Implementation and deployment of linux Cluster
(1) configure basic environment
//Install virtual tools
#cd /media/VMware\ Tools/
#cp VMwareTools-10.0.6-3595377.tar.gz/tmp/
#cd /tmp/
#tar-xvzf VMwareTools-10.0.6-3595377.tar.gz
#cd vmware-tools-distrib/
#./vmware-install.pl
Stop and shut down the NetworkManager service: service NetworkManager status
#service Networ ...
Posted by autocolismo on Fri, 01 Nov 2019 10:15:26 +0100
Compile apache service manually to realize the function of anti-theft chain
Apache security chain
Apache installation package
Links: https://pan.baidu.com/s/11X5CEWoVemxlGuNQqn9cuAExtraction code: jn6l
1. Install and configure Apache service
1.1. Mount the Apache installation package to the virtual machine through sharing
[root@localhost ~]# smbclient -L //192.168.10.64
Enter SAMBA\root's password:
Sharename ...
Posted by josemi on Sun, 27 Oct 2019 00:09:17 +0200
Building virtual host of LAMP architecture
Virtual Web host
Run multiple Web sites on the same server, each of which is not independentTake up a real computer
Types of virtual hosts supported by httpd
1. Domain name based virtual host2. Virtual host based on IP address3. Port based virtual host
Demonstration of examples
Domain name based virtual host
Step 1: environment deployment
1. I ...
Posted by bimmer528 on Thu, 24 Oct 2019 00:28:30 +0200
Queue usage of Yii2 queue
Less bullshit, mainly documentsOfficial documents https://github.com/yiisoft/yi...
Use of yii2 queue
1. installation
composer require --prefer-dist yiisoft/yii2-queue
2. Configure in common/config/main.php
redis as driver
return [
'bootstrap' => [
'queue', // Register this component to the console
],
'components' => [ ...
Posted by broc7 on Mon, 21 Oct 2019 20:15:19 +0200
ECS uses docker to build services
Premise: Amazon cloud has been configured to start.
The inbound policy of security group is as follows:
The outbound strategy is as follows:
After logging in to EC2, only EC2 user can log in by default, and then switch to root:
sudo su
Prompt for installing docker no package docker available using yum.
yum install docker -y
resolvent:Add CentOS ...
Posted by Warmach on Wed, 16 Oct 2019 05:14:21 +0200
Detailed installation configuration of Docker
1. Configure yum source and install docker
[root@docker ~]# cd /etc/yum.repos.d/ #Switch to yum source directory
[root@docker yum.repos.d]# wget https://mirrors.aliyun.com/docker-ce/linux/centos/docker-ce.repo
#Download Ali's docker yum source library file
[root@docker yum.repos.d]# cd
[root@docker ~]# yum makecache #Establishing yum ...
Posted by jasper on Mon, 14 Oct 2019 19:39:26 +0200
LANP No Network Tower Blog
LAMP="Linux Apache Mysql PHP/Python"
Linux is often referred to as a system, and there is no explicit version, such as CentOS/Ubuntu/Debian, which can be used as a server system.
Apache is the engine of Web parsing, which is used to process Web source files into browser convertible page files.
MySQL database, MySQL is a relational database ...
Posted by pmzq on Mon, 14 Oct 2019 11:11:53 +0200
Linux DNS master-slave replication
The main purpose of setting up master-slave DNS is to share the pressure and redundancy so as to prevent DNS from being parsed properly after the server goes down.
Configure master
Normally configure DNS services.
Setting Host Name
[root@localhost ~]# hostnamectl set-hostname master
[root@localhost ~]# bash
Install the bind package
[root@ma ...
Posted by Lee-Bartlett on Wed, 09 Oct 2019 11:10:18 +0200
(10) Horizontally expanding the ceph cluster
When the cluster capacity or computing resources reach a certain limit, the cluster needs to be expanded, which can be divided into two main operations:1. Vertical expansion: adding disks to existing nodes will increase capacity and keep cluster computing performance unchanged;2. Horizontal expansion: adding new nodes, including disk, memory a ...
Posted by vandutch on Fri, 20 Sep 2019 19:10:31 +0200
Using Keepalived to Realize Hot Detailed Interpretation of Dual Computer
In this highly informationized IT era, production systems, business operations, sales and support, as well as daily management of enterprises are increasingly dependent on computer information and services. The demand for the application of high availability (HA) technology is constantly increasing in order to provide continuous and uninterrup ...
Posted by Mesden on Wed, 18 Sep 2019 16:11:55 +0200