openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)better architecture and more flexible deployments. Most mainstream offload solutions involve splitting components. However, this approach has several drawbacks. • Developers must understand the code and dockerd, as well as the virtualization management plane libvirtd. It eliminates the need of splitting over 10,000 lines of code, thereby reducing the workload of adapting and maintaining by almost deploy HPC applications on different hosts, you only need to modify the configuration file. • The log management system automatically records all information during HPC application deployment. • The software0 码力 | 116 页 | 3.16 MB | 1 年前3
THE LINUX COMMAND LINEWilliam E. Shotts, Jr. /usr/share, 21 /usr/share/dict, 219 /usr/share/doc, 21, 45 /var, 22 /var/log, 22 /var/log/messages, 22, 57, 166 (( )) compound command, 404, 409 [ command, 365 A a2ps command, 292 365 history, 74–76 parameter, 64, 65–66, 319, 323, 399 pathname, 60, 65, 394 tilde, 61, 65 word splitting, 65 expressions arithmetic, 62, 396, 404, 406, 416 conditional, 366 ext3 filesystem, 169 extended command, 41 while compound command, 358 wildcards, 26, 53, 60, 216, 221 wodim command, 173 word splitting, 65–67 world, 78 WYSIWYG (What You See Is What You Get), 286 X X Window System, 5, 77, 185 xargs0 码力 | 15 页 | 2.13 MB | 1 年前3
This Debian Reference (version 2.109) . . . . . . . . . . . . 143 9.3.1 The log daemon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 9.3.2 Log analyzer . . . . . . . . . . . . . . . forensic analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 9.8.5 Splitting a large file into small files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . formula . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 2.12 The log files for package activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .0 码力 | 266 页 | 1.25 MB | 1 年前3
Ubuntu Desktop Training 2009depending on the task you perform, you can split the windows into different workspaces. Figure 2.19. Splitting Windows into Workspaces By default, Ubuntu provides two workspaces. If you want to split the windows the language that you want set as default, and click OK. 6. For the changes to take effect, log off and then log on again. Nice to Know: You can change the language as many times as you would like and password information in the New user account dialogue box. a. Type the name with which you want to log on to your computer in the Username box. 36 Chapter 2. Exploring the Ubuntu Desktop Ubuntu Desktop0 码力 | 428 页 | 57.45 MB | 1 年前3
Cilium v1.8 Documentation"generic-veth", "cniVersion": "0.3.1", "plugins": [ { "type": "calico", "log_level": "info", "datastore_type": "kubernetes", "mtu": 1440, "ipam": { [https://github.com/cilium/cilium/issues/15596]) Validate that the current CNI plugin is using veth 1. Log into one of the worker nodes using SSH 2. Run ip -d link to list all network devices on the node. upload_logs.py Uploading Stormtroopers Performance Logs created : {'_index': 'troop_logs', '_type': 'log', '_id': '1', '_version': 1, 'result': 'created', '_shards': {'total': 2, 'successful': 1, 'failed':0 码力 | 1124 页 | 21.33 MB | 1 年前3
Ubuntu Server Guide 18.04update the system. There are three options: • No automatic updates: this requires an administrator to log into the machine and manually install updates. • Install security updates automatically: this will Navigate to the Manual menu entry 2. Select the Configure iSCSI Volumes menu entry 3. Choose the Log into iSCSI targets 4. You will be prompted to Enter an IP address to scan for iSCSI targets. with Navigate toand hit ENTER. 9. If successful, you will come back to the menu asking you to Log into iSCSI targets. Navigate to Finish and hit ENTER The newly connected iSCSI disk will appear in 0 码力 | 413 页 | 1.40 MB | 1 年前3
Cilium v1.10 Documentation"generic-veth", "cniVersion": "0.3.1", "plugins": [ { "type": "calico", "log_level": "info", "datastore_type": "kubernetes", "mtu": 1440, "ipam": { [https://github.com/cilium/cilium/issues/15596]) Validate that the current CNI plugin is using veth 1. Log into one of the worker nodes using SSH 2. Run ip -d link to list all network devices on the node. upload_logs.py Uploading Stormtroopers Performance Logs created : {'_index': 'troop_logs', '_type': 'log', '_id': '1', '_version': 1, 'result': 'created', '_shards': {'total': 2, 'successful': 1, 'failed':0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.9 Documentation"generic-veth", "cniVersion": "0.3.1", "plugins": [ { "type": "calico", "log_level": "info", "datastore_type": "kubernetes", "mtu": 1440, "ipam": { [https://github.com/cilium/cilium/issues/15596]) Validate that the current CNI plugin is using veth 1. Log into one of the worker nodes using SSH 2. Run ip -d link to list all network devices on the node. need to be copied to your external workload. Install and configure Cilium on external workloads Log in to the external workload. First make sure the hostname matches the name used in the CiliumExternalWorkload0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.11 Documentation"generic-veth", "cniVersion": "0.3.1", "plugins": [ { "type": "calico", "log_level": "info", "datastore_type": "kubernetes", "mtu": 1440, "ipam": { [https://github.com/cilium/cilium/issues/15596]) Validate that the current CNI plugin is using veth 1. Log into one of the worker nodes using SSH 2. Run ip -d link to list all network devices on the node. upload_logs.py Uploading Stormtroopers Performance Logs created : {'_index': 'troop_logs', '_type': 'log', '_id': '1', '_version': 1, 'result': 'created', '_shards': {'total': 2, 'successful': 1, 'failed':0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.6 Documentation"generic-veth", "cniVersion": "0.3.1", "plugins": [ { "type": "calico", "log_level": "info", "datastore_type": "kubernetes", "mtu": 1440, "ipam": { majority of CNI plugins use such a model. Validate that the current CNI plugin is using veth 1. Log into one of the worker nodes using SSH 2. Run ip -d link to list all network devices on the node. upload_logs.py Uploading Stormtroopers Performance Logs created : {'_index': 'troop_logs', '_type': 'log', '_id': '1', '_version': 1, 'result': 'created', '_shards': {'total': 2, 'successful': 1, 'failed':0 码力 | 734 页 | 11.45 MB | 1 年前3
共 65 条
- 1
- 2
- 3
- 4
- 5
- 6
- 7













