Block storage application cases & distributed file system & and object storage | Cloud computing
1. Block storage application case
1.1 problems
Continue the experiment content of Day03, demonstrate the application case of block storage, and realize the following functions:
Create mirror snapshotRestore data using snapshotsClone mirrors using snapshotsDelete snapshot
1.2 steps
To implement this case, you need to follow the follow ...
Added by MajorMo on Mon, 03 Jan 2022 18:46:19 +0200
Prometheus server & Prometheus monitored end & Grafana & and monitoring database | Cloud computing
1. Prometheus monitoring server
1.1 problems
This case requires the deployment of prometheus monitoring server to complete the following tasks:
Install monitoring serverModify profileWrite service files and manage servicesView monitoring data
1.2 scheme
Two virtual machines are required for the experiment, and the host information is ...
Added by Haberdasher on Mon, 03 Jan 2022 11:22:56 +0200
Build a K8S cluster with single master and multiple node s in kubedm mode (K8S version: v1.20.1)
kubeadm is a tool launched by the official community for rapid deployment of kubernetes clusters.
This tool can deploy a kubernetes cluster through two instructions:
# Create a Master node
kubeadm init
# Add a Node to the current cluster
kubeadm join <Master Nodal IP And ports >
Build K8S cluster in kubedm mode
Building a K8s cl ...
Added by irishdreaming on Mon, 03 Jan 2022 00:55:42 +0200
OOP basics & OOP advanced & RE modules | Cloud computing
1. Write game characters
1.1 problems
To create a program, the requirements are as follows:
Create a game character classGame characters have names, weapons and other attributesGame characters have methods to attack and walkWeapons are realized through weapons
1.2 scheme
Because the game characters and weapons are implemented by clas ...
Added by germanjulian on Sun, 02 Jan 2022 20:02:50 +0200
Kali system & scanning and packet capture & service security | Cloud computing
1. Scanning and packet capturing analysis
1.1 problems
This case requires to be familiar with common security tools in Linux host environment and complete the following tasks:
Use nmap scan to obtain information about the specified host / network segmentScript scanning using nmapAnalysis of plaintext exchange information in FTP access ...
Added by MrQcue on Sun, 02 Jan 2022 12:44:08 +0200
Introduction to image storage scheme --- qiniu cloud storage
1. Picture storage scheme
1.1 INTRODUCTION
In the actual development, we will have many servers dealing with different functions. For example:
Application server: responsible for deploying our applications
Database server: running our database
File server: the server responsible for storing files uploaded by users
The purpose of sub ser ...
Added by hogleg on Wed, 29 Dec 2021 01:45:32 +0200
Ha keepalived (LVS+Keepalived) resolution and deployment
HA - Keepalived
Principle analysis
** 💯 Introduction: * * kepplived high availability technology prevents the inevitable impact of a single point of failure of the service and enhances the high availability and security of the service. For example, the failure of middleware rabbitmq, mysql, mycat, Haproxy and other servers will affect the ...
Added by Noctagon on Tue, 21 Dec 2021 23:17:31 +0200
ELK log analysis (latest version)
1, ELK overview
1. ELK introduction
ELK platform is a complete set of centralized log processing solution, which combines ElasticSearch, Logstash and Kiabana to meet more powerful user requirements for log query, sorting and statistics.
2. ELK composition
(1)ElasticSearch
• it is a distributed storage retrieval engine based on Luc ...
Added by rickead2000 on Mon, 20 Dec 2021 19:10:15 +0200
Correctly monitor the indicators of container OOMKill
Shortly after working in Splunk recently, a colleague found me on Slack and asked me about my previous blog post on Kubernetes indicators.His question is about which "memory usage" indicator in the container is used by OOMKiller to determine whether a container should be killed. My conclusion in that article is.You may think that usin ...
Added by fussy on Sat, 18 Dec 2021 15:48:44 +0200
Install highly available KubeSphere on Huawei cloud
With more and more cloud and cluster scenarios, the demand for deploying KubeSphere in various cloud vendor environments increases. Because the cloud resource usage rules and menu navigation bar of each cloud manufacturer are different, users will spend a lot of time troubleshooting. In order to reduce the error rate in the deployment process, ...
Added by Neoraven456 on Wed, 15 Dec 2021 22:15:02 +0200