Take linux as an example
1. Download the first version
curl -LO https://storage.googleapis.com/kubernetes-release/release/`curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt`/bin/linux/amd64/kubectl
2. Give exec ...
Posted on Fri, 12 Jun 2020 00:40:38 -0400 by ztkirby
Constructors and Destructors
Methods, Information, Classes, and Objects
[Code repository]:Https://github.com/zzu-andrew/linux-sys/b ...
Posted on Thu, 11 Jun 2020 20:46:31 -0400 by AbsolutelyFreeW
The k8s and ceph environments we use are as follows:https://blog.51cto.com/leejia/2495558https://blog.51cto.com/leejia/2499684
Introduction to ECK
Elastic Cloud on Kubernetes, a new orchestration product based on the Kubernetes Operator model, allows users to configure, manage, and run Elastic search clusters on Kuber ...
Posted on Wed, 10 Jun 2020 13:00:20 -0400 by zartzar
Don't say anything. Let's take a picture first. Wait... There's also a snapshot;
Let's see how we use CoAP protocol to connect EMQX;
1, Start the coap plug-in and use the code test;
1. Open the emqx COAP plug-in; you can directly click the enable button on the dashboard; (recommended by Win e ...
Posted on Wed, 10 Jun 2020 02:26:39 -0400 by olm475
The purpose of NAT penetration is to enable packets with a specific source IP address and source port number to be correctly routed to the intranet host without being shielded by the NAT device. When the computer is in the LAN, the computer nodes of the outer network and the inner network need to connect the communication th ...
Posted on Wed, 10 Jun 2020 00:32:57 -0400 by Zetusko
The Beats platform is a collection of multiple single-purpose data collectors.These collectors can be installed as lightweight agents to send data to Logstash or Elasticsearch from hundreds or thousands of machines.
I. Architecture Diagram
This experiment is based on the previous articles, which need to be based on the previous articles.
Posted on Tue, 09 Jun 2020 12:59:38 -0400 by sycoj0ker
What does a file have to do with a path?What secrets do files and paths hide?What are the ways to create paths under the management of the file system?Today, Brother F brought his little sister and brother to give you another wonderful performance.
Files and Paths
Little sister: Brother F, I have a problem. File in java is a ...
Posted on Mon, 08 Jun 2020 18:51:23 -0400 by jonabomer
Earlier, we talked about the construction and simple use of docker distribution, a private image warehouse of docker. Please refer to https://www.cnblogs.com/qiuhom-1874/p/13058338.html From the previous construction and use process, the warehouse built by docker distribution is very simple, and it does not even have a user authentication, let ...
Posted on Sun, 07 Jun 2020 23:55:19 -0400 by laurton
1. Pod Resource Management
1.1 resource definition
Containers need to allocate resources during operation. How can they work with cggroup?The answer is to allocate resources by defining a resource, which is mainly allocated by cpu and memory. There are two definitions of resources: requests and limits. requests represent requesting resources, ...
Posted on Sun, 07 Jun 2020 12:29:03 -0400 by crash4o4
Comprehensive MYSQL database consolidation
MYSQL database reinforcement Guide
1. Database storage location check
windows system: database cannot be placed on Disk C
linux system: database files cannot be stored in /, / var,/usr directory
#Connect mysql data, mysql-uroot-p -- enter password
Posted on Sun, 07 Jun 2020 03:40:43 -0400 by ale1981