Kubernetes HPA controllable elastic scaling based on Prometheus custom indicators
stay Did you use Kubernetes autoscale correctlyThe article describes in detail how to use Kubernetes' automatic scaling. There are three main types of elastic expansion in Kubernetes: HPA, VPA and CA. This article will not be explained in detail. Those who are interested can see that article. Here we mainly focus on the horizontal scaling of th ...
Added by wshost on Wed, 19 Jan 2022 10:40:16 +0200
Learning String Syntax (Python part)
1. String definition
String is the most commonly used data type in Python. We can use quotation marks ('or ') to create strings. Creating a string is as simple as assigning a value to a variable. For example:
var1 = 'Hello World!'
var2 = "Python Runoob"
2. Access the value in the string
Python does not support single character type, ...
Added by PHPiSean on Wed, 19 Jan 2022 04:18:32 +0200
Creation of docker image and dockerfile
1, Creation of docker image
1. How to create a mirror
There are three ways to create an image: Based on an existing image, based on a local template, and based on a Dockerfile.
2. Create from an existing mirror
(1) Start an image and modify it in the container
docker run -it --name jc1 centos:7 bash #Create a container first
yum instal ...
Added by gacon on Tue, 18 Jan 2022 02:14:55 +0200
Super practical ELK log analysis system
1, ELK
1. ELK introduction
ELK platform is a complete set of centralized log processing solution, which combines ElasticSearch, Logstash and Kibana to meet more powerful user requirements for log query, sorting and statistics. Elastic search: it is a distributed storage search engine based on Lucene (a full-text search engine architec ...
Added by TodManPlaa on Mon, 17 Jan 2022 00:44:00 +0200
Super detailed coding practice allows your springboot application to identify pedestrians, cars, dogs and meow stars in the picture (JavaCV+YOLO4)
Welcome to my GitHubhttps://github.com/zq2599/blog_demosContent: classification and summary of all original articles and supporting source code, involving Java, Docker, Kubernetes, DevOPS, etc;Overview of this articlestay Three minutes: fast experience JAVA version of target detection (YOLO4) In this article, we experienced the powerful object ...
Added by mote on Fri, 14 Jan 2022 02:43:53 +0200
Python learning --- syntax part (conditional statement (if), circular statement (while, for, continue, break, pass))
1. Conditional statements
Python conditional statements are code blocks that determine the execution result (True or False) of one or more statements. The following figure summarizes the execution process of conditional statements: Conditional judgment in Python is mainly realized through if statements.
color="red"
if (color=="green"):
...
Added by p-co on Thu, 13 Jan 2022 15:13:30 +0200
Zookeeper high availability cluster & distributed message queue Kafka | Cloud computing
1. Set up zookeeper cluster
1.1 problems
This case requires:
Set up zookeeper cluster1 leader2 follower s1 observer
1.2 steps
To implement this case, you need to follow the following steps.
Step 1: install Zookeeper
1) Edit / etc/hosts and all cluster hosts can ping each other (configured on Hadoop 1 and synchronized to node-0001, ...
Added by biohazardep on Wed, 05 Jan 2022 11:08:14 +0200
Release container server & private image warehouse | Cloud computing
1. Create a custom image
1.1 problems
This case requires two methods to create a custom image. The specific requirements are as follows:
Starting containers with centos imagesConfigure yum source in containerInstall software bash completion net tools iproute psmisc VIM enhancedCreate a custom image myos:latestValidate custom image
1.2 ...
Added by bellaso on Tue, 04 Jan 2022 16:01:47 +0200
Ceph Overview & Ceph cluster deployment & Ceph block storage | Cloud computing
1. Experimental environment
1.1 problems
Four virtual machines are prepared, three of which are used as storage cluster nodes and one is installed as client to realize the following functions:
Create 1 client virtual machineCreate 3 storage cluster virtual machinesConfigure host name, IP address, YUM sourceModify the hostname of all ho ...
Added by wiseone on Tue, 04 Jan 2022 06:24:43 +0200
SELinux & system troubleshooting & firewall policy management & service management | Cloud computing
1 case 1: enable SELinux protection
1.1 problems
This example requires SELinux to be configured for virtual machines server0 and desktop0:
Make sure SELinux is in force enable modeThis setting must remain valid after each reboot
1.2 scheme
SELinux, security enhanced Linux: it is a set of kernel based enhanced mandatory security prote ...
Added by phoenixx on Tue, 04 Jan 2022 05:27:05 +0200