1, ES backup
1.1 basic concepts
Elasticsearch replica provides high reliability; partial node loss can be tolerated without service interruption. However, replicas do not provide protection against catastrophic failures. In this case, it is necessary to back up for processing. backup Elasticsearch clusters can us ...
Posted by Naez on Mon, 29 Jun 2020 00:38:26 -0700
Setting environment variables
If you want to run a specific task locally on the control host, you can use the local action statement.
Suppose that the remote host we need to configure has jus ...
Posted by roonnyy on Mon, 20 Apr 2020 00:57:21 -0700
This article starts from:
Jenkins Chinese community
Original link By Amet Umerov
Building Jenkins as code
This paper mainly introduces the specific method of Jenkins "configuration as code" mode, and explains the mode with tools and scripts
In our company, we try t ...
Posted by GregArtemides on Wed, 08 Apr 2020 02:15:11 -0700
This is the first novice practice of Cloudformation. Simply record the process. This exercise is to get familiar with the basic process
Cloudformation is a very important service of AWS. In short, its function is to realize infrastructure as code. The administrator can generate the corresponding stack by creating the template file and executin ...
Posted by everogrin on Fri, 03 Apr 2020 16:21:38 -0700
Thank you for your reference- http://bjbsair.com/2020-03-27/tech-info/7154/
The simplest way to accelerate the training of neural network is to use GPU. The speed of GPU in the normal operation (matrix multiplication and addition) of neural network is twice faster than that of CPU. As models or datasets grow larger, a GPU will soon become inad ...
Posted by toms on Fri, 27 Mar 2020 03:51:32 -0700
On October 31, at the 2019 China International Information and Communication Exhibition, the Ministry of industry and information technology announced that 5G business was officially launched. 5G business age is coming!
The commercial application of 5G makes the data transmission speed, response speed, connection data, data transmission volu ...
Posted by ramez_sever on Tue, 14 Jan 2020 19:11:58 -0800
1. k8s Authentication
We know that apiserver has the following authentication methods:
X509 Client Certs
Static Token File
Static Password File
Service Account Tokens
OpenID Connect Tokens
Webhook Token Authentication
Typically, we use a binary self-built k8s cluster, or a kubeadm-created cluster, the ad ...
Posted by jenp on Tue, 07 Jan 2020 09:40:10 -0800
For the application above EC2, do not assign User Credentials, use IAM Role Attachment.You can access the meatdata of EC2 to view the Role permission granted
2, Software on local laptop
For users who develop and test on their own computers, users need access rights o ...
Posted by mitzleah on Fri, 27 Dec 2019 06:04:52 -0800
VCF file is called Variant Call Format, which represents the variation information of genome, usually obtained by GATK and Samtools software. The VCF file can be roughly divided into two parts:
1. Header file information starting with ×××
Posted by kla0005 on Wed, 11 Dec 2019 00:31:01 -0800
In order to improve the communication efficiency of customer service department, the company chose Amazon Connect service of Amazon after investigation, because Alibaba cloud was not selected for foreign business, so there was a hole.
Amazon Connect background
We need to create "contact flow" in the background, that is, ...
Posted by rusbb on Tue, 10 Dec 2019 13:37:28 -0800