In the previous section, I talked about the simple use and basic principles of docker machine, refer back to https://www.cnblogs.com/qiuhom-1874/p/13160915.html ; Today let's talk about docker cluster management tool docker swarm; docker swarm is the official cluster management tool for docker, which allows cross-host nodes to create and manage ...
Container Network Details
Virtual Network Type
Common network types for virtualization (virtual bridged networks)
Isolation bridge: 127.0.0.1
Host Bridge Only: No external communication
Router Bridge: Can be sent by nat, but cannot
NAT Bridge: NAT Connection Tracking for communication between host and external
Common network types for doc ...
Posted on Tue, 02 Jun 2020 20:14:20 -0400 by dustbuster
1. Basic concepts
1.1 Clusters and Nodes
kubernetes is an open source container engine management platform that enables automated deployment of containerized applications, task scheduling, resilience, load balancing, etc. cluster is composed of master and node roles
Master manages the cluster, master contains kube-apiserver, kube-controller-m ...
Posted on Sun, 24 May 2020 12:24:47 -0400 by wee493
In the previous blog, we mainly talked about the description of docker image and how to make image based on existing image and distribute image to docker warehouse. For review, please refer to https://www.cnblogs.com/qiuhom-1874/p/12941508.html Today, let's talk about the description of docker's network;
When using vm virtual machine, we know t ...
Posted on Sun, 24 May 2020 10:06:20 -0400 by bugcoder
1, Architecture introduction and environment deployment
(1) Understand the composition of cluster architecture servers
Basic architecture composition: (for user access)
1. Front end services:
1) Customer user
Is a visitor who requests to visit the website page
2) Security - firewall equipment
Policy control shall be carried out for users access ...
Posted on Mon, 04 May 2020 15:55:33 -0400 by atrum
One of the company's servers suddenly failed to connect to ssh.
You can log in normally in the background through Alibaba cloud control. The preliminary judgment should be caused by the following problems:
1. The sshd service did not start.
2. The firewall is blocked.
Enter iptables and find that port 22 is accessible. The problem is that t ...
Posted on Sat, 02 May 2020 05:56:20 -0400 by siwis
This morning, I wrote a code to detect my own rootkit, but that code can only detect the situation that hook lives in ftrace stub at the beginning of the function:https://blog.csdn.net/dog250/article/details/105465553
Craftsmen can't stop there. In the afternoon, I am going to write an x86 ʄ instruction parser, which is to take the entire TEXT ...
Posted on Mon, 13 Apr 2020 00:04:06 -0400 by Gillesie
Tags (space delimited): kubernetes series
1: High availability configuration for kubernetes
1: High availability configuration of kubeadmn for kubernetes
2: System Initialization
2.1 System Host Name
Posted on Thu, 09 Apr 2020 14:23:51 -0400 by bbbaldie
This test uses a virtual machine with ip of 192.168.2.21Although there are many steps below, you can follow the command or copy and paste command to complete the operation without difficulty
1. Installation Preparation
Posted on Tue, 31 Mar 2020 10:23:08 -0400 by Napster