The main functions of Keystone are as follows:
1 manage users and their permissions;
2. Maintain the Endpoint of OpenStack service;
3 Authentication and authentication.
4.1 configure Keystone database
#Create database in any control node, the database is automatically synchronized, take controller 1 ...
Posted by Sooz719 on Thu, 18 Jun 2020 05:36:15 +0200
1, Why open slow query
Most of the reasons for the poor query performance are the large amount of data. To start the slow query of mysql and record the SQL statements that take a long time to query in the log is conducive to our better position and optimization.
2, Several common reasons for the ...
Posted by bg on Sun, 14 Jun 2020 05:47:10 +0200
An excellent front-end engineer must be an excellent engineer first; an excellent engineer must be responsible for every line of code he writes and every commit he submits. That said, I don't want to write a very large and comprehensive article, but I want to write some small things.
0x002 undo git add
We know that to submit a com ...
Posted by kkessler on Sat, 13 Jun 2020 11:39:17 +0200
Objectives of information security protection
Non repudiationSafety protection link
Physical security: environment of various equipment / hosts and machine rooms
System security: the operating system of a host or device
Application Security: various ne ...
Posted by Tokunbo on Thu, 11 Jun 2020 08:14:01 +0200
VNC is a remote control tool software. VNC is a free open source software based on UNIX and Linux operating system. It has powerful remote control ability, high efficiency and practicality. iis7 server management tool is a free VNC connection software. It supports batch opening and installation of VNC servers. It can connect m ...
Posted by ashly on Tue, 02 Jun 2020 16:50:15 +0200
cifs - NFS (file system sharing)
Note: the server version should be consistent with the image
yum install nfs-utils -y
15 systemctl start nfs
16 firewall-cmd --get-services
17 firewall-cmd --permanent --add-service=nfs ##Add firewall policy
18 firewall-cmd --permanent --add-service=rpc ...
Posted by SevereSoldier on Sun, 31 May 2020 18:39:38 +0200
DDoS deflate is a very small tool for defense and mitigation of DDoS attacks. It can create a large number of IP address information of Internet connection by monitoring netstat, and prohibit or block these non IP addresses through IPTABLES.
It must be downloaded and installed in the terminal account under root authority. The specific commands ...
Posted by vurentjie on Fri, 22 May 2020 16:45:29 +0200
Source code for this article: GitHub. Click here || GitEE. Click here
1. Introduction to Column Library
ClickHouse is the 2016 Open Source Column Storage Database (DBMS) of Yandex, Russia. It is mainly used for OLAP online analysis processing queries, and can use SQL queries to generate real-time analysis data reports.
Row stor ...
Posted by bettydailey on Mon, 18 May 2020 02:49:32 +0200
Replica set introduction
What is a replica set
-MongoDB replication is the process of synchronizing data on multiple servers.
-Replication provides redundant backup of data and stores copies of data on multiple servers, improving data availability,
And can ensure the security of data. -Replication also allows you to recover data from hardwa ...
Posted by Shibbey on Wed, 06 May 2020 03:09:50 +0200
2. Port based virtual host configuration of Nginx
If a server has only one IP or needs to access different virtual hosts through different ports, port based virtual host configuration can be used.
2.1 suppose the server has an IP address of 192.168.2.154
[root@localhost conf]# ifconfig ens33:4 192.168.2.154/24 up
[root@localhost conf]# ...
Posted by chanchelkumar on Tue, 05 May 2020 03:35:56 +0200