Cloud Native Core Licensing Information User Manual

Total Page:16

File Type:pdf, Size:1020Kb

Cloud Native Core Licensing Information User Manual Oracle® Communications Cloud Native Core Licensing Information User Manual Release 2.1.0 F22873-02 January 2020 Oracle Communications Cloud Native Core Licensing Information User Manual, Release 2.1.0 F22873-02 Copyright © 2019, 2020, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. This software or hardware and documentation may provide access to or information about content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth in an applicable agreement between you and Oracle. Contents 1 Introduction 2 Licensing Information 3 Third-Party Notices and/or Licenses Commercial Software 3-1 Open Source or Other Separately Licensed Software 3-1 Cloud Native Environment 1.3.2 Components 3-1 Binding Support Function 1.4.0 Components 3-1 Diameter Routing Agent 1.4.0 Components 3-2 InterWorking and Mediation Function 1.3.0 Components 3-2 Network Exposure Function 1.2.0 Components 3-2 Network Repository Function 1.4.0 Components 3-2 Network Slice Selection Function 1.2.1 Components 3-2 Policy Control Function 1.4.0 Components 3-3 Policy and Charging Rules Function 1.4.0 Components 3-3 Security Edge Protection Proxy 1.2.0 Components 3-4 Service Communication Proxy 1.4.0 Components 3-4 Unified Data Management 1.0.0 Components 3-4 Unified Data Repository 1.4.0 Components 3-5 Cloud Native Core Licensing Information 3-6 A GNU General Public License, Version 2 (GPL-2.0) B GNU General Public License, Version 2 (GPL-2.1) C GNU Lesser General Public License, version 3 (LGPL-3) iii D Apache License, Version 1.1 (Apache 1.1) E Apache License, version 2.0 (Apache 2.0) F The FreeBSD Project G The MIT License (MIT) H Zlib License I ACE- 6.4.7 License J ECLIPSE 1.0 License K PHP License L JET License M COMMON DEVELOPMENT AND DISTRIBUTION LICENSE Version 1.0 N BSD License and JSON License O JDOM 2.0.5 License P Artistic License Q The bzip2 License iv R The Common Public License version 1.0 S Mozilla Public License (MPL), Version 2.0 T GNU Lesser General Public License, Version 2.1 (LGPL-2.1) U Creative Commons Attribution License, Attribution 2.5 V Node.js License W GNU General Public License v3 (GPL v3) X Zope Public License (ZPL) Version 2.0 Y ECLIPSE 2.0 License v List of Tables 3-1 Cloud Native Core Licensing Information 3-6 vi 1 Introduction This Licensing Information document is a part of the product or program documentation under the terms of your Oracle license agreement and is intended to help you understand the program editions, entitlements, restrictions, prerequisites, special license rights, and/or separately licensed third party technology terms associated with the Oracle software program(s) covered by this document (the "Program(s)"). Entitled or restricted use products or components identified in this document that are not provided with the particular Program may be obtained from the Oracle Software Delivery Cloud website (https://edelivery.oracle.com) or from media Oracle may provide. If you have a question about your license rights and obligations, please contact your Oracle sales representative, review the information provided in Oracle's Software Investment Guide (http://www.oracle.com/us/corporate/pricing/software-investment-guide/ index.html), and/or contact the applicable Oracle License Management Services representative listed on http://www.oracle.com/us/corporate/license-management-services/index.html . 1-1 2 Licensing Information Description of Product Editions and Permitted Features Prerequisite Products Entitled Products and Restricted Use Licenses 2-1 Chapter 2 Product Sub product Licensing Information Oracle Oracle Communications Description: This subproduct adds the following features to Communi Cloud Native Core, Network the Oracle Communications Cloud Native Core. cations Function Cloud Native The Network Function Cloud Native Environment provides Cloud Environment - per 25K tools and capabilities to run cloud native network functions Native Active Subscribers in the network. Core Prerequisites: Any one of the following licenses is prerequisite to license and use Oracle Communications Cloud Native Core , Network Function Cloud Native Environment - per 25K Active Subscribers : • Oracle Communications Cloud Native Core, Authentication Server Function - per 25K Active Subscribers • Oracle Communications Cloud Native Core, Binding Support Function - per 25K Active Subscribers • Oracle Communications Cloud Native Core, Converged Policy - per 25K Active Subscribers • Oracle Communications Cloud Native Core, Converged Signaling - per 25K Active Subscribers • Oracle Communications Cloud Native Core, Diameter Routing Agent - per 25K Active Subscribers • Oracle Communications Cloud Native Core, InterWorking and Mediation Function - per 25K Active Subscribers • Oracle Communications Cloud Native Core, Network Exposure Function - per 25K Active Subscribers • Oracle Communications Cloud Native Core , Network Repository