Correct use of k8s probe
WeChat Public Number: Operations and Maintenance Development Story, Author: Teacher Xia
How to configure Pod's liveness and readiness and startup probes
When you use kubernetes, have you ever encountered a vicious cycle in which a Pod hangs up and restarts after it starts? Have you ever wondered how kubernetes detects that a pod is still al ...
Added by austinderrick2 on Thu, 14 Oct 2021 23:06:34 +0300
Knowledge and use of Docker Swarm
Docker series Chapter 3 docker swarm
preface
This is an extension of the previous two chapters on Docker and Docker Compose. If you haven't learned it yet, you can learn it in order and look at this chapter again. The principle will be boring, but the basic theory is the basis of practice. Only when you understand it can you know the ...
Added by ArmanIc on Tue, 12 Oct 2021 22:45:23 +0300
redis sentry high availability deployment scheme
redis high availability cluster deployment scheme
1. redis installation and deployment
redis installation is recommended to use source code compilation and installation, which is applicable to most linux systems
# To download the redis file, it is recommended to create a new folder where you want to install it, and then download it to the fo ...
Added by Asinox on Tue, 12 Oct 2021 10:04:20 +0300
Various optimizations and anti-theft chains necessary for the use of Nginux
preface
In the enterprise information application environment, the security and response speed of the server need to configure the response parameters according to the actual situation to achieve the optimal user experience. The default Nginx installation parameters can only provide the most basic services, and also need to reconcile the ...
Added by jacinthe on Mon, 11 Oct 2021 22:19:23 +0300
Chapter 4 Linux users and groups
1.Linux Security Model
Resource allocation:
Authentication: authentication to verify the user's identityAuthorization: authorization. Different users set different permissionsAccounting audit
When the user logs in successfully, the system will automatically assign a token, including user ID, group member and other information
1.1 users
In ...
Added by csousley on Mon, 11 Oct 2021 02:06:51 +0300
Install and configure Nginx in Linux Environment
Install and configure Nginx in Linux Environment
preface
It was the same project some time ago. Because the production environment was configured with nginx with domain name, it was found that the test environment had no domain name and was not installed after returning from the customer's site. Some problems were encountered during in ...
Added by Flukey on Sat, 09 Oct 2021 13:14:06 +0300
Day91 ~ 93 PAAS cloud platform_ docker container
Learning objectives
Be able to tell the main differences between docker container and virtual machine Be able to name the kernel technology used by docker Able to install docker Master common operations of mirroring Master the construction and use of image warehouse Master common container operation commands Can find docker storage driv ...
Added by kmutz22 on Wed, 06 Oct 2021 01:21:54 +0300
rsync remote synchronization
1, rsync overview
1. The concept of rsync
rsync (Remote Sync) is an open source fast incremental backup tool, which can mirror and synchronize the entire directory tree between different hosts, support incremental backup, maintain links and permissions, and adopt optimized synchronization algorithm to perform compression before transmission. ...
Added by davanderbilt on Sat, 02 Oct 2021 21:03:22 +0300
RHCSA-B5.Create Logical Volume
Red Hat RHCE Examination Morning-RHCSA (RH134)
serverb.example.com task
5.Create Logical Volume
Create a new logical volume as follows:
Task Requirements
Logical volume name database, volume group is datastorage, size is 60 PE size sThe PESIZE of datastore is 16MiBFormat into an ext4 file system. Automatically mount to/mnt/data at system s ...
Added by Pantho on Thu, 30 Sep 2021 21:11:48 +0300
Linux Network Services - DHCP
1, Understanding DHCP services
1.DHCP definition
DHCP (Dynamic Host Configuration Protocol) is a LAN network protocol. It refers to a range of IP addresses controlled by the server. When the client logs in to the server, it can automatically obtain the IP address and subnet mask assigned by the server. By default, DHCP, as a service com ...
Added by ahundiak on Wed, 29 Sep 2021 00:32:28 +0300