Ceph Overview & Ceph cluster deployment & Ceph block storage | Cloud computing
1. Experimental environment
1.1 problems
Four virtual machines are prepared, three of which are used as storage cluster nodes and one is installed as client to realize the following functions:
Create 1 client virtual machineCreate 3 storage cluster virtual machinesConfigure host name, IP address, YUM sourceModify the hostname of all ho ...
Added by wiseone on Tue, 04 Jan 2022 06:24:43 +0200
SELinux & system troubleshooting & firewall policy management & service management | Cloud computing
1 case 1: enable SELinux protection
1.1 problems
This example requires SELinux to be configured for virtual machines server0 and desktop0:
Make sure SELinux is in force enable modeThis setting must remain valid after each reboot
1.2 scheme
SELinux, security enhanced Linux: it is a set of kernel based enhanced mandatory security prote ...
Added by phoenixx on Tue, 04 Jan 2022 05:27:05 +0200
Building a highly available Rancher cluster based on K3S
WeChat official account: operation and development story, author: Liu Daxian
K3S Description:
K3s (lightweight Kubernetes): similar to RKE, it is also a certified Kubernetes distribution. It is newer than RKE, easier to use and lighter. All components are in a binary file less than 100 MB. From Rancher v2 Starting from 4, the Rancher can be ...
Added by wiseass on Mon, 03 Jan 2022 23:32:20 +0200
Spark introduction and spark deployment, principle and development environment construction
Spark introduction and spark deployment, principle and development environment construction
Introduction to spark
Spark is a fast, universal and scalable big data analysis and calculation engine based on memory.
It is a general memory parallel computing framework developed by the AMP Laboratory (Algorithms, Machines, and People Lab) at the U ...
Added by benreisner on Mon, 03 Jan 2022 22:14:19 +0200
Enterprise entry practice -- k8s kubernetes access control
k8s access control
Authentication There are 8 authentication methods. One or more authentication methods can be enabled. As long as one authentication method passes, other authentication methods will not be carried out. X509 Client Certs and Service Accout Tokens are usually enabled.
There are two types of users in Kubernetes cluster: Ser ...
Added by shazly on Mon, 03 Jan 2022 20:26:28 +0200
Block storage application cases & distributed file system & and object storage | Cloud computing
1. Block storage application case
1.1 problems
Continue the experiment content of Day03, demonstrate the application case of block storage, and realize the following functions:
Create mirror snapshotRestore data using snapshotsClone mirrors using snapshotsDelete snapshot
1.2 steps
To implement this case, you need to follow the follow ...
Added by MajorMo on Mon, 03 Jan 2022 18:46:19 +0200
Linux VIM editor and restoring files deleted by mistake under ext4 - Xmanager tool
Introduction to main modes of vim
vim command mode Q: are vi and vim installed in the same package? A: NO, vim is an added version of vi. the most obvious difference is that vim can be syntax highlighted. It is fully compatible with vi
Check a command, which software package is installed:
[root@xuegod63 ~]# rpm -qf /usr/bin/vim
[root@x ...
Added by rutin on Mon, 03 Jan 2022 18:38:15 +0200
Prometheus server & Prometheus monitored end & Grafana & and monitoring database | Cloud computing
1. Prometheus monitoring server
1.1 problems
This case requires the deployment of prometheus monitoring server to complete the following tasks:
Install monitoring serverModify profileWrite service files and manage servicesView monitoring data
1.2 scheme
Two virtual machines are required for the experiment, and the host information is ...
Added by Haberdasher on Mon, 03 Jan 2022 11:22:56 +0200
Container resource constraints for Kubernetes(k8s)
Implementation of resource constraints
Kubernetes' restriction on resources is actually controlled by cgroup, which is a set of related attributes of the container used to control how the kernel runs the process. There are corresponding cgroups for memory, CPU and various devices.
By default, Pod runs without CPU and memory limits. This m ...
Added by robin01 on Mon, 03 Jan 2022 10:48:46 +0200
Linux scheduling, load balancing
1. Definition
Complete the task according to the plan and finish the task regularly
The user has set a scheduled task, but the user does not log in to the system. Will it still be executed every day? Yes, no matter whether the user logs in or not, he will perform the planned task
2. Use
During linux operation and maintenance: Data backup: c ...
Added by Redlightpacket on Mon, 03 Jan 2022 01:54:12 +0200