Function - per 25K Active Subscribers • Oracle Communications Cloud Native Core, Network Slice Selection Function - per 25K Active Subscribers • Oracle Communications Cloud Native Core, Policy Control Function - per 25K Active Subscribers • Oracle Communications Cloud Native Core, Policy and Charging Rules Function - per 25K Active Subscribers • Oracle Communications Cloud Native Core, Routing and Selection Domain - per 25K Active Subscribers • Oracle Communications Cloud Native Core, Security Edge Protection Proxy - per 25K Active Subscribers • Oracle Communications Cloud Native Core , Service Communication Proxy - per 25K Active Subscribers • Oracle Communications Cloud Native Core, Unified Data Repository - per 25K Active Subscribers • Oracle Communications Cloud Native Core, Unified Data Management - per 25K Active Subscribers • Oracle Communications Cloud Native Core, Unstructured Data Storage Function - per 25K Active Subscribers 2-2 Chapter 2 Product Sub product Licensing Information Oracle Communications Description: This subproduct adds the following features to Cloud Native Core, the Oracle Communications Cloud Native Core. Authentication Server The Authentication Server Function (AUSF) is responsible Function - per 25K Active of the primary authentication and key agreement procedures Subscribers carried out to enable mutual authentication between UE and network. It provides keying material that can be used between the UE and network in subsequently security procedures. This license is based on per 25k active subscribers perpetual. Prerequisites:
Recommended publications
  • Poly Videoos Offer of Source for Open Source Software 3.6.0
    OFFER OF SOURCE FOR 3.6.0 | 2021 | 3725-85857-010A OPEN SOURCE SOFTWARE August Poly VideoOS Software Contents Offer of Source for Open Source Software .............................................................................. 1 Open Source Software ............................................................................................................. 2 Qualcomm Platform Licenses ............................................................................................................. 2 List of Open Source Software .................................................................................................. 2 Poly G7500, Poly Studio X50, and Poly Studio X30 .......................................................................... 2 Poly Microphone IP Adapter ............................................................................................................. 13 Poly IP Table Microphone and Poly IP Ceiling Microphone ............................................................. 18 Poly TC8 and Poly Control Application ............................................................................................. 21 Get Help ..................................................................................................................................... 22 Related Poly and Partner Resources ..................................................................................... 22 Privacy Policy ...........................................................................................................................
    [Show full text]
  • A Comprehensive Study of Bloated Dependencies in the Maven Ecosystem
    Noname manuscript No. (will be inserted by the editor) A Comprehensive Study of Bloated Dependencies in the Maven Ecosystem César Soto-Valero · Nicolas Harrand · Martin Monperrus · Benoit Baudry Received: date / Accepted: date Abstract Build automation tools and package managers have a profound influence on software development. They facilitate the reuse of third-party libraries, support a clear separation between the application’s code and its ex- ternal dependencies, and automate several software development tasks. How- ever, the wide adoption of these tools introduces new challenges related to dependency management. In this paper, we propose an original study of one such challenge: the emergence of bloated dependencies. Bloated dependencies are libraries that the build tool packages with the application’s compiled code but that are actually not necessary to build and run the application. This phenomenon artificially grows the size of the built binary and increases maintenance effort. We propose a tool, called DepClean, to analyze the presence of bloated dependencies in Maven artifacts. We ana- lyze 9; 639 Java artifacts hosted on Maven Central, which include a total of 723; 444 dependency relationships. Our key result is that 75:1% of the analyzed dependency relationships are bloated. In other words, it is feasible to reduce the number of dependencies of Maven artifacts up to 1=4 of its current count. We also perform a qualitative study with 30 notable open-source projects. Our results indicate that developers pay attention to their dependencies and are willing to remove bloated dependencies: 18/21 answered pull requests were accepted and merged by developers, removing 131 dependencies in total.
