Implementation and deployment of linux Cluster

  (1) configure basic environment //Install virtual tools #cd /media/VMware\ Tools/ #cp VMwareTools-10.0.6-3595377.tar.gz/tmp/ #cd /tmp/ #tar-xvzf VMwareTools-10.0.6-3595377.tar.gz #cd vmware-tools-distrib/ #./vmware-install.pl Stop and shut down the NetworkManager service: service NetworkManager status #service Networ ...

Posted by autocolismo on Fri, 01 Nov 2019 10:15:26 +0100

Compile apache service manually to realize the function of anti-theft chain

Apache security chain Apache installation package Links: https://pan.baidu.com/s/11X5CEWoVemxlGuNQqn9cuAExtraction code: jn6l 1. Install and configure Apache service 1.1. Mount the Apache installation package to the virtual machine through sharing [root@localhost ~]# smbclient -L //192.168.10.64 Enter SAMBA\root's password: Sharename ...

Posted by josemi on Sun, 27 Oct 2019 00:09:17 +0200

Building virtual host of LAMP architecture

Virtual Web host Run multiple Web sites on the same server, each of which is not independentTake up a real computer Types of virtual hosts supported by httpd 1. Domain name based virtual host2. Virtual host based on IP address3. Port based virtual host Demonstration of examples Domain name based virtual host Step 1: environment deployment 1. I ...

Posted by bimmer528 on Thu, 24 Oct 2019 00:28:30 +0200

Queue usage of Yii2 queue

Less bullshit, mainly documentsOfficial documents https://github.com/yiisoft/yi... Use of yii2 queue 1. installation composer require --prefer-dist yiisoft/yii2-queue 2. Configure in common/config/main.php redis as driver return [ 'bootstrap' => [ 'queue', // Register this component to the console ], 'components' => [ ...

Posted by broc7 on Mon, 21 Oct 2019 20:15:19 +0200

ECS uses docker to build services

Premise: Amazon cloud has been configured to start. The inbound policy of security group is as follows: The outbound strategy is as follows: After logging in to EC2, only EC2 user can log in by default, and then switch to root: sudo su Prompt for installing docker no package docker available using yum. yum install docker -y resolvent:Add CentOS ...

Posted by Warmach on Wed, 16 Oct 2019 05:14:21 +0200

Detailed installation configuration of Docker

1. Configure yum source and install docker [root@docker ~]# cd /etc/yum.repos.d/ #Switch to yum source directory [root@docker yum.repos.d]# wget https://mirrors.aliyun.com/docker-ce/linux/centos/docker-ce.repo #Download Ali's docker yum source library file [root@docker yum.repos.d]# cd [root@docker ~]# yum makecache #Establishing yum ...

Posted by jasper on Mon, 14 Oct 2019 19:39:26 +0200

LANP No Network Tower Blog

LAMP="Linux Apache Mysql PHP/Python" Linux is often referred to as a system, and there is no explicit version, such as CentOS/Ubuntu/Debian, which can be used as a server system. Apache is the engine of Web parsing, which is used to process Web source files into browser convertible page files. MySQL database, MySQL is a relational database ...

Posted by pmzq on Mon, 14 Oct 2019 11:11:53 +0200

Linux DNS master-slave replication

The main purpose of setting up master-slave DNS is to share the pressure and redundancy so as to prevent DNS from being parsed properly after the server goes down. Configure master Normally configure DNS services. Setting Host Name [root@localhost ~]# hostnamectl set-hostname master [root@localhost ~]# bash Install the bind package [root@ma ...

Posted by Lee-Bartlett on Wed, 09 Oct 2019 11:10:18 +0200

(10) Horizontally expanding the ceph cluster

When the cluster capacity or computing resources reach a certain limit, the cluster needs to be expanded, which can be divided into two main operations:1. Vertical expansion: adding disks to existing nodes will increase capacity and keep cluster computing performance unchanged;2. Horizontal expansion: adding new nodes, including disk, memory a ...

Posted by vandutch on Fri, 20 Sep 2019 19:10:31 +0200

Using Keepalived to Realize Hot Detailed Interpretation of Dual Computer

In this highly informationized IT era, production systems, business operations, sales and support, as well as daily management of enterprises are increasingly dependent on computer information and services. The demand for the application of high availability (HA) technology is constantly increasing in order to provide continuous and uninterrup ...

Posted by Mesden on Wed, 18 Sep 2019 16:11:55 +0200