Using KubeFATE to deploy federated learning clusters on Kubernetes

*The author is Peng Lin, senior researcher of VMware CTO Office Background and KubeFATE architecture Previously, we introduced how to use KubeFATE to deploy a docker based on docker in the articles "using KubeFATE to rapidly deploy the federal learning experiment development environment (I)," using KubeFATE to rapidly d ...

Posted by hakmir on Wed, 13 May 2020 03:45:06 -0700

manjaro Configuration Overview

1 Source Arrange the speed of Chinese mirrors, select one. sudo pacman-mirrors -i -c China -m rank /etc/pacman.conf plus: [archlinuxcn] SigLevel=Optional TrustedOnly Server=https://mirrors.ustc.edu.cn/archlinuxcn/$arch To update: sudo pacman -Syy && sudo pacman -S archlinuxcn-keyring 2 Input Method sudo pacman -S fcitx-im fcitx-confi ...

Posted by geroido on Sat, 09 May 2020 19:53:15 -0700

One key operation CIS security scanning, cluster security!

CIS security scanning is one of the heavyweight functions introduced by Rancher 2.4, which aims to help users quickly and effectively enhance the security of clusters. This article will introduce the CIS security scanning function in detail, including the detailed operation demo.    This article comes from Rancher Labs  Cluster security is a c ...

Posted by hurricane on Thu, 07 May 2020 19:43:48 -0700

Detailed Tests Test for Automated Operations and Maintenance Tool Ansible

Ansible Tests Details and Use Cases   Host Planning   Add user account Explain: 1. Login accounts used by operations and maintenance personnel; 2. All businesses are placed under / app / in the "home directory of yun users" to avoid the disorder of business data; 3. This user is also used by ansible because almost all production en ...

Posted by cjdesign on Thu, 07 May 2020 09:49:48 -0700

Safer rm commands to protect important data

Almost all the secure RMS streaming on the Internet provide a rm "garbage" recycle bin, which is a bad recipe for server environment. I think it might be better to provide a secure rm to protect some important files or directories from deletion and avoid the tragedy of deleting important data by mistake. I wrote a script: https://gith ...

Posted by blade_922 on Tue, 05 May 2020 14:44:33 -0700

Nginx + tornado + supervisor deployment

Reference link: supervisor + Tornado + Nginx usage details, Using tornado, supervisor, nginx website, Official documents of tornado https://blog.csdn.net/tengzhaorong/article/details/12833157 Project document tree: . ├── chnservices │ └── channels.py ├── etc │ ├── chnservices.conf │ ├── nginx │ │ └── nginx.conf │ ├── supervis ...

Posted by quercus on Tue, 05 May 2020 07:25:07 -0700

Setting up Snort+BASE intrusion detection system on Linux

Configuring the experimental environment Because my computer does not have enough storage space to bear the cost of installing a virtual machine, I applied for a cloud server on Ali Cloud for this experiment. The server configuration is as follows: 1 Core - 2GB Memory - 40GB System Disk Operating System: Ubuntu 18.04 Modify Ubuntu So ...

Posted by alexville on Mon, 04 May 2020 18:26:27 -0700

Deepin configuration notes

Recently, Deepin system has been installed, so it's hard to avoid some trouble. Record the process for future reference & help children's shoes with the same problems. System installation 1. Download Image file and Make startup disk2. The main board is in UEFI mode, enter BIOS and close SecureBoot. The first boot item is set as boot disk3 ...

Posted by aladin13 on Mon, 04 May 2020 18:06:51 -0700

Nginx multisite configuration

1, Create site profile 1. Create the conf.d folder and configuration file in the nginx conf directory, assuming the site is www.a.com $ pwd /usr/local/nginx/conf $ sudo mkdir conf.d $ sudo vim conf.d/www.a.com.conf #New site profile 2. Write the following content into the www.a.com.conf file, which can be mod ...

Posted by frontlines on Mon, 04 May 2020 13:33:59 -0700

ubuntu uses apt get to make OfflinePackage

ubuntu uses apt get to make offline package (take mysql as an example) Recently, I am studying the deployment of engineering software. Although this is the work of operation and maintenance, it is quite interesting. Question: what factors need to be considered in software environment configuration There are two ways ...

Posted by CG_dude on Sun, 03 May 2020 20:41:23 -0700