    [Show full text]
  • Protolite: Highly Optimized Protocol Buffer Serializers
    Package ‘protolite’ July 28, 2021 Type Package Title Highly Optimized Protocol Buffer Serializers Author Jeroen Ooms Maintainer Jeroen Ooms <[email protected]> Description Pure C++ implementations for reading and writing several common data formats based on Google protocol-buffers. Currently supports 'rexp.proto' for serialized R objects, 'geobuf.proto' for binary geojson, and 'mvt.proto' for vector tiles. This package uses the auto-generated C++ code by protobuf-compiler, hence the entire serialization is optimized at compile time. The 'RProtoBuf' package on the other hand uses the protobuf runtime library to provide a general- purpose toolkit for reading and writing arbitrary protocol-buffer data in R. Version 2.1.1 License MIT + file LICENSE URL https://github.com/jeroen/protolite BugReports https://github.com/jeroen/protolite/issues SystemRequirements libprotobuf and protobuf-compiler LinkingTo Rcpp Imports Rcpp (>= 0.12.12), jsonlite Suggests spelling, curl, testthat, RProtoBuf, sf RoxygenNote 6.1.99.9001 Encoding UTF-8 Language en-US NeedsCompilation yes Repository CRAN Date/Publication 2021-07-28 12:20:02 UTC R topics documented: geobuf . .2 mapbox . .2 serialize_pb . .3 1 2 mapbox Index 5 geobuf Geobuf Description The geobuf format is an optimized binary format for storing geojson data with protocol buffers. These functions are compatible with the geobuf2json and json2geobuf utilities from the geobuf npm package. Usage read_geobuf(x, as_data_frame = TRUE) geobuf2json(x, pretty = FALSE) json2geobuf(json, decimals = 6) Arguments x file path or raw vector with the serialized geobuf.proto message as_data_frame simplify geojson data into data frames pretty indent json, see jsonlite::toJSON json a text string with geojson data decimals how many decimals (digits behind the dot) to store for numbers mapbox Mapbox Vector Tiles Description Read Mapbox vector-tile (mvt) files and returns the list of layers.
    [Show full text]
  • Tencentdb for Tcaplusdb Getting Started
    TencentDB for TcaplusDB TencentDB for TcaplusDB Getting Started Product Documentation ©2013-2019 Tencent Cloud. All rights reserved. Page 1 of 32 TencentDB for TcaplusDB Copyright Notice ©2013-2019 Tencent Cloud. All rights reserved. Copyright in this document is exclusively owned by Tencent Cloud. You must not reproduce, modify, copy or distribute in any way, in whole or in part, the contents of this document without Tencent Cloud's the prior written consent. Trademark Notice All trademarks associated with Tencent Cloud and its services are owned by Tencent Cloud Computing (Beijing) Company Limited and its affiliated companies. Trademarks of third parties referred to in this document are owned by their respective proprietors. Service Statement This document is intended to provide users with general information about Tencent Cloud's products and services only and does not form part of Tencent Cloud's terms and conditions. Tencent Cloud's products or services are subject to change. Specific products and services and the standards applicable to them are exclusively provided for in Tencent Cloud's applicable terms and conditions. ©2013-2019 Tencent Cloud. All rights reserved. Page 2 of 32 TencentDB for TcaplusDB Contents Getting Started Basic Concepts Cluster Table Group Table Index Data Types Read/Write Capacity Mode Table Definition in ProtoBuf Table Definition in TDR Creating Cluster Creating Table Group Creating Table Getting Access Point Information Access TcaplusDB ©2013-2019 Tencent Cloud. All rights reserved. Page 3 of 32 TencentDB for TcaplusDB Getting Started Basic Concepts Cluster Last updated:2020-07-31 11:15:59 Cluster Overview A cluster is the basic TcaplusDB management unit, which provides independent TcaplusDB service for the business.
