Lifecycle in kubernetes-3 k8s cluster
1. What is the Pod lifecycle
The Pod can contain multiple containers, and the Pod can also have one or more init containers started before the application container. The init container is not different from the ordinary container. The main reason is that init runs first. The main container will not be started until init runs successfully. Ther ...
Posted by able on Tue, 04 Jan 2022 14:18:12 +0100
LED lamp driving experiment of linux
In front, we all write our own LED lamp drivers. In fact, for very basic device drivers such as LED lamps, the Linux kernel has been integrated. The LED driver of Linux kernel adopts platform framework,
Therefore, we only need to add corresponding LED nodes in the device tree file as required,
1, linux kernel comes with LED driver enable
...
Posted by jsinker on Tue, 04 Jan 2022 12:43:32 +0100
RH358 configuring e-mail transmission -- automated Postfix configuration
RH358 configuring e-mail transmission – automated Postfix configuration
Use Ansible to configure the SMTP of the Postfix system role. Are the superposition of commonly used modules.
RH358 column address: https://blog.csdn.net/qq_41765918/category_11532281.html
1. Configure SMTP with Postfix system role
The RHEL system roles ...
Posted by vinny69 on Tue, 04 Jan 2022 11:45:39 +0100
Linux System Engineer -- Apache management and optimization
Linux System Engineer
The system used in the experiment is redhat-rhel8 2.
Linux system management - Apache management and optimization
1, Function and installation of Apache
Web Server software
stay web Commonly used when accessed http: //The way
http: // ##Hypertext Transfer Protocol
dnf install httpd.x86_64 -y
2, Enabling Apache ...
Posted by xiaix on Tue, 04 Jan 2022 11:20:49 +0100
Linux users and groups
Why introduce users and groups? Security - permission management (which files can be read and written by a user and which processes can be started by a user) - Resource Management (storage resources, IO, CPU resources)
[root@localhost ~]# id root
uid=0(root) gid=0(root) group=0(root)
Each user has a unique uid and gid
A user can have differen ...
Posted by amob005 on Tue, 04 Jan 2022 10:53:34 +0100
A little curiosity about linux: linux startup process
Always curious, how does the operating system work? We know how normal programming makes the code run, but those are high-level things. Later on, you will feel like a castle in the air, or someone has paved a lot of truth for you, but you know nothing about it.
1. Confusion of operating system
Of course, I don't really know anything. Because ...
Posted by teddirez on Tue, 04 Jan 2022 10:42:47 +0100
nginx implements reverse proxy and dynamic static separation
1 install two slaver s
1.1 server configuration
java37master:1G
java37slaver1:512M
java37slaver2:512M
1.2 creating virtual machines
Set the memory to 512M
Set up network
Set the host name and apply: java37slaver1+java37slaver2
Set encoding set
Set sheet number password
Note: if an error occurs: unable to get the version of the VMCI ...
Posted by JasonO on Tue, 04 Jan 2022 09:45:45 +0100
Ansible Vault & Common users use Ansible | Cloud computing
1. Comprehensive exercise (automatic deployment of Web cluster)
1.1 problems
Evening self-study extracurricular comprehensive exercises, create a role called cluster and complete a comprehensive project. The specific requirements are as follows:
Create Role and complete the project through RoleDeploy Nginx schedulerDeploy 2 http server ...
Posted by predhtz on Tue, 04 Jan 2022 08:22:14 +0100
Process and scheduled task management
1, View process
1.1 relationship between procedure and process
program 1. Executable code and data stored in hard disk, disk closing and other media 2. Statically saved code 3. Binary file, static
process 1. Program code running in CPU and memory 2. Dynamically executed code 3. Parent and child processes (each program can create o ...
Posted by John_wilson on Tue, 04 Jan 2022 07:25:43 +0100
Shell Scripting Basic Grammar Tutorial
Preface
_This paper simply records the knowledge about Shell scripting. Original video directions: Original video Click here
1. Shell Variables
(1) Definition:
Variable name = variable value A=hello # Define variable A whose value is hello
echo $A # Call the variable, note the money, "$"
Be careful:
Call another ...
Posted by rupturedtoad on Tue, 04 Jan 2022 07:16:14 +0100