1. Deploy docker
1.1 deploy docker component
docker runs and manages containers, and kubelet interacts with it through the Container Runtime Interface (CRI).
1.2 download docker
1 [root@k8smaster01 ~]# cd /opt/k8s/work
2 [root@k8smaster01 work]# wget https://download.docker.com/linux/static/stable/x86_64/docker-18.09.6.tgz
3 [root@k8smast ...
Posted on Sun, 17 Nov 2019 23:50:24 -0500 by bruceleejr
Labels (space delimited): GreenPlum
In the process of configuring GreenPlum, you need to pay attention to the following points:
Find the installation package
Installation dependency, Gun version needs attention
Detailed installation procedure reference Greenplum installation introduction
I am a computer virtual machine insta ...
Posted on Sun, 10 Nov 2019 14:42:13 -0500 by antisback
Step by step
To implement this case, follow the steps below.
Step 1: write a typical Linux gateway firewall script
1) write script file / opt/ipfw-gw.sh
[root@gw1 ~]# vim /opt/ipfw-gw.sh
## 2015.05.20 TsengYia.
#### 1. Define environment variables for easy migration ####
Posted on Thu, 07 Nov 2019 12:28:26 -0500 by cocell
Note: under Linux, you can see the details of each cpu in / proc/cpuinfo. But for a dual core cpu, you will see two CPUs in cpuinfo. It is often mistaken for two single core CPUs.
Original address: http://www.hpboys.com/659.html
I. linux CPU size
[root@idc ~]# cat /proc/cpuinfo |grep "model name" && cat /proc/cpuinfo |grep "physical i ...
Posted on Fri, 01 Nov 2019 22:53:50 -0400 by manmadareddy
I. how to check whether the server has process monitoring on port 22 and the PID process number of the corresponding process? (only check port 22)
ss -ltunp | grep ':20\b'
2. Use crontab task plan to complete: execute a.sh file every 5 minutes between 7:00 and 9:00 every three nights every week?
Posted on Tue, 22 Oct 2019 11:11:52 -0400 by Castle
PPTP: Point-to-Point Tunneling Protocol
(PPTP: Point to Point Tunneling Protocol)
Through this protocol, remote users can access Microsoft Windows NT workstation, Windows 95 and Windows.
98 Operating system and other systems equipped with a bit of peer-to-peer protocol can access the company network securely, dial in to local ISP, and ...
Posted on Wed, 18 Sep 2019 05:23:43 -0400 by byrt
The current situation is that the company serves as a file server with Nginx. As more and more users and more projects become available, the problem that any user can access all files arises.To control access to files under Nginx, access control ...
Posted on Thu, 05 Sep 2019 23:14:10 -0400 by DRuCuLa
Title: "What will Kubelet-1 Kubelet do?"
tags: ["cloud", "kubernetes", "source-code"]
# draft: true
Original address: http://maoqide.live/post/cloud/kubelet-1-what-do-kubelet-do/
Kubelet is a very important component in the Kubernetes cluster. From every point in the cluster, the speci ...
Posted on Sat, 27 Jul 2019 03:04:49 -0400 by aktell
Recently, it is more and more difficult to summarize some knowledge points. It seems that there is still insufficient knowledge reserve and unfamiliar use. Stick to your head and try to write more. After all, good memory is not as good as bad pen, is it?Firewall, which is used to realize the function of access control under Linux, is divided in ...
Posted on Tue, 16 Jul 2019 14:26:12 -0400 by designerguy
Recently, the company has a new project, which requires batch installation of the operating system. If it does not automate, it will be tragic. It has been clicking on the mouse in the computer room. It is hard to think about it. So I write this article and send it to my little partner. We use Cent ...
Posted on Fri, 05 Jul 2019 15:07:07 -0400 by Alelinux