Correct use of k8s probe

WeChat Public Number: Operations and Maintenance Development Story, Author: Teacher Xia How to configure Pod's liveness and readiness and startup probes When you use kubernetes, have you ever encountered a vicious cycle in which a Pod hangs up and restarts after it starts? Have you ever wondered how kubernetes detects that a pod is still al ...

Added by austinderrick2 on Thu, 14 Oct 2021 23:06:34 +0300

Knowledge and use of Docker Swarm

Docker series Chapter 3 docker swarm preface This is an extension of the previous two chapters on Docker and Docker Compose. If you haven't learned it yet, you can learn it in order and look at this chapter again. The principle will be boring, but the basic theory is the basis of practice. Only when you understand it can you know the ...

Added by ArmanIc on Tue, 12 Oct 2021 22:45:23 +0300

redis sentry high availability deployment scheme

redis high availability cluster deployment scheme 1. redis installation and deployment redis installation is recommended to use source code compilation and installation, which is applicable to most linux systems # To download the redis file, it is recommended to create a new folder where you want to install it, and then download it to the fo ...

Added by Asinox on Tue, 12 Oct 2021 10:04:20 +0300

Various optimizations and anti-theft chains necessary for the use of Nginux

preface In the enterprise information application environment, the security and response speed of the server need to configure the response parameters according to the actual situation to achieve the optimal user experience. The default Nginx installation parameters can only provide the most basic services, and also need to reconcile the ...

Added by jacinthe on Mon, 11 Oct 2021 22:19:23 +0300

Chapter 4 Linux users and groups

1.Linux Security Model Resource allocation: Authentication: authentication to verify the user's identityAuthorization: authorization. Different users set different permissionsAccounting audit When the user logs in successfully, the system will automatically assign a token, including user ID, group member and other information 1.1 users In ...

Added by csousley on Mon, 11 Oct 2021 02:06:51 +0300

Install and configure Nginx in Linux Environment

Install and configure Nginx in Linux Environment preface It was the same project some time ago. Because the production environment was configured with nginx with domain name, it was found that the test environment had no domain name and was not installed after returning from the customer's site. Some problems were encountered during in ...

Added by Flukey on Sat, 09 Oct 2021 13:14:06 +0300

Day91 ~ 93 PAAS cloud platform_ docker container

Learning objectives Be able to tell the main differences between docker container and virtual machine Be able to name the kernel technology used by docker Able to install docker Master common operations of mirroring Master the construction and use of image warehouse Master common container operation commands Can find docker storage driv ...

Added by kmutz22 on Wed, 06 Oct 2021 01:21:54 +0300

rsync remote synchronization

1, rsync overview 1. The concept of rsync rsync (Remote Sync) is an open source fast incremental backup tool, which can mirror and synchronize the entire directory tree between different hosts, support incremental backup, maintain links and permissions, and adopt optimized synchronization algorithm to perform compression before transmission. ...

Added by davanderbilt on Sat, 02 Oct 2021 21:03:22 +0300

RHCSA-B5.Create Logical Volume

Red Hat RHCE Examination Morning-RHCSA (RH134) serverb.example.com task 5.Create Logical Volume Create a new logical volume as follows: Task Requirements Logical volume name database, volume group is datastorage, size is 60 PE size sThe PESIZE of datastore is 16MiBFormat into an ext4 file system. Automatically mount to/mnt/data at system s ...

Added by Pantho on Thu, 30 Sep 2021 21:11:48 +0300

Linux Network Services - DHCP

1, Understanding DHCP services 1.DHCP definition DHCP (Dynamic Host Configuration Protocol) is a LAN network protocol. It refers to a range of IP addresses controlled by the server. When the client logs in to the server, it can automatically obtain the IP address and subnet mask assigned by the server. By default, DHCP, as a service com ...

Added by ahundiak on Wed, 29 Sep 2021 00:32:28 +0300