Install fail2ban + firewall in CentOS 8 to prevent SSH brute force cracking
To prevent online hackers from brutally cracking system accounts Using SSH, first prohibit key accounts such as root rem...
Linux remote SSH uses certificate-secured login (what do you do-zgbn)
Linux Remote SSH Using Certificate Secure Login Server: Ali Cloud Server Operating System: CentOS 7 (Linux) Remote cli...
Access other nodes through a jumper using the JSCH framework
A set of code for remotely accessing ssh has been developed. Recently, there is a need for a jumper to access the target...
Hexo +gitee blogging for the most complete teaching
Hexo is a fast, concise and efficient blog framework.Hexo Use Markdown (or other rendering engine) parses the article an...
Simple Distributed Cluster Cluster Setup for HDFS
Simple Distributed Cluster Cluster Setup for HDFS Preface
...
hadoop high availability installation (HA)
High availability hadoop installation HA Write at the beginning Installation procedure 1. Distribute JDK 1.1 install j...
[Linux command] Chapter 12: Learn shell script
Chapter 12 learning shell script
Usually, she...
Centos7 builds frp intranet penetration server
brief introduction The purpose of NAT penetration is to enable packets with a specific source IP address and source port...
Set up frp intranet penetration server
brief introduction The purpose of NAT penetration is to enable packets with a specific source IP address and source port...
Painless setting up hadoop cluster and running Wordcount program
catalog Pre preparation View local network information View network connection status Change network information Chang...
Continuous integration and deployment based on Jenkins and Gitlab
CI/CD Continuous Integration (CI) is a kind of software development practice. In Continuous Integration, developers inte...
On the difference between SCPClient class of ganymed-ssh2 version 262 and build210
ganymed-ssh2 is a tool library that uses SSH to connect to the server through java. The previous two versions of pom fil...
HeartBeat (NFS file mount for Web service hot standby)
The two hosts are backup to each other, and the Web service displays the resources on the NFS file system.
...
A Node online service migration
The original Node service needs to be migrated to a new host, so a new environment and corresponding migration scheme ne...
k8s+jenkins for Automated Deployment and application to k8s cluster
1. The jenkins environment prepares and starts the jenkins service 1) jdk environment configuration [root@centos7 ~]# ll...
Hadoop High Availability Environment Setup (QJM)
1. Virtual Machine Configuration host name NN DN ZK ZKFC JNN RM NM node1 * * * * node2 * * * * * * * node3 ...
Enable or disable SSH for a specific user or user group
What is SSH?
The full name of openssh is Open...
Network engineer's Python practice
When there are more and more devices in the network, and with the advent of automation, we should consider using automat...
Operation and maintenance project training - Hadoop distributed file system HDFS
1, Hadoop distributed file system HDFS single data storage node 1. Install and deploy Hadoop Specific steps: https://blog.csdn.net/Hannah_zh/article/...
Git on 4 server - configure server
Let's see how to configure ssh access on the server side. In this case, we will use the authorized_keys method to authenticate the user. At the ...
MHA High Availability Architecture Deployment Configuration Instance
1. Preface 1.1What's MHA?--An introduction to the principles MHA - Master High Availability, currently a relatively mature solution for MySQL hi...
[big data learning 02] preparation for Hadoop cluster installation
I. connecting virtual machines to the Internet The virtual machine cannot ping the network card. The following settings are required at this time vi ...
mac[linux] uses lsyncd to synchronize multiple files of two machines in real time
What is Lsyncd? Lsyncd is a lightweight real-time file backup solution, which is very easy to install and use. It can be used to synchronize files bet...
python learning notes -- Liao Xuefeng (17, list generation)
The generated form used to create the list. To generate list [1, 2, 3, 4, 5, 6, 7, 8, 9, 10], you can use list(range(1, 11)): note 11 >>> li...
Automatic deployment of front-end based on vue cli, automatic backup of index.html, version returnable
Expect: Hope to realize remote server deployment through npm command Deployment includes test environment and production environment Before packaging ...
Firewalld firewall advanced configuration - (real world chapter!!)
Experimental topology Experimental requirement 1. Intranet users of the company need to share the Internet through the gateway server2. Internet user...
Pgpool-II + PostgreSQL one main source and two standby source compiling environment
Host IP Virtual IP server1 192.168.222.141 192.168.222.200 server2 192.168.222.142 server3 192.168.222.143 Item Value Detail PostgreSQL version 10.10...