placement_strategy 78 strategy_options 78 Column Family0 码力 | 141 页 | 2.52 MB | 1 年前3
Ubuntu Desktop Training 2009......................... 349 9.1. Introduction ...................................... 350 9.2. System Documentation ...................... 351 9.3. Online Documentation ....................... 352 9 ...................... 391 10.3.1. Running a System Command Automatically at Start-Up ................. 391 10.3.2. Changing the Default Operat- ing System at Boot .......................... 393 10.3 Limited Course Overview About the Course. Ubuntu is a community developed Linux-based operating system freely available and suitable for laptops, desktops and servers. This course is based on Ubuntu 80 码力 | 428 页 | 57.45 MB | 1 年前3
Django CMS 3.11.10 Documentationinterface support for a variety of editors with advanced text editing features. a flexible plugin system that lets developers put powerful tools at the fingertips of editors, without overwhelming them with [https://docs.djangoproject.com/en/4.2/ref/settings/#std-setting-DATABASES] for the appropriate configuration for your chosen database backend. Confirming that you are not migrating a version 3 project Add necessary, but it’s useful. If included, should be at the start of the list. add the following configuration to your settings.py: Context processors Add "cms.context_processors.cms_settings" to TEMPLATES['OPTIONS']0 码力 | 493 页 | 1.44 MB | 6 月前0.03
Istio at Scale: How eBay is building a massive Multitenant Service Mesh using IstioRequest Traffic Response Traffic Specs synced from Federated Access Point L4 Configuration L7 Route Configuration watch Client Traffic tunneled to Ingress Gateways One Istio Deployment per service mesh span all clusters in an AZ - ○ Re-deployed Istio to AZ cluster ○ In Primary-Remote configuration within an AZ AZ AZ Cluster Ingress Gateways API Server Istiod East-West Gateway watch (Peer AuthN) using mutual TLS ○ Leverage SPIFFE Trust Domain ■ Trust Domain: Trust root of the system having separate root CA ■ Each workload gets unique identity based on K8s Service account - spiffe://0 码力 | 22 页 | 505.96 KB | 1 年前3
Performance tuning and best practices in a Knative based, large-scale serverless platform with IstioIngress Gateway. • Enable Secret Discovery Service (SDS) to monitor and mount secrets under istio-system to ingress gateway which contains credentials for https support of multi tenants. • Knative has duration from Knative Ingress and istio VirtualService are created to Knative probe thinks the configuration works. o [Istio 1.5.4] Istio is picking up new VirtualService slowly 30s #IstioCon Istio x] Support for backpressure on XDS pushes to avoid overloading Envoy during periods of high configuration churn. This is disabled by default and can be enabled by setting the PILOT_ENABLE_FLOW_CONTROL0 码力 | 23 页 | 2.51 MB | 1 年前3
The Many Faces of Struct TagsTools (backups, restoration, monitoring…) Both rely heavily on struct tags for communication and configuration. What is a struct tag? From the official spec “A field declaration may be followed by an optional com/mitchellh/mapstructure Library for converting between structs and Go's builtin map. Why? "If you have configuration or an encoding that changes slightly depending on specific fields" In other words If it's easier data into a map first, then pull it into a struct based on one of its values. Command-line Configuration github.com/jessevdk/go-flags What is it? Alternative to Go's builtin flag package. Uses struct0 码力 | 18 页 | 148.80 KB | 1 年前3
Redis TLS Origination through the sidecarmultiple microservices ● external Redis TLS only ● each microservice talks to Redis 1. Tedious configuration in the application 2. Improved visibility into Redis traffic Istio TLS Origination Architecture:0 码力 | 9 页 | 457.76 KB | 1 年前3
共 12 条
- 1
- 2













