ubuntu server guide2 High Availability 3 ubuntu-ha-introduction Introduction 3 ubuntu-ha-pacemaker-resource-agents Pacemaker - resource agents 3 ubuntu-ha-pacemaker-fence-agents Pacemaker - fence agents 3 ubuntu-ha-drbd does not supported configuring any of the many, many options that LVM supports when creating volume groups and logical volumes. Selecting boot devices On all architectures other than s390x, the bootloader partition and replace it with two smaller ones. The installer allows the creation of LVM volume groups and logical volumes and MD raid devices, but does not allow tweaking of the parameters – for example0 码力 | 486 页 | 3.33 MB | 1 年前3
Ubuntu Server Guide 18.04options you can look through /boot/config-4.14.0-server. Also, Linux Kernel in a Nutshell3 is a great resource on the options available. 1.3. Backing Up • Before installing Ubuntu Server Edition you should packages: Executes aptitude allowing you to individually select packages. Installing the package groups is accomplished using the tasksel utility. One of the important differences between Ubuntu (or Debian) Volumes. • vgdisplay: shows information about Volume Groups. • lvdisplay: shows information about Logical Volumes. 5.2.3. Extending Volume Groups Continuing with srv as an LVM volume example, this section0 码力 | 413 页 | 1.40 MB | 1 年前3
openEuler 21.03 技术白皮书libvirt Virtualization/ Containers StratoVirt iSula Compilers Apps Desktops UKUI/DDE/Xfce DB Web Resource orchestration Messaging middleware Live kernel upgrade File systems Chips and peripheral drivers porting performance optimized for control groups (cgroups): openEuler 21.03 eliminates the dependence on the read and write semaphores of thread groups. It introduces time namespaces to facilitate detection method helps resource users determine a proper workload and enables the system to apply an efficient resource scheduling policy. The benefits include maximized system resource utilization and0 码力 | 21 页 | 948.66 KB | 1 年前3
Cilium v1.10 DocumentationReporting a problem Community Weekly Community Meeting Slack Slack channels Special Interest Groups All SIGs How to create a SIG For Developers Governance Cilium Committer Grant/Revocation Policy cluster. In order to avoid this situation which limits scale, Cilium assigns a security identity to groups of application containers which share identical security policies. The identity is then associated OM" export AZURE_RESOURCE_GROUP="${NAME}-group" az group create --name "${AZURE_RESOURCE_GROUP}" -l westus2 # Create AKS cluster az aks create \ --resource-group "${AZURE_RESOURCE_GROUP}" \ --name0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 DocumentationReporting a problem Community Weekly Community Meeting Slack Slack channels Special Interest Groups All SIGs How to create a SIG For Developers Governance Cilium Committer Grant/Revocation Policy cluster. In order to avoid this situation which limits scale, Cilium assigns a security identity to groups of application containers which share identical security policies. The identity is then associated OM" export AZURE_RESOURCE_GROUP="${NAME}-group" az group create --name "${AZURE_RESOURCE_GROUP}" -l westus2 # Create AKS cluster az aks create \ --resource-group "${AZURE_RESOURCE_GROUP}" \ --name0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.6 DocumentationPolicy Troubleshooting Symptom Library Useful Scripts Reporting a problem Community Special Interest Groups All SIGs How to create a SIG Slack Slack channels For Developers Developer / Contributor Guide cluster. In order to avoid this situation which limits scale, Cilium assigns a security identity to groups of application containers which share identical security policies. The identity is then associated installation procedure. The default settings will store all required state using Kubernetes custom resource definitions (CRDs). This is the simplest installation method as it only depends on Kubernetes and0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.9 DocumentationReporting a problem Community Weekly Community Meeting Slack Slack channels Special Interest Groups All SIGs How to create a SIG For Developers Development Guide How To Contribute Clone and Provision cluster. In order to avoid this situation which limits scale, Cilium assigns a security identity to groups of application containers which share identical security policies. The identity is then associated highly available, certified Kubernetes distribution designed for production workloads in unattended, resource-constrained, remote locations or inside IoT appliances. This guide assumes installation on amd640 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.8 DocumentationReporting a problem Community Weekly Community Meeting Slack Slack channels Special Interest Groups All SIGs How to create a SIG For Developers Development Guide How To Contribute Clone and Provision cluster. In order to avoid this situation which limits scale, Cilium assigns a security identity to groups of application containers which share identical security policies. The identity is then associated highly available, certified Kubernetes distribution designed for production workloads in unattended, resource-constrained, remote locations or inside IoT appliances. This guide assumes installation on amd640 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.7 DocumentationPolicy Troubleshooting Symptom Library Useful Scripts Reporting a problem Community Special Interest Groups All SIGs How to create a SIG Slack Slack channels For Developers Getting Started How To Contribute cluster. In order to avoid this situation which limits scale, Cilium assigns a security identity to groups of application containers which share identical security policies. The identity is then associated highly available, certified Kubernetes distribution designed for production workloads in unattended, resource-constrained, remote locations or inside IoT appliances. This guide assumes installation on amd640 码力 | 885 页 | 12.41 MB | 1 年前3
openEuler 21.09 技术白皮书diversified computing power. The openEuler community is home to an increasing number of special interest groups (SIGs), which are dedicated teams that help extend the OS features from server to cloud computing against OOM: In the event of OOM, memory reclamation is preferentially performed for process groups with low priorities to ensure the normal running of online services. Optimized mremap performance: enterprises adopt a hybrid deployment of online and offline services to improve resource utilization. However, the common kernel resource allocation and management mechanism is insufficient, and is the common0 码力 | 36 页 | 3.40 MB | 1 年前3
共 59 条
- 1
- 2
- 3
- 4
- 5
- 6













