This Debian Reference (version 2.109)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.1.13 Play time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 1.6 Unix-like text processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 9.3.4 Customized display of time and date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 9.3.5 Colorized0 码力 | 266 页 | 1.25 MB | 1 年前3Cilium v1.7 Documentation
demand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination Cluster Mesh With Kind we can simulate Cluster Mesh in a sandbox too. Kind Configuration This time we need to create (2) config.yaml, one for each kubernetes cluster. We will explicitly configure their In order for the entire system to come up, the following components have to be running at the same time: kube-dns or coredns cilium-xxx cilium-etcd-operator etcd-operator etcd-xxx All timeouts are configured0 码力 | 885 页 | 12.41 MB | 1 年前3Cilium v1.10 Documentation
demand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination efficient service-to-backend translation right in the Linux kernel’s socket layer (e.g. at TCP connect time) such that per-packet NAT operations overhead can be avoided in lower layers. Bandwidth Management Management Cilium implements bandwidth management through efficient EDT-based (Earliest Departure Time) rate-limiting with eBPF for container traffic that is egressing a node. This allows to significantly reduce0 码力 | 1307 页 | 19.26 MB | 1 年前3Cilium v1.8 Documentation
demand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination Cluster Mesh With Kind we can simulate Cluster Mesh in a sandbox too. Kind Configuration This time we need to create (2) config.yaml, one for each kubernetes cluster. We will explicitly configure their In order for the entire system to come up, the following components have to be running at the same time: kube-dns or coredns cilium-xxx cilium-operator-xxx cilium-etcd-operator etcd-operator cilium-etcd-xxx0 码力 | 1124 页 | 21.33 MB | 1 年前3Cilium v1.9 Documentation
demand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination efficient service-to-backend translation right in the Linux kernel’s socket layer (e.g. at TCP connect time) such that per-packet NAT operations overhead can be avoided in lower layers. Bandwidth Management Management Cilium implements bandwidth management through efficient EDT-based (Earliest Departure Time) rate-limiting with eBPF for container traffic that is egressing a node. This allows to significantly reduce0 码力 | 1263 页 | 18.62 MB | 1 年前3Cilium v1.6 Documentation
demand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination In order for the entire system to come up, the following components have to be running at the same time: kube-dns or coredns cilium-xxx cilium-etcd-operator etcd-operator etcd-xxx All timeouts are configured CrashLoopBackoff, bootstrapping can be expedited by restarting the pods to reset the CrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly0 码力 | 734 页 | 11.45 MB | 1 年前3Cilium v1.11 Documentation
demand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination efficient service-to-backend translation right in the Linux kernel’s socket layer (e.g. at TCP connect time) such that per-packet NAT operations overhead can be avoided in lower layers. Bandwidth Management Management Cilium implements bandwidth management through efficient EDT-based (Earliest Departure Time) rate-limiting with eBPF for container traffic that is egressing a node. This allows to significantly reduce0 码力 | 1373 页 | 19.37 MB | 1 年前3Ubuntu Desktop Training 2009
system and search for files • How to connect to and use the Internet • How to perform basic word-processing and spreadsheet functions using OpenOffice.org • How to Install and play games • How to add, Guide Copyright © 2009 Canonical Limited 2. Student Responsibilities • Students should arrive on time and stay until the session is dismissed. The instructor should be notified if you expect to arrive recommended that you teach each topic covered in the training material. However, if you are running short of time, optional topics are indicated in the Instructor Notes of each lesson. 4.2. Instructional Methods0 码力 | 428 页 | 57.45 MB | 1 年前3Cilium v1.5 Documentation
terminal window for A-Wing, set A-wing’s coordinates: >>> client.set("awing-coord","4309.432,918.980",time=2400) True >>> client.get("awing-coord") '4309.432,918.980' In your main terminal window, have "0.0,0.0",time=2400) True >>> client.get("xwing-coord") '0.0,0.0' From A-Wing, set the X-Wing coordinates back to their proper posi�on: >>> client.set("xwing-coord","8893.34,234.3290",time=2400) True window: >>> client.get("xwing-coord") '8893.34,234.3290' >>> client.set("awing-coord","0.0,0.0",time=1200) Traceback (most recent call last): File "", line 1, in File "/usr/local/lib/python3 0 码力 | 740 页 | 12.52 MB | 1 年前3Moxa Industrial Linux 3.0 (Debian 11) Manual for Arm-based Computers Version 1.0, January 2023
and/or changes to this manual, or to the products and/or the programs described in this manual, at any time. • Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes ............ 24 Adjusting the Time ....................................................................................................................... 24 NTP Time Synchronization ............... ................................................................................. 25 Setting the Time Zone ............................................................................................0 码力 | 111 页 | 2.94 MB | 1 年前3
共 71 条
- 1
- 2
- 3
- 4
- 5
- 6
- 8