Kubernetes version 1.18.3 binary deployment

Tags (space delimited): kubernetes series 1: Introduction to system environment2: Deploy Etcd Cluster3: Install dockerIV: Deploy k8s Master NodeFive: Deploy k8s Worker NodeSix: Deploy Dashboard and Core DNS 1: Introduction to system environment 1.1 Environmental Preparation Before you begin, deploying the Kubernetes cluster machine require ...

Posted by cmos on Sun, 14 Jun 2020 20:29:01 +0200

Binary installation k8s

Article catalog 1, Kubernetes platform environment planning 1. Environment 2. Component allocation planning 2, Three official deployment methods 1.minikube 2.kubeadm 3. Binary package 4. Preparation before deployment (important!! ) 3, Self signed SSL certificate 1. Generate etcd certificate cfs ...

Posted by figo2476 on Sat, 13 Jun 2020 10:39:21 +0200

Collection artifact, Octopus Automatic Grab strategy and warehousing operation!

Collect a lot of anti - Crawler sites, there is a very good tool: Octopus... Directly through the browser access, a force to break ten thousand methods Preparatory work: money, spend money to buy members of Octopus website for a month or more, so that you can do Cloud Collection Next, grab the data by yourself. After the grab, set the timing ...

Posted by christillis on Tue, 02 Jun 2020 17:02:35 +0200

Istio police agent & envoy start process

Opening Through the previous article Istio Sidecar injection principle It can be found that the Sidecar application has been injected at the same time when the application is submitted to the kubernate deployment. If you are careful, you can also find that in addition to the application of istio proxy, there is also an Init Containers of istio ...

Posted by virtual_odin on Wed, 27 May 2020 13:02:34 +0200

Self made certificate of Android HTTPS realizes bidirectional authentication (OkHttp + Retrofit + Rxjava)

Due to a high security project to be done recently, it needs to use HTTPS for two-way authentication. When designing the project architecture, the client uses MVVM architecture, and realizes Android based on DataBinding + Retrofit + Rxjava. Looking up a lot of data, there are many examples of implementing two-way authentication based on native ...

Posted by okyejr on Thu, 21 May 2020 06:36:59 +0200

Modify Nginx configuration to implement https request (SSL certificate deployment)

When it comes to [Nginx] () servers, I think the biggest characteristics are lightweight and high performance. Through testing on several different servers, it is found that its concurrency is very strong, and it eats a lot less [memory] (). At present, it is the preferred HTTP and reverse proxy server for most webmasters. The webmaster's own ...

Posted by CrashRoX on Tue, 19 May 2020 11:52:26 +0200

Technology sharing | MySQL group replication data consistency management analysis

Author: Yang Taotao Senior database expert, specializing in MySQL for more than ten years. Good at mysql, PostgreSQL, MongoDB and other open-source database related backup and recovery, SQL tuning, monitoring operation and maintenance, high availability architecture design, etc. At present, he is working in aikesheng, providing MySQL related ...

Posted by trent2800 on Mon, 18 May 2020 11:20:05 +0200

nginx certificateless stream module reverse proxy https

The company's R & D is generally in the Intranet environment, but some third-party interfaces need to be called during the development. At this time, a server can be used as nginx reverse proxy, and then the R & D machine can modify the host file to point the domain name to the server to realize proxy forwarding. However, the nor ...

Posted by Chesso on Sat, 16 May 2020 16:05:28 +0200

Spring boot series integrated mail sending service and several ways of mail sending

Previous recommendation Spring boot series (I) idea new spring boot project Introduction to SpringBoot series (2) Spring boot series (3) configuration file details Spring boot series (IV) detailed explanation of web static resource configuration Spring boot series (V) Mybatis integrated full detailed version Spring boot series (6) integrated ty ...

Posted by jpbellavance on Sat, 09 May 2020 05:43:17 +0200

Step by step to complete Kubernetes binary deployment -- etcd cluster building (single node)

Completing Kubernetes binary deployment step by step (I) -- etcd cluster building (single node) Preface The basic theory and core components of Kubernetes are briefly introduced. The first step of deploying Kubernetes cluster with single node and binary system is to build etcd cluster experiment flow. List of cluster planning (the next article ...

Posted by RestlessThoughts on Tue, 05 May 2020 17:14:40 +0200