Cilium v1.6 DocumentationOperations Istio Other Orchestrators Concepts Component Overview Terminology Address Management Multi Host Networking Security Datapath Failure Behavior Architecture Datapath Scale Kubernetes Integration clusters connects all application containers. IP allocation is kept simple by using host scope allocators. This means that each host can allocate IPs without any coordination between hosts. The following multi hosts which is typically already given. Native Routing: Use of the regular routing table of the Linux host. The network is required to be capable to route the IP addresses of the application containers. When0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 DocumentationOperations Istio Other Orchestrators Concepts Component Overview Terminology Address Management Multi Host Networking Security Datapath Failure Behavior Architecture Datapath Scale Kubernetes Integration clusters connects all application containers. IP allocation is kept simple by using host scope allocators. This means that each host can allocate IPs without any coordination between hosts. The following multi hosts which is typically already given. Native Routing: Use of the regular routing table of the Linux host. The network is required to be capable to route the IP addresses of the application containers. When0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.8 DocumentationNetwork Policy Policy Enforcement Modes Rule Basics Layer 3 Examples Layer 4 Examples Layer 7 Examples Host Policies Layer 7 Protocol Visibility Using Kubernetes constructs in policy Endpoint Lifecycle Troubleshooting clusters connects all application containers. IP allocation is kept simple by using host scope allocators. This means that each host can allocate IPs without any coordination between hosts. The following multi hosts which is typically already given. Native Routing: Use of the regular routing table of the Linux host. The network is required to be capable to route the IP addresses of the application containers. When0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.9 DocumentationPolicy Enforcement Modes Rule Basics Layer 3 Examples Layer 4 Examples Layer 7 Examples Deny Policies Host Policies Layer 7 Protocol Visibility Using Kubernetes constructs in policy Endpoint Lifecycle Troubleshooting clusters connects all application containers. IP allocation is kept simple by using host scope allocators. This means that each host can allocate IPs without any coordination between hosts. The following multi hosts which is typically already given. Native Routing: Use of the regular routing table of the Linux host. The network is required to be capable to route the IP addresses of the application containers. When0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.10 DocumentationPolicy Enforcement Modes Rule Basics Layer 3 Examples Layer 4 Examples Layer 7 Examples Deny Policies Host Policies Layer 7 Protocol Visibility Using Kubernetes constructs in policy Endpoint Lifecycle Troubleshooting clusters connects all application containers. IP allocation is kept simple by using host scope allocators. This means that each host can allocate IPs without any coordination between hosts. The following multi hosts which is typically already given. Native Routing: Use of the regular routing table of the Linux host. The network is required to be capable to route the IP addresses of the application containers. When0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 DocumentationPolicy Enforcement Modes Rule Basics Layer 3 Examples Layer 4 Examples Layer 7 Examples Deny Policies Host Policies Layer 7 Protocol Visibility Using Kubernetes constructs in policy Endpoint Lifecycle Troubleshooting clusters connects all application containers. IP allocation is kept simple by using host scope allocators. This means that each host can allocate IPs without any coordination between hosts. The following multi hosts which is typically already given. Native Routing: Use of the regular routing table of the Linux host. The network is required to be capable to route the IP addresses of the application containers. When0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.5 DocumentationIs�o Other Orchestrators Concepts Component Overview Assurances Terminology Address Management Mul� Host Networking Security Architecture Datapath Scale Kubernetes Integra�on Ge�ng Help FAQ Slack GitHub Lifecycle Troubleshoo�ng Monitoring & Metrics Exported Metrics Cilium as a Kubernetes pod Cilium as a host-agent on a node Troubleshoo�ng Component & Cluster Health Connec�vity Problems Policy Troubleshoo�ng clusters connects all applica�on containers. IP alloca�on is kept simple by using host scope allocators. This means that each host can allocate IPs without any coordina�on between hosts. The following mul�0 码力 | 740 页 | 12.52 MB | 1 年前3
Hyperledger Fabric 1.4 中文文档环境字典 env 运行环境即设置 环境即状态共享 其他考虑 环境变量完整列表 Execution model Execution strategy Defining tasks Defining host lists Intelligently executing tasks with execute Failure handling Connections Password management contrib.console import confirm 改好之后,我们重新部署: $ fab deploy No hosts found. Please specify (single) host string for connection: my_server [my_server] run: git pull [my_server] out: Already up-to-date. [my_server] fabfile 中指定任何连接信息,所以 Fabric 依旧不知道该在哪里运 行这些远程命令。遇到这种情况时,Fabric 会在运行时提示我们。连接的定义 使用 SSH 风格的“主机串”(例如: user@host:port ),默认使用你的本地用户 名——所以在这个例子中,我们只需要指定主机名 my_server 。 与远程交互 如果你已经得到了代码,说明 git pull 执行非常顺利——但如果这是第一次0 码力 | 145 页 | 161.53 KB | 1 年前3
Hyperledger Fabric 2.5 中文文档环境字典 env 运行环境即设置 环境即状态共享 其他考虑 环境变量完整列表 Execution model Execution strategy Defining tasks Defining host lists Intelligently executing tasks with execute Failure handling Connections Password management contrib.console import confirm 改好之后,我们重新部署: $ fab deploy No hosts found. Please specify (single) host string for connection: my_server [my_server] run: git pull [my_server] out: Already up-to-date. [my_server] fabfile 中指定任何连接信息,所以 Fabric 依旧不知道该在哪里运 行这些远程命令。遇到这种情况时,Fabric 会在运行时提示我们。连接的定义 使用 SSH 风格的“主机串”(例如: user@host:port ),默认使用你的本地用户 名——所以在这个例子中,我们只需要指定主机名 my_server 。 与远程交互 如果你已经得到了代码,说明 git pull 执行非常顺利——但如果这是第一次0 码力 | 138 页 | 154.00 KB | 1 年前3
httpd 2.4.25 中文文档access control is done in the same way as other authorization checks, using the new module mod_authz_host. The old access control idioms should be replaced by the new authentication mechanisms, although for configuration: Order Deny,Allow Deny from all Allow from example.org 2.4 configuration: Require host example.org In the following example, mixing old and new directives leads to unexpected results. configuration seems to allow it? Because mod_access_compat directives take precedence over the mod_authz_host one in this configuration merge scenario. This example conversely works as expected: Mixing old0 码力 | 2573 页 | 2.12 MB | 1 年前3
共 608 条
- 1
- 2
- 3
- 4
- 5
- 6
- 61