    [Show full text]
  • Gateway Licensing Information User Manual Version 19
    Gateway Licensing Information User Manual Version 19 December 2019 Contents Introduction ...................................................................................................................................... 5 Licensed Products, Restricted Use Licenses, and Prerequisite Products ........................................ 5 Primavera Gateway ................................................................................................................................ 5 Third Party Notices and/or Licenses ................................................................................................ 6 Bootstrap ................................................................................................................................................ 6 Commons Codec .................................................................................................................................... 6 Commons Compress .............................................................................................................................. 6 Commons IO ........................................................................................................................................... 7 Commons Net ......................................................................................................................................... 7 commons-vfs .......................................................................................................................................... 7 HttpComponents HttpClient ..................................................................................................................
    [Show full text]
  • Software License Agreement (EULA)
    Third-party Computer Software AutoVu™ ALPR cameras • angular-animate (https://docs.angularjs.org/api/ngAnimate) licensed under the terms of the MIT License (https://github.com/angular/angular.js/blob/master/LICENSE). © 2010-2016 Google, Inc. http://angularjs.org • angular-base64 (https://github.com/ninjatronic/angular-base64) licensed under the terms of the MIT License (https://github.com/ninjatronic/angular-base64/blob/master/LICENSE). © 2010 Nick Galbreath © 2013 Pete Martin • angular-translate (https://github.com/angular-translate/angular-translate) licensed under the terms of the MIT License (https://github.com/angular-translate/angular-translate/blob/master/LICENSE). © 2014 [email protected] • angular-translate-handler-log (https://github.com/angular-translate/bower-angular-translate-handler-log) licensed under the terms of the MIT License (https://github.com/angular-translate/angular-translate/blob/master/LICENSE). © 2014 [email protected] • angular-translate-loader-static-files (https://github.com/angular-translate/bower-angular-translate-loader-static-files) licensed under the terms of the MIT License (https://github.com/angular-translate/angular-translate/blob/master/LICENSE). © 2014 [email protected] • Angular Google Maps (http://angular-ui.github.io/angular-google-maps/#!/) licensed under the terms of the MIT License (https://opensource.org/licenses/MIT). © 2013-2016 angular-google-maps • AngularJS (http://angularjs.org/) licensed under the terms of the MIT License (https://github.com/angular/angular.js/blob/master/LICENSE). © 2010-2016 Google, Inc. http://angularjs.org • AngularUI Bootstrap (http://angular-ui.github.io/bootstrap/) licensed under the terms of the MIT License (https://github.com/angular- ui/bootstrap/blob/master/LICENSE).
    [Show full text]
  • Towards a Fully Automated Extraction and Interpretation of Tabular Data Using Machine Learning
    UPTEC F 19050 Examensarbete 30 hp August 2019 Towards a fully automated extraction and interpretation of tabular data using machine learning Per Hedbrant Per Hedbrant Master Thesis in Engineering Physics Department of Engineering Sciences Uppsala University Sweden Abstract Towards a fully automated extraction and interpretation of tabular data using machine learning Per Hedbrant Teknisk- naturvetenskaplig fakultet UTH-enheten Motivation A challenge for researchers at CBCS is the ability to efficiently manage the Besöksadress: different data formats that frequently are changed. Significant amount of time is Ångströmlaboratoriet Lägerhyddsvägen 1 spent on manual pre-processing, converting from one format to another. There are Hus 4, Plan 0 currently no solutions that uses pattern recognition to locate and automatically recognise data structures in a spreadsheet. Postadress: Box 536 751 21 Uppsala Problem Definition The desired solution is to build a self-learning Software as-a-Service (SaaS) for Telefon: automated recognition and loading of data stored in arbitrary formats. The aim of 018 – 471 30 03 this study is three-folded: A) Investigate if unsupervised machine learning Telefax: methods can be used to label different types of cells in spreadsheets. B) 018 – 471 30 00 Investigate if a hypothesis-generating algorithm can be used to label different types of cells in spreadsheets. C) Advise on choices of architecture and Hemsida: technologies for the SaaS solution. http://www.teknat.uu.se/student Method A pre-processing framework is built that can read and pre-process any type of spreadsheet into a feature matrix. Different datasets are read and clustered. An investigation on the usefulness of reducing the dimensionality is also done.
