CurveBS IO Processing FlowCurveBS I/O processing flow Before introducing IO processing flow, we first describe the overall architecture, data organization and topology structure of CURVE. CurveBS uses the central interface, such as read/write/aioread/aiowrite in data plane and open/create/rename/extend, etc in control plane. 2. Depending on libCurve, the application must be restarted every time the library is the NEBDServer, which affects services in few seconds. CurveBS IO processing flow Overall process The flow of user's read and write request to curve: 1. The user initiates a request (fd=10 码力 | 13 页 | 2.03 MB | 6 月前3
Cilium v1.8 DocumentationKernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog kernel technology called BPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because BPF runs inside the Linux kernel, Cilium security policies can have resolved a particular DNS name? Why Cilium & Hubble? BPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.10 DocumentationKernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog technology called eBPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because eBPF runs inside the Linux kernel, Cilium security policies can have resolved a particular DNS name? Why Cilium & Hubble? eBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 DocumentationKernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog technology called eBPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because eBPF runs inside the Linux kernel, Cilium security policies can have resolved a particular DNS name? Why Cilium & Hubble? eBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.9 DocumentationKernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog technology called eBPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because eBPF runs inside the Linux kernel, Cilium security policies can have resolved a particular DNS name? Why Cilium & Hubble? eBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.7 DocumentationKernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog kernel technology called BPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because BPF runs inside the Linux kernel, Cilium security policies can approaches to struggle to scale side by side with the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously growing0 码力 | 885 页 | 12.41 MB | 1 年前3
openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)Technology Communication 10,000 + mainstream applications on cloud native, big data CND, MEC, industrial control,etc. Integrated ecosystems and extensive compatibility through distributed kits Arm, x86, RISC-V DPUs/IPUs are also supporting the offloading of management- and control- plane components. This means that all management and control components of the data center infrastructure can be offloaded to Pod Client Link reliability and concurrency performance Server storage Permission/Resource control/DR/Security vStore 1 FS1 FS2 vStore 2 FS3 FS4 vStore 3 FS5 FS6 IP network FS File sharing0 码力 | 116 页 | 3.16 MB | 1 年前3
The DevOps HandbookThe DevOps Handbook – Part 3 The First Way – The Technical Practices of Flow 1. Introduction a. Goal – Enable & sustain fast flow of work by implementing continuous delivery i. Create the foundation of environments matched Prod. They fixed forward, but changes not put back into version control. Focused on version control and automated environment creation – time reduced from 8 weeks to 1 day b. ENABLE system are shared in a version control repository ii. Version control is for everyone in the value stream iii. Everything, everything, everything is checked into version control 1. Application code & dependencies0 码力 | 8 页 | 23.08 KB | 5 月前3
Cilium v1.6 Documentationkernel technology called BPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because BPF runs inside the Linux kernel, Cilium security policies can approaches to struggle to scale side by side with the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously growing and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services, traditional CIDR based security policies0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.5 Documentationkernel technology called BPF, which enables the dynamic inser�on of powerful security visibility and control logic within Linux itself. Because BPF runs inside the Linux kernel, Cilium security policies can approaches to struggle to scale side by side with the applica�on as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a con�nuously growing and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services, tradi�onal CIDR based security policies0 码力 | 740 页 | 12.52 MB | 1 年前3
共 159 条
- 1
- 2
- 3
- 4
- 5
- 6
- 16













