Block storage application cases & distributed file system & and object storage | Cloud computing

1. Block storage application case 1.1 problems Continue the experiment content of Day03, demonstrate the application case of block storage, and realize the following functions: Create mirror snapshotRestore data using snapshotsClone mirrors using snapshotsDelete snapshot 1.2 steps To implement this case, you need to follow the follow ...

Added by MajorMo on Mon, 03 Jan 2022 18:46:19 +0200

Prometheus server & Prometheus monitored end & Grafana & and monitoring database | Cloud computing

1. Prometheus monitoring server 1.1 problems This case requires the deployment of prometheus monitoring server to complete the following tasks: Install monitoring serverModify profileWrite service files and manage servicesView monitoring data 1.2 scheme Two virtual machines are required for the experiment, and the host information is ...

Added by Haberdasher on Mon, 03 Jan 2022 11:22:56 +0200

Build a K8S cluster with single master and multiple node s in kubedm mode (K8S version: v1.20.1)

kubeadm is a tool launched by the official community for rapid deployment of kubernetes clusters. This tool can deploy a kubernetes cluster through two instructions: # Create a Master node kubeadm init # Add a Node to the current cluster kubeadm join <Master Nodal IP And ports > Build K8S cluster in kubedm mode Building a K8s cl ...

Added by irishdreaming on Mon, 03 Jan 2022 00:55:42 +0200

OOP basics & OOP advanced & RE modules | Cloud computing

1. Write game characters 1.1 problems To create a program, the requirements are as follows: Create a game character classGame characters have names, weapons and other attributesGame characters have methods to attack and walkWeapons are realized through weapons 1.2 scheme Because the game characters and weapons are implemented by clas ...

Added by germanjulian on Sun, 02 Jan 2022 20:02:50 +0200

Kali system & scanning and packet capture & service security | Cloud computing

1. Scanning and packet capturing analysis 1.1 problems This case requires to be familiar with common security tools in Linux host environment and complete the following tasks: Use nmap scan to obtain information about the specified host / network segmentScript scanning using nmapAnalysis of plaintext exchange information in FTP access ...

Added by MrQcue on Sun, 02 Jan 2022 12:44:08 +0200

Introduction to image storage scheme --- qiniu cloud storage

1. Picture storage scheme 1.1 INTRODUCTION In the actual development, we will have many servers dealing with different functions. For example: Application server: responsible for deploying our applications Database server: running our database File server: the server responsible for storing files uploaded by users The purpose of sub ser ...

Added by hogleg on Wed, 29 Dec 2021 01:45:32 +0200

Ha keepalived (LVS+Keepalived) resolution and deployment

HA - Keepalived Principle analysis ** 💯 Introduction: * * kepplived high availability technology prevents the inevitable impact of a single point of failure of the service and enhances the high availability and security of the service. For example, the failure of middleware rabbitmq, mysql, mycat, Haproxy and other servers will affect the ...

Added by Noctagon on Tue, 21 Dec 2021 23:17:31 +0200

ELK log analysis (latest version)

1, ELK overview 1. ELK introduction ELK platform is a complete set of centralized log processing solution, which combines ElasticSearch, Logstash and Kiabana to meet more powerful user requirements for log query, sorting and statistics. 2. ELK composition (1)ElasticSearch • it is a distributed storage retrieval engine based on Luc ...

Added by rickead2000 on Mon, 20 Dec 2021 19:10:15 +0200

Correctly monitor the indicators of container OOMKill

Shortly after working in Splunk recently, a colleague found me on Slack and asked me about my previous blog post on Kubernetes indicators.His question is about which "memory usage" indicator in the container is used by OOMKiller to determine whether a container should be killed. My conclusion in that article is.You may think that usin ...

Added by fussy on Sat, 18 Dec 2021 15:48:44 +0200

Install highly available KubeSphere on Huawei cloud

With more and more cloud and cluster scenarios, the demand for deploying KubeSphere in various cloud vendor environments increases. Because the cloud resource usage rules and menu navigation bar of each cloud manufacturer are different, users will spend a lot of time troubleshooting. In order to reduce the error rate in the deployment process, ...

Added by Neoraven456 on Wed, 15 Dec 2021 22:15:02 +0200