    [Show full text]
  • Datacenter Tax Cuts: Improving WSC Efficiency Through Protocol Buffer Acceleration
    Datacenter Tax Cuts: Improving WSC Efficiency Through Protocol Buffer Acceleration Dinesh Parimi William J. Zhao Jerry Zhao University of California, Berkeley University of California, Berkeley University of California, Berkeley [email protected] william [email protected] [email protected] Abstract—According to recent literature, at least 25% of cycles will serialize some set of objects stored in memory to a in a modern warehouse-scale computer are spent on common portable format defined by the protobuf compiler (protoc). “building blocks” [1]. Referred to by Kanev et al. as a “datacenter The serialized objects can be sent to some remote device, tax”, these tasks are prime candidates for hardware acceleration, as even modest improvements here can generate immense cost which will then deserialize the object into its own memory and power savings given the scale of such systems. to execute on. Thus protobuf is widely used to implement One of these tasks is protocol buffer serialization and parsing. remote procedure calls (RPC), since it facilitates the transport Protocol buffers are an open-source mechanism for representing of arguments across a network. Protobuf remains the most structured data developed by Google, and used extensively in popular serialization framework due to its maturity, backwards their datacenters for communication and remote procedure calls. While the source code for protobufs is highly optimized, certain compatibility, and extensibility. Specifically, the encoding tasks - such as the compression/decompression of integer fields scheme enables future changes to the protobuf schema to and the encoding of variable-length strings - bottleneck the remain backwards compatible. throughput of serializing or parsing a protobuf.
    [Show full text]
  • Evil Pickles: Dos Attacks Based on Object-Graph Engineering∗
    Evil Pickles: DoS Attacks Based on Object-Graph Engineering∗ Jens Dietrich1, Kamil Jezek2, Shawn Rasheed3, Amjed Tahir4, and Alex Potanin5 1 School of Engineering and Advanced Technology, Massey University Palmerston North, New Zealand [email protected] 2 NTIS – New Technologies for the Information Society Faculty of Applied Sciences, University of West Bohemia Pilsen, Czech Republic [email protected] 3 School of Engineering and Advanced Technology, Massey University Palmerston North, New Zealand [email protected] 4 School of Engineering and Advanced Technology, Massey University Palmerston North, New Zealand [email protected] 5 School of Engineering and Computer Science Victoria University of Wellington, Wellington, New Zealand [email protected] Abstract In recent years, multiple vulnerabilities exploiting the serialisation APIs of various programming languages, including Java, have been discovered. These vulnerabilities can be used to devise in- jection attacks, exploiting the presence of dynamic programming language features like reflection or dynamic proxies. In this paper, we investigate a new type of serialisation-related vulnerabilit- ies for Java that exploit the topology of object graphs constructed from classes of the standard library in a way that deserialisation leads to resource exhaustion, facilitating denial of service attacks. We analyse three such vulnerabilities that can be exploited to exhaust stack memory, heap memory and CPU time. We discuss the language and library design features that enable these vulnerabilities, and investigate whether these vulnerabilities can be ported to C#, Java- Script and Ruby. We present two case studies that demonstrate how the vulnerabilities can be used in attacks on two widely used servers, Jenkins deployed on Tomcat and JBoss.
