K8S configuration center configMap and Secret

In the production environment, we often encounter the need to modify the configuration file. The traditional modification method will not only affect the normal operation of the service, but also the operation steps are very cumbersome. To solve this problem, the kubernetes project introduced the ConfigMap function from version 1.2 to separate ...

Added by terandle on Mon, 03 Jan 2022 01:34:47 +0200

58. Build Hadoop ha high availability for Ubuntu (start from scratch)

Environmental preparation numberhost nametypeuserIP1masterMaster noderoot192.168.231.2472slave1Slave noderoot192.168.231.2483slave2Slave noderoot192.168.231.249 Environment construction 1, Basic configuration 1. Install VMware tools Copy it to the desktop Note: Press' Enter 'when prompted, and enter ye ...

Added by jesirose on Mon, 03 Jan 2022 01:13:15 +0200

Container cluster k8s from introduction to proficient cluster environment construction (Chapter 2)

Chapter II cluster environment construction This chapter mainly introduces how to build kubernetes cluster environment Environmental planning Cluster type kubernetes clusters are generally divided into two types: one master-slave and multi master-slave. One Master and multiple slave: one Master Node and multiple Node nodes are simple to bu ...

Added by Jtech inc. on Sun, 02 Jan 2022 23:29:25 +0200

OOP basics & OOP advanced & RE modules | Cloud computing

1. Write game characters 1.1 problems To create a program, the requirements are as follows: Create a game character classGame characters have names, weapons and other attributesGame characters have methods to attack and walkWeapons are realized through weapons 1.2 scheme Because the game characters and weapons are implemented by clas ...

Added by germanjulian on Sun, 02 Jan 2022 20:02:50 +0200

Dameng DMDSC cluster deployment and construction

Environmental preparation (1) Two virtual machines are required, and the memory is better than 2G. DM8 is installed on each virtual machine, and initialization is not required after installation.(2) In this paper, the machine is named. The first one is called node 1 and the second one is called node 2, which is convenient to call. Because it i ...

Added by prue_ on Sun, 02 Jan 2022 18:58:12 +0200

Kali system & scanning and packet capture & service security | Cloud computing

1. Scanning and packet capturing analysis 1.1 problems This case requires to be familiar with common security tools in Linux host environment and complete the following tasks: Use nmap scan to obtain information about the specified host / network segmentScript scanning using nmapAnalysis of plaintext exchange information in FTP access ...

Added by MrQcue on Sun, 02 Jan 2022 12:44:08 +0200

Operation and maintenance practice -- Configmap configuration management of kubernetes storage

1. What is Configmap? Storage types in k8s are generally divided into Configmap, Secret and Volumes. configMap is a kind of storage. It is mainly used to save configuration data in the form of key value pairs. The configMap resource provides a method to inject configuration data into the Pod to decouple the image from the configuration fil ...

Added by nscipione on Sun, 02 Jan 2022 12:37:58 +0200

Prometheus Operator - Part I - installation and use

What is Prometheus Operator? To facilitate the management and deployment of Prometheus in Kubernetes, we use ConfigMap to manage Prometheus configuration files. Every time we upgrade the Prometheus configuration file, we need to manually remove the running Pod instance so that Kubernetes can create Prometheus with the latest configuration fil ...

Added by aalmos on Sun, 02 Jan 2022 06:17:43 +0200

Docker learning notes -- Dockerfile

DockerFile DockerFIle introduction dockerfile is the file used to build the docker image! Command parameter script! Construction steps: 1. Write a dockerfile file 2. Build docker build into an image 3.docker run run image 4.docker push publishing images (DockerHub, Alibaba cloud image warehouse) See what the authorities do? Many offi ...

Added by hernan on Sun, 02 Jan 2022 05:50:40 +0200

Linux Network Management

1, Modify network card name Centos6 network card names are eth0, eth1 Centos7 network card names are ens32, ens33 Because this irregular naming method brings difficulties to later maintenance, it is necessary to modify the network card name to eth0, eth1 1. After installing the operating system, modify the naming rule of the network card ...

Added by newbtophp on Sat, 01 Jan 2022 14:06:30 +0200