Hadoop practice chapter - cluster version
Hadoop practice (2)Author WenasWeiprefaceIn the previous Hadoop practical chapter, I introduced the local mode and pseudo cluster mode installation of Hadoop offline batch processing technology. Next, I will continue to learn the Hadoop cluster mode installation; It will be introduced from the following points:Linux host deployment planningZook ...
Added by zleviticus on Thu, 18 Nov 2021 11:39:42 +0200
ZooKeeper distributed lock
concept
When we develop stand-alone applications and synchronize level concurrency, we often use synchronized or Lock to solve the problem of code synchronization between multiple threads. At this time, multiple threads run under the same JVM without any problem. However, when our application works in a distributed cluster, it belongs to a w ...
Added by mjm on Sun, 31 Oct 2021 07:29:12 +0200
Common commands of Zookeeper
Basic command syntax:
help : Display all operation commands
Client base command:
Client basic instruction
1. View child nodes under a specific node
ls path
2. Create a node. And bind data to the node (persistent node by default)
create path data
3. Create persistent node (default is persistent node)
create path data
...
Added by lihman on Sat, 30 Oct 2021 18:49:38 +0300
Zookeeper source code analysis - things about ZKDatabase
preface:
Part of the reason why Zookeeper responds quickly is that its node data is loaded into memory. It avoids querying on disk every time a node is queried.
The ZKDatabase introduced in this article exists as an in memory database of Zookeeper.
Let's mainly look at how it loads data at startup, synchronizes changes during transaction exe ...
Added by topflight on Tue, 19 Oct 2021 01:42:52 +0300
Zab protocol - election algorithm election phase source code analysis
2021SC@SDUSC
Introduction to the election stage
Before analyzing the source code, let's first understand the election process. This stage is the first stage of Zab. Each node is in the election node at the beginning. As long as a node gets more than half of the votes of the nodes, it can be elected a quasi Leader. Only when it reaches the ...
Added by smonsivaes on Thu, 14 Oct 2021 23:29:48 +0300
[Zookeeper practice] Distributed installation and deployment & client command line operation (development focus)
1. Distributed installation and deployment
1. Cluster planning
Deploy Zookeeper on Hadoop 102, Hadoop 103 and Hadoop 104 nodes.
2. Decompression and installation
(1) Unzip the Zookeeper installation package to the / opt/module / directory
[zs@hadoop102 software]$ tar -zxvf zookeeper-3.4.10.tar.gz -C /opt/module/
(2) Synchronize the c ...
Added by lbraine on Tue, 28 Sep 2021 23:35:19 +0300
[kafka series] CentOS 7 system installation
1, Prepare
Ensure that JDK and zookeeper services have been built on the server; If the construction is not completed, please refer to the following articles: Installing zookeeper: https://blog.csdn.net/xuan_lu/article/details/120474451 Installation of JDK1.8: https://blog.csdn.net/xuan_lu/article/details/107297710
kafka official website: ...
Added by thedon on Sat, 25 Sep 2021 14:38:05 +0300
CNC panel unlock CNC panel decrypt
As a component of the K8S master, the controller manager is responsible for the startup and termination of many controllers. These controllers are responsible for monitoring various resources in k8s and performing tuning, so that their actual state can constantly approach the expected state. These controllers include server controller, nodecont ...
Added by zerGinfested on Tue, 21 Sep 2021 10:34:19 +0300
Distributed parallel computing experiment WordCount word count
Test the WordCount function in Hadoop cluster
Goal: build a Hadoop development environment using Eclipse+Maven, and compile and run the official WordCount source code.
Create Hadoop project
establish
Maven
project
Creating
Maven
Please set it before the project
Maven
, at least
maven
Change the image ...
Added by Bad HAL 9000 on Mon, 20 Sep 2021 19:14:38 +0300
HCIA Notes - --ACL Access Control List
ACL Access Control List
Functions:
1. Access Restrictions - Match traffic on router traffic-in or-out interfaces and then restrict them
2. Define traffic of interest
Introduction to ACL:
1. From top to bottom, match one by one, the previous match is executed as above, not the next
2. Calls to the ACL list are divided into in (matching the ...
Added by RedDragon on Sun, 19 Sep 2021 22:31:59 +0300