openEuler 21.09 技术白皮书built on the latest trends of interconnect buses and storage media, and offers a distributed, real-time acceleration engine and base services. It provides competitive advantages in edge and embedded scenarios deployments of online and offline cloud services. Its innovative CPU scheduling algorithm ensures real-time CPU preemption and jitter suppression for online services. Additionally, its innovative memory reclamation solution, the iSulad+shimv2+StratoVirt secure container solution reduces the memory overhead and boot time by 40%. • Dual-plane deployment tool eggo: OSs can be installed with one click for ARM and x86 hybrid0 码力 | 36 页 | 3.40 MB | 1 年前3
Cilium v1.6 Documentationdemand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination In order for the entire system to come up, the following components have to be running at the same time: kube-dns or coredns cilium-xxx cilium-etcd-operator etcd-operator etcd-xxx All timeouts are configured CrashLoopBackoff, bootstrapping can be expedited by restarting the pods to reset the CrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly0 码力 | 734 页 | 11.45 MB | 1 年前3
This Debian Reference (version 2.109) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.1.13 Play time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 9.3.4 Customized display of time and date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 9.3.5 Colorized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 9.5.5 System and hardware time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 9.5.6 The0 码力 | 266 页 | 1.25 MB | 1 年前3
Cilium v1.7 Documentationdemand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination Cluster Mesh With Kind we can simulate Cluster Mesh in a sandbox too. Kind Configuration This time we need to create (2) config.yaml, one for each kubernetes cluster. We will explicitly configure their In order for the entire system to come up, the following components have to be running at the same time: kube-dns or coredns cilium-xxx cilium-etcd-operator etcd-operator etcd-xxx All timeouts are configured0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.5 Documentationterminal window for A-Wing, set A-wing’s coordinates: >>> client.set("awing-coord","4309.432,918.980",time=2400) True >>> client.get("awing-coord") '4309.432,918.980' In your main terminal window, have "0.0,0.0",time=2400) True >>> client.get("xwing-coord") '0.0,0.0' From A-Wing, set the X-Wing coordinates back to their proper posi�on: >>> client.set("xwing-coord","8893.34,234.3290",time=2400) True window: >>> client.get("xwing-coord") '8893.34,234.3290' >>> client.set("awing-coord","0.0,0.0",time=1200) Traceback (most recent call last): File "", line 1, in File "/usr/local/lib/python3 0 码力 | 740 页 | 12.52 MB | 1 年前3
The Linux Commands Handbook
Conclusion 4 Preface The Linux Commands Handbook follows the 80/20 rule: learn in 20% of the time the 80% of a topic. I find this approach gives a well-rounded overview. This book does not try to and its commands. It focuses on the small core commands that you will use the 80% or 90% of the time, trying to simplify the usage of the more complex ones. All those commands work on Linux, macOS users and a community of people around it, so you can do what you need to do without losing too much time reinventing the wheel and figuring out answers to common problems. Some desktop computers and laptops0 码力 | 135 页 | 14.14 MB | 1 年前3
The Linux Commands Handbook
Linux Handbook Conclusion 2 Preface The Linux Handbook follows the 80/20 rule: learn in 20% of the time the 80% of a topic. In particular, the goal is to get you up to speed quickly with Linux. This users and a community of people around it, so you can do what you need to do without losing too much time reinventing the wheel and figuring out answers to common problems. Some desktop computers and laptops will give you the ability to run Linux in a very easy way on your PC. But the vast majority of the time you will run a Linux computer in the cloud via a VPS (Virtual Private Server) like DigitalOcean.0 码力 | 112 页 | 13.74 MB | 1 年前3
Cilium v1.8 Documentationdemand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination Cluster Mesh With Kind we can simulate Cluster Mesh in a sandbox too. Kind Configuration This time we need to create (2) config.yaml, one for each kubernetes cluster. We will explicitly configure their In order for the entire system to come up, the following components have to be running at the same time: kube-dns or coredns cilium-xxx cilium-operator-xxx cilium-etcd-operator etcd-operator cilium-etcd-xxx0 码力 | 1124 页 | 21.33 MB | 1 年前3
openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)Paper Innovation Projects Community-certified openEuler Distributions ( Sorted by certification time ) Partner System xFusion Digital Technologies Co., Ltd. FusionOS 22 UnionTech Software Technology support Scenario collaboration Scenario enablement Linux kernel x86, Arm, RISC-V GPU NPU Real-time kernel Security kernel Database Big data Resource orchestration Desktop system Industrial application services are recommended for high-priority VMs, such as web services, high- performance databases, real-time rendering, and machine learning inference; while services not limited by latency can be used on0 码力 | 116 页 | 3.16 MB | 1 年前3
Cilium v1.10 Documentationdemand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination efficient service-to-backend translation right in the Linux kernel’s socket layer (e.g. at TCP connect time) such that per-packet NAT operations overhead can be avoided in lower layers. Bandwidth Management Management Cilium implements bandwidth management through efficient EDT-based (Earliest Departure Time) rate-limiting with eBPF for container traffic that is egressing a node. This allows to significantly reduce0 码力 | 1307 页 | 19.26 MB | 1 年前3
共 71 条
- 1
- 2
- 3
- 4
- 5
- 6
- 8













