DBeaver User Guide v24.2.ea
Local client configuration Connection types Multiple datasource connections Configure connection initialization settings Managing Master password Security in DBeaver PRO SSH configuration SSL configuration Proxy configuration User Guide Table of contents Configure connection Network configuration settings DBeaver User Guide 24.2.ea. Page 3 of 1171. Kubernetes configuration AWS SSM configuration Shell Cloud Explorer System operations and security Databases authentication models Cloud databases configuration Cloud Explorer tools DBeaver User Guide 24.2.ea. Page 4 of 1171. Google Cloud Explorer Cloud0 码力 | 1171 页 | 94.79 MB | 1 年前3DBeaver Ultimate User Guide v24.2.ea
Local client configuration Connection types Multiple datasource connections Configure connection initialization settings Managing Master password Security in DBeaver PRO SSH configuration SSL configuration configuration Proxy configuration Kubernetes configuration User Guide Table of contents Configure connection Network configuration settings DBeaver Ultimate User Guide 24.2.ea. Page 3 of 1171. AWS AWS SSM configuration Shell commands Changing current user password Authentication models overview Database native DBeaver profile Kerberos authentication Microsoft Entra ID Authentication MongoDB0 码力 | 1171 页 | 94.65 MB | 1 年前3DBeaver Lite User Guide v24.2.ea
Local client configuration Connection types Multiple datasource connections Configure connection initialization settings Managing Master password Security in DBeaver PRO SSH configuration SSL configuration configuration Proxy configuration Kubernetes configuration User Guide Table of contents Configure connection Network configuration settings DBeaver Lite User Guide 24.2.ea. Page 3 of 1010. AWS SSM SSM configuration Shell commands Changing current user password Authentication models overview Database native DBeaver profile Kerberos authentication Microsoft Entra ID Authentication MongoDB PostgreSQL0 码力 | 1010 页 | 79.48 MB | 1 年前3Apache Cassandra™ 10 Documentation February 16, 2012
Planning 24 Calculating Usable Disk Capacity 24 Calculating User Data Size 24 Choosing Node Configuration Options 25 Storage Settings 25 Gossip Settings 25 Purging Gossip State on a Node 25 Partitioner 67 Deleting Columns and Rows 67 Dropping Column Families and Keyspaces 68 Configuration 68 Node and Cluster Configuration (cassandra.yaml) 68 Node and Cluster Initialization Properties 70 auto_bootstrap keystore_password 77 truststore 77 truststore_password 77 Keyspace and Column Family Storage Configuration 77 Keyspace Attributes 78 name 78 placement_strategy 78 strategy_options 78 Column Family0 码力 | 141 页 | 2.52 MB | 1 年前3Django CMS 3.11.10 Documentation
[https://docs.djangoproject.com/en/4.2/ref/settings/#std-setting-DATABASES] for the appropriate configuration for your chosen database backend. Confirming that you are not migrating a version 3 project Add necessary, but it’s useful. If included, should be at the start of the list. add the following configuration to your settings.py: Context processors Add "cms.context_processors.cms_settings" to TEMPLATES['OPTIONS'] unable to identify any further issues with your project. Some additional configuration is required however. Further required configuration URLs "sekizai.context_processors.sekizai",0 码力 | 493 页 | 1.44 MB | 6 月前0.03Ubuntu Desktop Training 2009
downgrade • User data stored in home directory • Easy to migrate and replicate user data and configuration to another computer • User data saved in multiple loca- tions • Difficult to backup and migrate network and sound icons for quick access to network and sound settings. You can check the network configuration of the computer and adjust the volume of your computer's speaker. The current date and time is network administrator. The following steps are for setting up a static IP address. a. In the Configuration box, select the Static IP address option. b. Type the IP address of your computer in the IP address0 码力 | 428 页 | 57.45 MB | 1 年前3Istio at Scale: How eBay is building a massive Multitenant Service Mesh using Istio
Request Traffic Response Traffic Specs synced from Federated Access Point L4 Configuration L7 Route Configuration watch Client Traffic tunneled to Ingress Gateways One Istio Deployment per service mesh span all clusters in an AZ - ○ Re-deployed Istio to AZ cluster ○ In Primary-Remote configuration within an AZ AZ AZ Cluster Ingress Gateways API Server Istiod East-West Gateway watch EDS, LDS, RDS push times) ■ Resource usage (CPU, memory, etc.) ○ Secondary Goal ■ Fine-tune configuration params - debounce interval, push concurrency, etc. #IstioCon Control-plane Scale Testing:0 码力 | 22 页 | 505.96 KB | 1 年前3Performance tuning and best practices in a Knative based, large-scale serverless platform with Istio
duration from Knative Ingress and istio VirtualService are created to Knative probe thinks the configuration works. o [Istio 1.5.4] Istio is picking up new VirtualService slowly 30s #IstioCon Istio x] Support for backpressure on XDS pushes to avoid overloading Envoy during periods of high configuration churn. This is disabled by default and can be enabled by setting the PILOT_ENABLE_FLOW_CONTROL • support for backpressure on XDS pushes to avoid overloading Envoy during periods of high configuration churn 30s #IstioCon Unleash maximum scalability by fully leveraging Istio features in Knative0 码力 | 23 页 | 2.51 MB | 1 年前3The Many Faces of Struct Tags
Tools (backups, restoration, monitoring…) Both rely heavily on struct tags for communication and configuration. What is a struct tag? From the official spec “A field declaration may be followed by an optional com/mitchellh/mapstructure Library for converting between structs and Go's builtin map. Why? "If you have configuration or an encoding that changes slightly depending on specific fields" In other words If it's easier data into a map first, then pull it into a struct based on one of its values. Command-line Configuration github.com/jessevdk/go-flags What is it? Alternative to Go's builtin flag package. Uses struct0 码力 | 18 页 | 148.80 KB | 1 年前3Redis TLS Origination through the sidecar
multiple microservices ● external Redis TLS only ● each microservice talks to Redis 1. Tedious configuration in the application 2. Improved visibility into Redis traffic Istio TLS Origination Architecture:0 码力 | 9 页 | 457.76 KB | 1 年前3
共 10 条
- 1