检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
"system-node-critical" and "system-cluster-critical" are two special keywords which indicate the highest priorities with the former being the highest
"system-node-critical" and "system-cluster-critical" are two special keywords which indicate the highest priorities with the former being the highest
"system-node-critical" and "system-cluster-critical" are two special keywords which indicate the highest priorities with the former being the highest
"system-node-critical" and "system-cluster-critical" are two special keywords which indicate the highest priorities with the former being the highest
"system-node-critical" and "system-cluster-critical" are two special keywords which indicate the highest priorities with the former being the highest
"system-node-critical" and "system-cluster-critical" are two special keywords which indicate the highest priorities with the former being the highest
"system-node-critical" and "system-cluster-critical" are two special keywords which indicate the highest priorities with the former being the highest
"system-node-critical" and "system-cluster-critical" are two special keywords which indicate the highest priorities with the former being the highest
"system-node-critical" and "system-cluster-critical" are two special keywords which indicate the highest priorities with the former being the highest
"system-node-critical" and "system-cluster-critical" are two special keywords which indicate the highest priorities with the former being the highest
"system-node-critical" and "system-cluster-critical" are two special keywords which indicate the highest priorities with the former being the highest
"system-node-critical" and "system-cluster-critical" are two special keywords which indicate the highest priorities with the former being the highest
以及身份账号和密钥管理等方面的安全配置。 《华为云安全白皮书》详细介绍华为云安全性的构建思路与措施,包括云安全战略、责任共担模型、合规与隐私、安全组织与人员、基础设施安全、租户服务与租户安全、工程安全、运维运营安全、生态安全。 图1 华为云安全责任共担模型 父主题: 安全
CVE-2020-13401的漏洞公告 华为云CCI团队已经于7月22日识别 Kubernetes 安全漏洞CVE-2020-13401并对其进行了详细分析,分析结论为:用户与CCI服务均不受本次漏洞的影响,无需进行处理。 漏洞详情 Kubernetes官方发布安全漏洞CVE-2020-13401,CVSS Rating:
当前提供3种类型的Pod,包括通用计算型(通用计算型命名空间下使用)、RDMA加速型和GPU加速型(GPU型命名空间下使用)。具体的规格信息请参考约束与限制中的“Pod规格”。 创建Pod kubernetes资源可以使用YAML描述(如果您对YAML格式不了解,可以参考YAML语法),也可
size大小的能力。 本操作实践展示通过“memory类型EmptyDir”和“配置securityContext与mount命令”两种方式来修改/dev/shm容量。 限制与约束 /dev/shm使用基于内存的tmpfs文件系统,不具备持久性,容器重启后数据不保留。 用户可通过两种方
CI的pod。 约束与限制 metrics-server无法采集到通过bursting插件弹性到CCI 2.0上的Pod的监控数据,可能会影响HPA工作。如果HPA无法正常工作,请参考弹性伸缩进行处理。 从CCE bursting弹到CCI 2.0的pod,与从CCI 2.0前端
安全 责任共担 身份认证与访问控制 数据保护技术 审计与日志 监控安全风险
n 在RFC7386协议的定义中,Merge Patch必须包含对一个资源对象的部分描述,即为JSON对象。该JSON对象被提交到服务端后与服务端的当前对象合并,即替换当前资源对象中的列表域,从而创建一个新的对象。 Strategic Merge Patch, Content-Type:
监控指标 指标ID 指标名称 指标含义 取值范围 单位 cpuUsage CPU使用率 该指标用于统计测量对象的CPU使用率。服务实际使用的与限制的CPU核数量比率。 0~100% 百分比(Percent) cpuCoreLimit CPU内核总量 该指标用于统计测量对象限制的CPU核总量。