    [Show full text]
  • Executable Trigger-Action Comments
    Executable Trigger-Action Comments Pengyu Nie, Rishabh Rai, Junyi Jessy Li, Sarfraz Khurshid, Raymond J. Mooney, and Milos Gligoric The University of Texas at Austin {pynie@,rrai.squared@,jessy@austin.,khurshid@ece.,mooney@cs.,gligoric@}utexas.edu ABSTRACT Wave project: “Remove this when HtmlViewImpl implements getAt- Natural language elements, e.g., todo comments, are frequently tributes”, etc.). We consider those comments where the trigger is used to communicate among the developers and to describe tasks expressed based on the state of the code repositories and actions that need to be performed (actions) when specific conditions hold require modifications of source or binary code. We call these com- in the code repository (triggers). As projects evolve, development ments trigger-action comments. processes change, and development teams reorganize, these com- Although trigger-action comments are ubiquitous, they are, like ments, because of their informal nature, frequently become irrele- other types of comments, written in natural language. Thus, as vant or forgotten. projects evolve, development processes change, and development We present the first technique, dubbed TrigIt, to specify trigger- teams reorganize, these comments frequently become irrelevant or action todo comments as executable statements. Thus, actions are forgotten. As an example, consider the following comment from executed automatically when triggers evaluate to true. TrigIt spec- the Apache Gobblin project [13]: “Remove once we commit any ifications are written in the host language (e.g., Java) and are evalu- other classes”. This comment, followed by an empty class, was in- ated as part of the build process. The triggers are specified as query cluded in revision 38ce024 (Dec 10, 2015) in package-info.java file statements over abstract syntax trees and abstract representation to force the javadoc tool to generate documentation for an empty of build configuration scripts, and the actions are specified as code package.
    [Show full text]
  • Trifacta Data Preparation for Amazon Redshift and S3 Must Be Deployed Into an Existing Virtual Private Cloud (VPC)
    Install Guide for Data Preparation for Amazon Redshift and S3 Version: 7.1 Doc Build Date: 05/26/2020 Copyright © Trifacta Inc. 2020 - All Rights Reserved. CONFIDENTIAL These materials (the “Documentation”) are the confidential and proprietary information of Trifacta Inc. and may not be reproduced, modified, or distributed without the prior written permission of Trifacta Inc. EXCEPT AS OTHERWISE PROVIDED IN AN EXPRESS WRITTEN AGREEMENT, TRIFACTA INC. PROVIDES THIS DOCUMENTATION AS-IS AND WITHOUT WARRANTY AND TRIFACTA INC. DISCLAIMS ALL EXPRESS AND IMPLIED WARRANTIES TO THE EXTENT PERMITTED, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE AND UNDER NO CIRCUMSTANCES WILL TRIFACTA INC. BE LIABLE FOR ANY AMOUNT GREATER THAN ONE HUNDRED DOLLARS ($100) BASED ON ANY USE OF THE DOCUMENTATION. For third-party license information, please select About Trifacta from the Help menu. 1. Quick Start . 4 1.1 Install from AWS Marketplace . 4 1.2 Upgrade for AWS Marketplace . 7 2. Configure . 8 2.1 Configure for AWS . 8 2.1.1 Configure for EC2 Role-Based Authentication . 14 2.1.2 Enable S3 Access . 16 2.1.2.1 Create Redshift Connections 28 3. Contact Support . 30 4. Legal 31 4.1 Third-Party License Information . 31 Page #3 Quick Start Install from AWS Marketplace Contents: Product Limitations Internet access Install Desktop Requirements Pre-requisites Install Steps - CloudFormation template SSH Access Troubleshooting SELinux Upgrade Documentation Related Topics This guide steps through the requirements and process for installing Trifacta® Data Preparation for Amazon Redshift and S3 through the AWS Marketplace.
    [Show full text]
  • Distributed Services with Go Your Guide to Reliable, Scalable, and Maintainable Systems
    Extracted from: Distributed Services with Go Your Guide to Reliable, Scalable, and Maintainable Systems This PDF file contains pages extracted from Distributed Services with Go, published by the Pragmatic Bookshelf. For more information or to purchase a paperback or PDF copy, please visit http://www.pragprog.com. Note: This extract contains some colored text (particularly in code listing). This is available only in online versions of the books. The printed versions are black and white. Pagination might vary between the online and printed versions; the content is otherwise identical. Copyright © 2021 The Pragmatic Programmers, LLC. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form, or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior consent of the publisher. The Pragmatic Bookshelf Raleigh, North Carolina Distributed Services with Go Your Guide to Reliable, Scalable, and Maintainable Systems Travis Jeffery The Pragmatic Bookshelf Raleigh, North Carolina Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf, PragProg and the linking g device are trade- marks of The Pragmatic Programmers, LLC. Every precaution was taken in the preparation of this book. However, the publisher assumes no responsibility for errors or omissions, or for damages that may result from the use of information (including program listings) contained herein.
    [Show full text]