Turn your Archlinux into a router

I got back an industrial control board with J2900 double Gigabit ports (odd model) for soft routing, but I wanted to use all kinds of skins, install a desktop environment with VNC, and I didn't have a cold on the virtual machine (and this U doesn't support through yet), so I had to give up all the router systems.As an Arch iron powder, in purs ...

Posted by vikaspa on Sun, 23 Feb 2020 08:31:13 -0800

Windows play Kubernetes series 4-build K8S Dashboard

Download official yaml file The latest configuration file v2.0.0-beta 8, recommended.yaml, UI address wget https://raw.githubusercontent.com/kubernetes/dashboard/v2.0.0-beta8/aio/deploy/recommended.yaml Original document: kind: Service apiVersion: v1 metadata: labels: k8s-app: kubernetes-dashboard name: kubernetes-dashboard namespace: ...

Posted by and1c on Fri, 21 Feb 2020 06:56:51 -0800

squid installation and traditional mode

Overview of squid proxy server; Overview: Squid Cache (SQUID for short) is http proxy server software. Squid is widely used as a cache server or a cache proxy server. It can be used as a proxy server for users to request data from the web server and cache it. It can filter traffic to help network secu ...

Posted by Sno on Tue, 11 Feb 2020 03:27:11 -0800

Squid Proxy Server - Traditional Proxy, Transparent Proxy (Practice!)

Overview of Cache Agents How web proxies work: Cache Web page objects to reduce duplicate requests Basic types of agents Traditional Proxy: For Internet use, specify the server explicitly Transparent proxy: Clients do not need to specify the proxy server's address and port. The firewall redirects ...

Posted by quimkaos on Wed, 22 Jan 2020 23:44:27 -0800

Docker Security Management (Actual!!!)

Docker Security Difference between Docker and Virtual Machine Isolation and Sharing By adding Hypervisor layer, virtual hardware such as network card, memory, CPU and so on, virtual machines can be built on top of it. Each virtual machine has its own system core Docker containers isolate file systems, processes, devices, networks and other re ...

Posted by OMorchoe on Tue, 14 Jan 2020 11:21:14 -0800

nginx service I Introduction and installation

1, nginx introduction 1.nginx service function: 2. Advantages of nginx service: 2, nginx service web deployment 1. Installation Preparation 2. Compile and install nginx 3. Start nginx preparation 3.1 configure environment variables 3.2 check syntax 3.2 boot 4. Turn off firewall, SE 5. Web access 6. Deploy a site 6.1 ...

Posted by Edward on Wed, 08 Jan 2020 08:32:35 -0800

K8s creates resources using YAML files

Due to the popularity of K8s technology, enterprises of all sizes are using it now. Although it is not popularized, I believe it will happen sooner or later, so hurry up and learn more! There are two ways to create resources in K8s: command line and YAML file. This blog mainly introduces the ways to use YAML file. If you need to use command li ...

Posted by pranesh on Tue, 07 Jan 2020 09:37:56 -0800

Linux basic settings

Download CentOS version 6.4 system 1: Modify IP address (system -- > preferences -- > network connections) 2. Add user [root@localhost ~]# adduser hadoop [root@localhost ~]# passwd hadoop Changing password for user hadoop. New password: BAD PASSWORD: it is based on a dictionary word BAD PASSWORD: is too simple Retyp ...

Posted by morphius on Tue, 31 Dec 2019 07:15:00 -0800

One click installation of kubeflow based on Alibaba cloud image in China

Introduction: there are wall problems in google's products in China. As a cloud native machine learning suite, kubeflow helps the team greatly. For the team without turning over the wall, building kubeflow based on the domestic image can help you solve many problems. Here, we provide you a set of kubeflow 0.6 installation scheme based on the d ...

Posted by peddel on Thu, 26 Dec 2019 01:00:32 -0800

Docker Series 4: Foundation of Docker Network Virtualization

1. Introduction of Network Virtualization Technology 1. What is a virtualized network A virtualized network is a network virtualized by the linux kernel. In fact, the linux kernel can emulate a variety of network devices Analog network devices: Analog network devices appear in pairs, one in containers and one in switches Analog switches: Cont ...

Posted by xeidor on Sun, 22 Dec 2019 14:34:23 -0800