Hadoop practice chapter - cluster version

Hadoop practice (2)Author WenasWeiprefaceIn the previous Hadoop practical chapter, I introduced the local mode and pseudo cluster mode installation of Hadoop offline batch processing technology. Next, I will continue to learn the Hadoop cluster mode installation; It will be introduced from the following points:Linux host deployment planningZook ...

Added by zleviticus on Thu, 18 Nov 2021 11:39:42 +0200

ZooKeeper distributed lock

concept When we develop stand-alone applications and synchronize level concurrency, we often use synchronized or Lock to solve the problem of code synchronization between multiple threads. At this time, multiple threads run under the same JVM without any problem. However, when our application works in a distributed cluster, it belongs to a w ...

Added by mjm on Sun, 31 Oct 2021 07:29:12 +0200

Common commands of Zookeeper

Basic command syntax: help   : Display all operation commands   Client base command: Client basic instruction   1. View child nodes under a specific node ls path 2. Create a node. And bind data to the node (persistent node by default) create path data 3. Create persistent node (default is persistent node) create path data ...

Added by lihman on Sat, 30 Oct 2021 18:49:38 +0300

Zookeeper source code analysis - things about ZKDatabase

preface: Part of the reason why Zookeeper responds quickly is that its node data is loaded into memory. It avoids querying on disk every time a node is queried. The ZKDatabase introduced in this article exists as an in memory database of Zookeeper. Let's mainly look at how it loads data at startup, synchronizes changes during transaction exe ...

Added by topflight on Tue, 19 Oct 2021 01:42:52 +0300

Zab protocol - election algorithm election phase source code analysis

2021SC@SDUSC Introduction to the election stage Before analyzing the source code, let's first understand the election process. This stage is the first stage of Zab. Each node is in the election node at the beginning. As long as a node gets more than half of the votes of the nodes, it can be elected a quasi Leader. Only when it reaches the ...

Added by smonsivaes on Thu, 14 Oct 2021 23:29:48 +0300

[Zookeeper practice] Distributed installation and deployment & client command line operation (development focus)

1. Distributed installation and deployment 1. Cluster planning Deploy Zookeeper on Hadoop 102, Hadoop 103 and Hadoop 104 nodes. 2. Decompression and installation (1) Unzip the Zookeeper installation package to the / opt/module / directory [zs@hadoop102 software]$ tar -zxvf zookeeper-3.4.10.tar.gz -C /opt/module/ (2) Synchronize the c ...

Added by lbraine on Tue, 28 Sep 2021 23:35:19 +0300

[kafka series] CentOS 7 system installation

1, Prepare Ensure that JDK and zookeeper services have been built on the server; If the construction is not completed, please refer to the following articles: Installing zookeeper: https://blog.csdn.net/xuan_lu/article/details/120474451 Installation of JDK1.8: https://blog.csdn.net/xuan_lu/article/details/107297710 kafka official website: ...

Added by thedon on Sat, 25 Sep 2021 14:38:05 +0300

CNC panel unlock CNC panel decrypt

As a component of the K8S master, the controller manager is responsible for the startup and termination of many controllers. These controllers are responsible for monitoring various resources in k8s and performing tuning, so that their actual state can constantly approach the expected state. These controllers include server controller, nodecont ...

Added by zerGinfested on Tue, 21 Sep 2021 10:34:19 +0300

Distributed parallel computing experiment WordCount word count

Test the WordCount function in Hadoop cluster Goal: build a Hadoop development environment using Eclipse+Maven, and compile and run the official WordCount source code.   Create Hadoop project     establish Maven project Creating Maven Please set it before the project Maven , at least maven Change the image ...

Added by Bad HAL 9000 on Mon, 20 Sep 2021 19:14:38 +0300

HCIA Notes - --ACL Access Control List

ACL Access Control List Functions: 1. Access Restrictions - Match traffic on router traffic-in or-out interfaces and then restrict them 2. Define traffic of interest Introduction to ACL: 1. From top to bottom, match one by one, the previous match is executed as above, not the next 2. Calls to the ACL list are divided into in (matching the ...

Added by RedDragon on Sun, 19 Sep 2021 22:31:59 +0300