Ganglia is an open source cluster monitoring visualization tool initiated by UC Berkeley, which is designed to measure thousands of nodes. Ganglia's core includes gmond, gmetad and a Web front end. It is mainly used to monitor the system performance, such as: cpu, mem, hard disk utilizat ...
Posted by mackevin on Wed, 19 Feb 2020 23:19:50 -0800
1, zabbix monitoring httpd service
2, zabbix monitoring nginx
Font adjustment of web interface
Add a new monitoring item nginx.accept
3, Different types of picture switching
This experiment is based on the previous one, and has monitored server2 and server3
1, zabbix monitor ...
Posted by LuaMadman on Tue, 18 Feb 2020 04:19:53 -0800
1. Types of data persistence:1.emptyDir: Can only be used as temporary storage.If the container is deleted, the data still exists, and if the Pod is deleted, the data is deleted.2.HostPath: Less scenarios increase the coupling between Pod and nodes.3.PV, PVC: based on NFS services.The PV state must be Available, the access mode must be the sam ...
Posted by rdoylelmt on Sun, 16 Feb 2020 15:26:03 -0800
MySQL highly available KeepAlived dual hosts
In the production environment, one MySQL host has a single point of failure, so we need to ensure the high availability of MySQL, that is, two MySQL servers. If one of the MySQL servers hangs up, the other can take over immediately.MySQL's high availability schemes are generally as follows: keepali ...
Posted by Joe Haley on Sat, 15 Feb 2020 21:49:04 -0800
I installed cent os7 on my old DELL computer as a normal development server, and the notebook usually has WIFI and wired network card, so set this notebook as a server with dual network card. See more( www.omob.cc)
When I install cent os7, I will minimize the installation. However, during the installation process, during the g ...
Posted by Jonah Bron on Sat, 15 Feb 2020 07:21:08 -0800
ConfigMap and Secret are two special types of storage volumes in Kubernetes. ConfigMap is a resource object mainly used to provide configuration data to customize program behavior. However, some sensitive configuration information, such as user name, password, key and so on, are usually configured by a resource object such as Secret, which sto ...
Posted by mattlatos on Fri, 14 Feb 2020 13:11:59 -0800
Overview of squid proxy server;
Overview: Squid Cache (SQUID for short) is http proxy server software. Squid is widely used as a cache server or a cache proxy server. It can be used as a proxy server for users to request data from the web server and cache it. It can filter traffic to help network secu ...
Posted by Sno on Tue, 11 Feb 2020 03:27:11 -0800
k8s general environmental plan
Two master nodes, two node nodes and two node nodes are installed with nginx for load balancing, failover and floating address vip
Turn off firewall and security functions
systemctl stop firewalld.servicesetenforce 0
Copy the kubernetes directory to master2 (last exp ...
Posted by pullaratt on Mon, 10 Feb 2020 04:32:39 -0800
Through Bo Wen Storage Volume of Kubernetes It can be seen that the process of Kubernets to realize data persistence is as follows:Build NFS underlying storage - > create PV - > create PVC - > create podFinally, the container in the pod will realize data persistence!
From the above process, it seems that there is no problem, but after ...
Posted by icd_lx on Mon, 10 Feb 2020 01:10:55 -0800
1. Experimental environment
2. Load balancing scheduler deployment
1, Experimental environment:
Based on the previously deployed multi Master cluster architecture, deploy two scheduler servers (nginx is used here) to achieve load balancing:
Deployment 1 of kubernetes binary cluster - deployment of etcd storage component and flan ...
Posted by micbox on Mon, 10 Feb 2020 00:30:53 -0800