This Debian Reference (version 2.109) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 12.16List of build tool packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . system maintenance tasks. 1.3.6 The internal viewer in MC MC is a very smart viewer. This is a great tool for searching words in documents. I always use this for files in the ”/usr/share/doc” directory. This utilize all these resources is Advanced Packaging Tool (APT). The Debian package management system, when used properly, offers the user to install consistent sets of binary packages to the system from the archive0 码力 | 266 页 | 1.25 MB | 1 年前3
Moxa Industrial Linux 3.0 (Debian 11)
Manual for Arm-based Computers
Version 1.0, January 2023.......................................................................... 81 Security Diagnosis Tool (Moxa Guardian) ................................................................................. and manufacturing. MIL3 is based on Debian 11 with kernel 5.10 and integrated with several feature sets designed to strengthen and accelerate user application development as well as ensure system reliability (nftable disabled by default) (nftable with pre-configured security policy) Security Diagnosis Tool (Moxa Guardian) N/A Security Event Audit Log (Audit service disabled by default) (Audit0 码力 | 111 页 | 2.94 MB | 1 年前3
ubuntu server guideClient to activate most of the Ubuntu Pro services, including Livepatch, FIPS, and the CIS Benchmark tool. Further reading • For more information about the Ubuntu Pro Client, you can read our documentation of two way communication, based on the contents of a crash report by using the standard apport-cli tool that is part of Ubuntu. Copy the crash report to another system, run: apport-cli /path/to/report can skip the whole section of the following manual setup instruction by using this non-official tool. The tool will setup your TFTP server to serve necessary files for netbooting. Necessary Files There0 码力 | 486 页 | 3.33 MB | 1 年前3
Ubuntu Server Guide 18.04packages for the PostgreSQL database. • Print server: This task sets up your system to be a print server. • Samba File server: This task sets up your system to be a Samba file server, which is especially kernel. You can find more information on the topic here : • Kdump kernel documentation17. • The crash tool18 • Analyzing Linux Kernel Crash19 (Based on Fedora, it still gives a good walkthrough of kernel Package Management 3. Apt The apt command is a powerful command-line tool, which works with Ubuntu's Advanced Packaging Tool (APT) performing such functions as installation of new software packages0 码力 | 413 页 | 1.40 MB | 1 年前3
Cilium v1.9 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver 00/ to access the UI. Hubble UI is not the only way to get access to Hubble data. A command line tool, the Hubble CLI, is also available. It can be installed by following the instructions below: Linux0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.5 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and des�na�on IP of the packet, the tool provides the full label informa�on of both the sender and receiver 443/TCP 3m53 Each pod will be represented in Cilium as an Endpoint. We can invoke the cilium tool inside the Cilium pod to list them: $ kubectl -n kube-system get pods -l k8s-app=cilium NAME0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.6 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver 443/TCP 3m53s Each pod will be represented in Cilium as an Endpoint. We can invoke the cilium tool inside the Cilium pod to list them: $ kubectl -n kube-system get pods -l k8s-app=cilium NAME0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.10 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver network plugin will be replaced with Cilium by the installer. Limitations: All VMs and VM scale sets used in a cluster must belong to the same resource group. Adding new nodes to node pools might result0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver network plugin will be replaced with Cilium by the installer. Limitations: All VMs and VM scale sets used in a cluster must belong to the same resource group. Adding new nodes to node pools might result0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.8 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver svc/hubble-ui 12000:80 and then open http://localhost:12000/. Limitations All VMs and VM scale sets used in a cluster must belong to the same resource group. Troubleshooting If kubectl exec to a pod0 码力 | 1124 页 | 21.33 MB | 1 年前3
共 60 条
- 1
- 2
- 3
- 4
- 5
- 6













