With the business iteration, some projects are reconstructed with nodejs and deployed to k8s environment. In order to facilitate analysis, the last version of the code increases the function of output log.
Half a day after the launch, it was found that there was an alarm of too many open files in the R & D feedback ...
Posted by scottreid1974 on Thu, 12 Mar 2020 20:15:05 -0700
Dynamically update Linux system password and send SMS to remind
Sometimes we may need higher security. As the mainstream operating system of the server, Linux needs to change the root password of the system account frequently to ensure the security of the whole system. The importance of the password i ...
Posted by DJ Zen Masta K on Thu, 12 Mar 2020 05:05:50 -0700
It's been a while since I left my job. The epidemic hasn't passed yet. If I can't go out, I still don't go out. I feel like I've been living a long time every day. I haven't found a job yet. I'm just looking for LDD3 recently. I transplanted the AR8031 driver from my previous job. I just to ...
Posted by davidlenehan on Thu, 12 Mar 2020 03:41:52 -0700
Using asynchronous notification in the device driver can make the driver inform the user program to access the device. In this way, applications using non blocking I/O do not need polling mechanism to query whether the device is accessible, and blocking access can also be replaced by asynchronous not ...
Posted by jack_indigo on Thu, 12 Mar 2020 03:36:36 -0700
1, Last course review
2, Linux basic command 3
2.1 users and user groups
2.2. Use of personal environment variables (. Selection of bashrc and. Bash? Profile) and global environment variables (/ etc/profile) and aliases
2.3 use of history command
2.4 use of delete command
1, Last cour ...
Posted by Arsench on Thu, 12 Mar 2020 03:15:32 -0700
Extras: Why did you insist on using k8s to realize the existing business? There is a strong impetus that the original virtual deployment of elastic cluster can no longer adapt to the expansion of business scale. It is nightmarish to set up large-scale elastic cluster on virtual machine. Therefore, we are determined to deploy in a container way ...
Posted by paragkalra on Tue, 10 Mar 2020 03:25:02 -0700
Before I wrote this article, I was afraid of the interprocess communication of linux. However, after reading some other articles, I found that the interprocess communication of linux is much more difficult than what I learned. First of all, the concept of thread under linux has been weakened. Thread ...
Posted by gterre on Mon, 09 Mar 2020 00:09:18 -0700
E: Elasticsearch stores data java
50: Logstash collection, filtering, forwarding, matching, large, slow start, middle role java
K: Kibana filtering, analysis, graphic presentation java
F: Filebeat collects logs and filters go
Basic architecture diagram
Traditional log analysis requirements (interview)
1. Find out the top ten ...
Posted by ppgpilot on Sun, 08 Mar 2020 03:42:58 -0700
NMI interrupt of CPU is often used as Hard lock detection. Whether the CPU is locked or not, the hardware should always ensure that the NMI interrupt can be responded. As a method of Hard lock detection, when the CPU hardware is locked, its clock interrupt may not be responded, resulting in the clock ...
Posted by ngubie on Sun, 08 Mar 2020 00:11:38 -0800
Case 1: configure MySQL multiple instances
On the host 192.168.4.56, configure the first MySQL instance
Instance name mysql1, port 3307
Database directory / data3307, PID file mysql1.pid
Error log mysql1.err
On the host 192.168.4.56, configure the second MySQL instance
Instance name mys ...
Posted by pootergeist on Sat, 07 Mar 2020 07:04:48 -0800