Ceph Overview & Ceph cluster deployment & Ceph block storage | Cloud computing

1. Experimental environment 1.1 problems Four virtual machines are prepared, three of which are used as storage cluster nodes and one is installed as client to realize the following functions: Create 1 client virtual machineCreate 3 storage cluster virtual machinesConfigure host name, IP address, YUM sourceModify the hostname of all ho ...

Added by wiseone on Tue, 04 Jan 2022 06:24:43 +0200

SELinux & system troubleshooting & firewall policy management & service management | Cloud computing

1 case 1: enable SELinux protection 1.1 problems This example requires SELinux to be configured for virtual machines server0 and desktop0: Make sure SELinux is in force enable modeThis setting must remain valid after each reboot 1.2 scheme SELinux, security enhanced Linux: it is a set of kernel based enhanced mandatory security prote ...

Added by phoenixx on Tue, 04 Jan 2022 05:27:05 +0200

Building a highly available Rancher cluster based on K3S

WeChat official account: operation and development story, author: Liu Daxian K3S Description: K3s (lightweight Kubernetes): similar to RKE, it is also a certified Kubernetes distribution. It is newer than RKE, easier to use and lighter. All components are in a binary file less than 100 MB. From Rancher v2 Starting from 4, the Rancher can be ...

Added by wiseass on Mon, 03 Jan 2022 23:32:20 +0200

Spark introduction and spark deployment, principle and development environment construction

Spark introduction and spark deployment, principle and development environment construction Introduction to spark Spark is a fast, universal and scalable big data analysis and calculation engine based on memory. It is a general memory parallel computing framework developed by the AMP Laboratory (Algorithms, Machines, and People Lab) at the U ...

Added by benreisner on Mon, 03 Jan 2022 22:14:19 +0200

Enterprise entry practice -- k8s kubernetes access control

k8s access control Authentication There are 8 authentication methods. One or more authentication methods can be enabled. As long as one authentication method passes, other authentication methods will not be carried out. X509 Client Certs and Service Accout Tokens are usually enabled. There are two types of users in Kubernetes cluster: Ser ...

Added by shazly on Mon, 03 Jan 2022 20:26:28 +0200

Block storage application cases & distributed file system & and object storage | Cloud computing

1. Block storage application case 1.1 problems Continue the experiment content of Day03, demonstrate the application case of block storage, and realize the following functions: Create mirror snapshotRestore data using snapshotsClone mirrors using snapshotsDelete snapshot 1.2 steps To implement this case, you need to follow the follow ...

Added by MajorMo on Mon, 03 Jan 2022 18:46:19 +0200

Linux VIM editor and restoring files deleted by mistake under ext4 - Xmanager tool

Introduction to main modes of vim vim command mode Q: are vi and vim installed in the same package? A: NO, vim is an added version of vi. the most obvious difference is that vim can be syntax highlighted. It is fully compatible with vi Check a command, which software package is installed: [root@xuegod63 ~]# rpm -qf /usr/bin/vim [root@x ...

Added by rutin on Mon, 03 Jan 2022 18:38:15 +0200

Prometheus server & Prometheus monitored end & Grafana & and monitoring database | Cloud computing

1. Prometheus monitoring server 1.1 problems This case requires the deployment of prometheus monitoring server to complete the following tasks: Install monitoring serverModify profileWrite service files and manage servicesView monitoring data 1.2 scheme Two virtual machines are required for the experiment, and the host information is ...

Added by Haberdasher on Mon, 03 Jan 2022 11:22:56 +0200

Container resource constraints for Kubernetes(k8s)

Implementation of resource constraints Kubernetes' restriction on resources is actually controlled by cgroup, which is a set of related attributes of the container used to control how the kernel runs the process. There are corresponding cgroups for memory, CPU and various devices. By default, Pod runs without CPU and memory limits. This m ...

Added by robin01 on Mon, 03 Jan 2022 10:48:46 +0200

Linux scheduling, load balancing

1. Definition Complete the task according to the plan and finish the task regularly The user has set a scheduled task, but the user does not log in to the system. Will it still be executed every day? Yes, no matter whether the user logs in or not, he will perform the planned task 2. Use During linux operation and maintenance: Data backup: c ...

Added by Redlightpacket on Mon, 03 Jan 2022 01:54:12 +0200