I got back an industrial control board with J2900 double Gigabit ports (odd model) for soft routing, but I wanted to use all kinds of skins, install a desktop environment with VNC, and I didn't have a cold on the virtual machine (and this U doesn't support through yet), so I had to give up all the router systems.As an Arch iron powder, in purs ...
Posted by vikaspa on Sun, 23 Feb 2020 08:31:13 -0800
Download official yaml file
The latest configuration file v2.0.0-beta 8, recommended.yaml, UI address
Posted by and1c on Fri, 21 Feb 2020 06:56:51 -0800
Overview of squid proxy server;
Overview: Squid Cache (SQUID for short) is http proxy server software. Squid is widely used as a cache server or a cache proxy server. It can be used as a proxy server for users to request data from the web server and cache it. It can filter traffic to help network secu ...
Posted by Sno on Tue, 11 Feb 2020 03:27:11 -0800
Overview of Cache Agents
How web proxies work:
Cache Web page objects to reduce duplicate requests
Basic types of agents
Traditional Proxy: For Internet use, specify the server explicitly
Transparent proxy: Clients do not need to specify the proxy server's address and port. The firewall redirects ...
Posted by quimkaos on Wed, 22 Jan 2020 23:44:27 -0800
Difference between Docker and Virtual Machine
Isolation and Sharing
By adding Hypervisor layer, virtual hardware such as network card, memory, CPU and so on, virtual machines can be built on top of it. Each virtual machine has its own system core
Docker containers isolate file systems, processes, devices, networks and other re ...
Posted by OMorchoe on Tue, 14 Jan 2020 11:21:14 -0800
1, nginx introduction
1.nginx service function:
2. Advantages of nginx service:
2, nginx service web deployment
1. Installation Preparation
2. Compile and install nginx
3. Start nginx preparation
3.1 configure environment variables
3.2 check syntax
4. Turn off firewall, SE
5. Web access
6. Deploy a site
Posted by Edward on Wed, 08 Jan 2020 08:32:35 -0800
Due to the popularity of K8s technology, enterprises of all sizes are using it now. Although it is not popularized, I believe it will happen sooner or later, so hurry up and learn more!
There are two ways to create resources in K8s: command line and YAML file. This blog mainly introduces the ways to use YAML file. If you need to use command li ...
Posted by pranesh on Tue, 07 Jan 2020 09:37:56 -0800
Download CentOS version 6.4 system
1: Modify IP address (system -- > preferences -- > network connections)
2. Add user
[root@localhost ~]# adduser hadoop
[root@localhost ~]# passwd hadoop
Changing password for user hadoop.
BAD PASSWORD: it is based on a dictionary word
BAD PASSWORD: is too simple
Posted by morphius on Tue, 31 Dec 2019 07:15:00 -0800
Introduction: there are wall problems in google's products in China. As a cloud native machine learning suite, kubeflow helps the team greatly. For the team without turning over the wall, building kubeflow based on the domestic image can help you solve many problems. Here, we provide you a set of kubeflow 0.6 installation scheme based on the d ...
Posted by peddel on Thu, 26 Dec 2019 01:00:32 -0800
1. Introduction of Network Virtualization Technology
1. What is a virtualized network
A virtualized network is a network virtualized by the linux kernel. In fact, the linux kernel can emulate a variety of network devices
Analog network devices: Analog network devices appear in pairs, one in containers and one in switches
Analog switches: Cont ...
Posted by xeidor on Sun, 22 Dec 2019 14:34:23 -0800