鸟哥的Linux私房菜:服务器架设篇 第三版以太网络最初是由全录公司 (Xerox PARC) 所建构出来的,而后透过 DEC, Intel 与 Xerox 合作将以太网络标 准化。 再经由 IEEE (Institute of Electrical and Electronic Engineers 注3) 这个国际著名的专 业组织利用一个 802 的项目制定出标准,之后有 19 家公司宣布支持 IEEE 所发布的 802.3 标准, script will not set any firewall rules. You are responsible for ensuring the security of your machine. You are STRONGLY recommended to use some kind of firewall rules. 1 - STANDALONE: Appropriate for Dependencies 10.2. 7.2 网络自动升级软件 - 196 - 本文档使用 书栈(BookStack.CN) 构建 13. --> Running transaction check <==开始检查有没有相依属性的软件问题 14. ---> Package javacc.x86_64 0:4.1-0.5.el6 set to be updated 15. .0 码力 | 795 页 | 17.63 MB | 1 年前3
 Cilium v1.10 DocumentationAdvanced Features Key-Value store clang+LLVM iproute2 Firewall Rules Mounted eBPF filesystem Privileges Upgrade Guide Running pre-flight check (Required) Upgrading Cilium Version Specific Notes Advanced the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously growing frequency. Protocol ports (e.g. TCP port 80 for flag when creating the cluster, as this will cause the Azure CNI plugin to install unwanted iptables rules. EKS The following command creates a Kubernetes cluster with eksctl using Amazon Elastic Kubernetes0 码力 | 1307 页 | 19.26 MB | 1 年前3
 Cilium v1.8 DocumentationAdvanced Features Key-Value store clang+LLVM iproute2 Firewall Rules Mounted eBPF filesystem Privileges Upgrade Guide Running pre-flight check (Required) Upgrading Cilium Version Specific Notes Advanced the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously growing frequency. Protocol ports (e.g. TCP port 80 for deploy the “connectivity-check” to test connectivity between pods. It is recommended to create a separate namespace for this. kubectl create ns cilium-test Deploy the check with: kubectl apply -n cilium-test0 码力 | 1124 页 | 21.33 MB | 1 年前3
 Cilium v1.9 DocumentationAdvanced Features Key-Value store clang+LLVM iproute2 Firewall Rules Mounted eBPF filesystem Privileges Upgrade Guide Running pre-flight check (Required) Upgrading Cilium Version Specific Notes Advanced the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously growing frequency. Protocol ports (e.g. TCP port 80 for deploy the “connectivity-check” to test connectivity between pods. It is recommended to create a separate namespace for this. kubectl create ns cilium-test Deploy the check with: kubectl apply -n cilium-test0 码力 | 1263 页 | 18.62 MB | 1 年前3
 Cilium v1.6 Documentationand Required Kernel Version Key-Value store clang+LLVM iproute2 Firewall Rules Privileges Upgrade Guide Running pre-flight check (Required) Upgrading Micro Versions Upgrading Minor Versions Step 3: Rolling the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously growing frequency. Protocol ports (e.g. TCP port 80 for 1/1 Running 0 13m Deploy the connectivity test You can deploy the “connectivity-check” to test connectivity between pods. kubectl apply -f https://raw.githubusercontent.com/cilium/cilium/v10 码力 | 734 页 | 11.45 MB | 1 年前3
 Cilium v1.11 DocumentationAdvanced Features Key-Value store clang+LLVM iproute2 Firewall Rules Mounted eBPF filesystem Privileges Upgrade Guide Running pre-flight check (Required) Upgrading Cilium Version Specific Notes Advanced the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously growing frequency. Protocol ports (e.g. TCP port 80 for flag when creating the cluster, as this will cause the Azure CNI plugin to install unwanted iptables rules. EKS The following commands create a Kubernetes cluster with eksctl using Amazon Elastic Kubernetes0 码力 | 1373 页 | 19.37 MB | 1 年前3
 Cilium v1.7 Documentationand Required Kernel Version Key-Value store clang+LLVM iproute2 Firewall Rules Privileges Upgrade Guide Running pre-flight check (Required) Upgrading Cilium Step 3: Rolling Back Version Specific Notes the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously growing frequency. Protocol ports (e.g. TCP port 80 for 1/1 Running 0 13m Deploy the connectivity test You can deploy the “connectivity-check” to test connectivity between pods. kubectl apply -f https://raw.githubusercontent.com/cilium/cilium/v10 码力 | 885 页 | 12.41 MB | 1 年前3
 Cilium v1.5 DocumentationSummary Linux Distribu�on Compa�bility Matrix Linux Kernel Key-Value store clang+LLVM iproute2 Firewall Rules Privileges Upgrade Guide Running a pre-flight DaemonSet Upgrading Micro Versions Upgrading Minor Versions the applica�on as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a con�nuously growing frequency. Protocol ports (e.g. TCP port 80 for correctly, a DNS reverse lookup on a pod IP must map back to pod name. If you are using CoreDNS, check the CoreDNS ConfigMap and validate that in-addr.arpa and ip6.arpa are listed as wildcards for the0 码力 | 740 页 | 12.52 MB | 1 年前3
 Debian 维护者指南. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 5.6 debian/rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 5 . . . . . . . . . . . . . 35 5.6.2 简单的 debian/rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 5.6.3 自定义 debian/rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 5.6.4 debian/rules 中的变量 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 5.6.5 可重现的构建 . . . . . . . . . . . . . . . . . . . . . . . . . . . .0 码力 | 142 页 | 1.11 MB | 1 年前3
 Linux command line for you and me Documentation Release 0.1Installation Tables, chains and rules filter table nat table iptables command View the existing rules Appending rules to INPUT chain Flushing all rules Example of a series of rules Delete a rule based on rule rule number Delete a rule directly Saving the rules A blog post from Major Hayden Debugging firewall rules Random things xclip to copy from terminal w command How long is the system running? Finding CPU You can chain the flags, so instead of rm -r -f you can as well type rm -rf. But, always double check before you use rm -rf command, if you by mistake give this command in your home directory, or any0 码力 | 124 页 | 510.85 KB | 1 年前3
共 74 条
- 1
 - 2
 - 3
 - 4
 - 5
 - 6
 - 8
 













