Things to do after buying ECS

  today, I'm bringing you how to configure your environment in ECs. Let me explain my configuration first. I use Alibaba cloud server ECS + Ubuntu 20.04 64 bit. Different servers and different system versions may lead to slightly different operations. If you are a user of Huawei cloud, Tencent cloud or Baidu cloud, please explore mo ...

Posted by shortj75 on Thu, 20 Jan 2022 04:21:01 +0100

RH358 provides file based networked storage automated provisioning of file based storage

RH358 provides file based networked storage – automated provisioning of file based storage This chapter describes how to use Ansible to provide file based network storage. This demonstration can also make better use of Ansible. 1. Deploy NFS server using Ansible The following is a basic overview of the tasks required to deploy ...

Posted by dubhcat on Thu, 20 Jan 2022 03:40:06 +0100

Shell programming and variables

1, Overview 1. Concept 1) What is a shell: shell It is a command interpreter, which is at the outermost layer of the operating system. It is responsible for directly talking with the user, interpreting the user's input to the operating system, processing various operating system output results, and outputting them to the screen for feedb ...

Posted by badapple on Wed, 19 Jan 2022 17:42:00 +0100

Enterprise operation and maintenance ---- Saltstack automation (introduction, installation, remote execution, grains, Jinja template)

1, Introduction to Saltstack 1. Introduction saltstack is a configuration management system that can maintain remote nodes in predefined states.saltstack is a distributed remote execution system, which is used to execute commands and query data on remote nodes.saltstack is a powerful tool for operation and maintenance personnel to improve ...

Posted by enfys on Wed, 19 Jan 2022 10:18:40 +0100

Learn in three minutes, send wechat to her automatically and send Spring Festival blessings

It's half a month before the Spring Festival in 2022. According to custom, we all go to pay New Year's greetings during the new year. New year's call is a traditional custom among Chinese people. It is a way for people to leave the old and welcome the new year and express good wishes to each other. In ancient times, the original meaning of the ...

Posted by SheepWoolie on Wed, 19 Jan 2022 07:37:10 +0100

RH358 provides file based networked storage - provides SMB file sharing

RH358 provides file based networked storage – SMB file sharing This chapter describes how to provide Samba sharing, but in my opinion, samba has become a chicken rib service. Because of the emergence of blackmail virus, many government and enterprises will ban ports 135, 137, 138, 139 and 445 at the network level, and the samba protoc ...

Posted by Coinnoch on Tue, 18 Jan 2022 23:08:35 +0100

Reason for Cannot execute binary file

1. Write at the beginning Question: the author uses kaniko to build a docker image, and the basic image is based on Alpine. After the build, run the compiled go binary. Always prompt the following error: # ./example.exe sh: ./example.exe: not found Example is obvious here Exe file exists. It is suspected that sh has a problem. The aut ...

Posted by Napster on Tue, 18 Jan 2022 19:22:37 +0100

How to gracefully pull private images from Harbor?

Previously, I shared the Harbor series articles in my column Harbor dictionary. In this issue, we will continue to share how to pull private images in Harbor in k8s's container. We can pull public images in Harbor at will, but some private images cannot be pulled directly. We can use the Secret resource object to pull private images. The foll ...

Posted by nonaguy on Tue, 18 Jan 2022 08:20:35 +0100

Practice of front-end deployment of scaffold private network project

prefaceFront end scaffolding is an important tool to improve team efficiency in front-end engineering. Therefore, building scaffolding is an unavailable skill for front-end engineers, while there are relatively few scaffolds in the industry for deployment. Generally speaking, it is related to the relevant templates of the business, This paper a ...

Posted by x_filed2k on Mon, 17 Jan 2022 21:42:53 +0100

Detailed explanation of Linux ❉ SetUID (SUID), SetGID (SGID) and SetGID (SGID)

A detailed explanation of the usage of special permissions for SetUID (SUID) files 1 Introduction [root@localhost ~]# ls -l /usr/bin/passwd -rwsr-xr-x. 1 root root 22984 Jan 7 2007 /usr/bin/passwd It can be seen that the x permission bit originally represents the permission of the file owner, but the s permission appears. This permission ...

Posted by gotissues68 on Mon, 17 Jan 2022 10:55:00 +0100