kubernetes dynamic storage based on nfs

1 create nfs Deploy the nfs service on the kubernetes master node and execute on the master node #master node install nfs yum -y install nfs-utils #Create nfs directory mkdir -p /nfs/data/ #Modify permission chmod -R 777 /nfs/data #Edit the export file, which is the default configuration file of nfs vim /etc/exports /nfs/data *(rw,no_root_sq ...

Posted on Tue, 16 Jun 2020 03:04:15 -0400 by snk

003.Spring Cloud Feign using ApplicationListener

1. Scenario premise Suppose there is a scenario: in a Spring Cloud Feign( Greenwich.SR6 )In the application, you want to listen to some events after the Spring container is started. For example, you need to do an initialization operation after receiving the ContextRefreshedEvent event. Generally, it i ...

Posted on Sun, 14 Jun 2020 00:51:16 -0400 by Arya

Vue toy: 200 lines of code to simulate the implementation of Vue

vue-toy About 200 lines of code simulate the implementation of vue. The view rendering part uses React instead of Snabbdom. Welcome to Star.Project address: https://github.com/bplok20010/vue-toy codesandbox example Implemented parameters: interface Options { el: HTMLElement | string; propsData?: Record<string, any>; props?: st ...

Posted on Sun, 14 Jun 2020 00:12:38 -0400 by paul_so40

Read csv and Excel data with pandas

This article uses real stock data as an example to teach you how to read common data files in Python. Content: Read csv data Read Excel data Merge multiple tables Data file download address: CSV data file nasdaq-listings.csv https://raw.githubusercontent.com/fishstar/Data-Analysis-Practice/master/import%26manage_data_in_Python/nasdaq-listings ...

Posted on Sat, 13 Jun 2020 06:55:15 -0400 by markepic

PHP obtains the K-line data of fire currency through URL and WebSocket

Recently, a module on the project line needs to obtain the K-line data of fire coin. In the early stage, I used the Workerman timing task to get the data through URL request every second. After the task was done, the boss felt that the data was not real-time, so I couldn't optimize it. Fortunately, in G ...

Posted on Fri, 12 Jun 2020 05:11:05 -0400 by Ph0enix

Strengthen spring series Chapter 17: Spring internationalization (i18n)

Article catalog Strengthen spring series Chapter 17: Spring internationalization (i18n) preface 1. Project environment 2.Spring international usage scenario 3.Spring International interface 3. Hierarchical MessageSource 4.Java internationalization standard implementation 4.1 core interface 4.2 core ...

Posted on Fri, 12 Jun 2020 04:00:41 -0400 by BluntedbyNature

Experience of FastDFS cluster

FastDFS cluster FastDFS is an open-source lightweight distributed file system, which manages files. Its functions include file storage, file synchronization, file access (file upload, file download), etc. It solves the problems of mass storage and load balancing. It is especially suitable for online s ...

Posted on Fri, 12 Jun 2020 02:01:27 -0400 by Pha

Multi cluster k8s dashboard ldap unified login and authorization tool

Origin of tools Why write such a tool? This is because our company has multiple kubernetes clusters (8 +), and cloud hosting services can't access the apserver configuration, which brings us a pain point. Development and sre need to log in to k8s dashbao and different departments and roles need different authorizations, which used to be throug ...

Posted on Fri, 12 Jun 2020 01:04:46 -0400 by mistjulia

Java crawler framework WebMagic

The architecture design of WebMagic refers to scratch, while the implementation uses mature Java tools such as HttpClient and Jsoup.WebMagic consists of four components (Downloader, PageProcessor, Scheduler, Pipeline): Downloader: Downloader PageProcessor: page parser Scheduler: task assignment, url de duplication Pipeline: data storage an ...

Posted on Thu, 11 Jun 2020 23:38:02 -0400 by Drabin

Python zero basic programming - 09 practical cryptology chapter - encryption and decryption of classical encryption algorithm

abstract Book to previous: 1-Zero basic programming -- Python basic 2-Zero basic programming: basic theory of cryptography In the previous part, we shared the basic theory of cryptography. Starting from Morse code, we analyzed Caesar encryption, transposition encryption, digital multiplication en ...

Posted on Thu, 11 Jun 2020 22:57:56 -0400 by Zaxnyd