Two methods of source change for Ubuntu 20.04.3 desktop version
Article background
On different linux distribu...
5K Star, an open source Python static type checking Library
Mypy is Python's static type checking library. You can add type annotations to Python programs and use mypy to check the...
Chapter V VIM, the God of Linux text editing tools
1. VIM, the God of text editing tools
...
P1540 [NOIP2010 improvement group] machine translation & & P1160 queue arrangement
Topic background
Xiao Chen has installed a ma...
Implementation of Prometheus alarm through Alertmanager
Prometheus does not support the alarm function, mainly through the plug-in alertmanager to achieve alarm. Alertmanager i...
Redis series - bloon filter
When we use Redis as cache, one of the problems we need to consider is cache penetration. There are many types of cache ...
[linux] learn operation and maintenance step by step - Basic chapter - file permission management
Write before: Blogger is a rebel who pursues freedom after 80's standard of devoting himself to education and training. ...
ELK log analysis platform -- elastic search
1, elasticsearch practice
Open source distributed search ...
Simple Distributed Cluster Cluster Setup for HDFS
Simple Distributed Cluster Cluster Setup for HDFS Preface
...
MFS -- detailed explanation and deployment of MFS
mfs explanation and deployment 1, MFS details Distributed principle: MFS principle: Composition of MFS file system MFS...
spring cloud understands the components and call relations from the perspective of operation and maintenance
summary
Spring cloud developers provide tools...
k8s deployment elasticsearch cluster
Environmental preparation The k8s and ceph environments we use are as follows:https://blog.51cto.com/leejia/2495558https...
Painless setting up hadoop cluster and running Wordcount program
catalog Pre preparation View local network information View network connection status Change network information Chang...
Share sicsi by device
iSCSI technology is a kind of SCSI instruction set developed by IBM company, which can run on the upper layer of IP prot...
Chronyd synchronization time (Server/Client) configuration
The chronyd time server, like the previous NTP function, provides time.
...
Elastic search uses snapshot data migration and disaster recovery
In the face of multi cluster enterprise level complex architecture, it is very important to prepare a set of backup clus...
Centos7 MySQL installation master-slave replication configuration
Installation Dependency yum search libaio # Retrieving related information yum install libaio # Install Dependent Packag...
HeartBeat (NFS file mount for Web service hot standby)
The two hosts are backup to each other, and the Web service displays the resources on the NFS file system.
...
fudge parameter not found in centos linux ntp.conf configuration
Recently, the server was forced to shut down once and suddenly wanted to get the time synchronization service all togeth...
Mysql dual host hot standby and implementation of Mysql dual host and high availability with preserved
There are two ways of mysql hot standby:
Hot standby of m...
Install Oracle 11.2 silently under Centos7
Dependent packages (including 64 bit and 32-bit packages)
...
Class dump installation method
Rootless, a new feature added in Mac system 10.11, limits the permission of root user (/ usr/bin, no change allowed). Ch...
Linux sets the permanent and effective way of "the maximum number of files that can be opened by the process"
0. Before setting [root@localhost ~]# ulimit -a core file size (blocks, -c) 0 data seg size (kbytes, -d) unlimited sched...
Configuring Apache(httpd) with php
The main Apache configuration file is: / usr/local/apache2/conf/httpd.conf
...
One of the shell scripts: Introduction to shell scripts
1. Introduction to shell scripts (1) Script cases and introduction: #!/bin/bash LOG_DIR=/var/log ROOT_UID=0 if ["$UID -n...
Linux Kernel Firewall Selinux
Status view and modification of selinux getenforce ###View Status setenforce 0|1 ###0:permissive warning mode 1:enforci...
Linux server implements Redis cluster
1, About Redis Redis is a large-scale cache middleware, which is widely used because of its powerful, efficient and conv...
Adore ng trojan in Rootkit
Rootkit is a kind of special malicious software. Its function is to hide the information of itself and specified files, ...
Kubernetes StatefulSet for stateful service data persistence (automatic creation of PVC)
1. Kubernetes Stateless Service VS Stateful Service 1) Kubernetes Stateless Service Kubernetes stateless service charac...
Stateful set (stateful service) implementation of k8s
Statefullset introduction Problems encountered:
...