Go debugging tool: gdb vs dlv

Although the GoLand editor is very powerful, it is still relatively weak in displaying memory and stack information. Maybe my posture is wrong. So, I started to debug the gdb, but the GDB stepped into the pit and did not solve it, which triggered the comparison between GDB and dlv. gdb install yum install ncures-devel wget http://ftp.gnu.org/gn ...

Posted by el_quijote on Thu, 15 Aug 2019 06:45:26 -0700

Use of Saltstack Function Modules in Linux (salt-ssh, salt-syndic and salt-api)

Introduction of Saltstack Function Module 1. Introduction to salt-ssh Sal-ssh can run independently without minion, and use sshpass to interact with passwords, but it works in serial mode, resulting in a significant performance degradation. ...

Posted by ruthsimon on Thu, 15 Aug 2019 03:01:11 -0700

kubeadm deployment kubernetes (version 1.15.2) - - take you around the pit

K8S is so popular, there are many online tutorials, but the official update is too fast, many deployment tutorials have lagged behind, and there are countless pits, for beginners, not everyone has the ability to climb out. For every student who wants to make progress, deploying K8S is a mountain. If you can deploy it clearly, you already know ...

Posted by yaron on Wed, 14 Aug 2019 05:16:16 -0700

redis: two principals and two subordinates

Monitoring: Sentinel constantly checks whether your master and slave servers are functioning properly. Notification: Sentinel can send notifications to administrators or other applications through the API when a Redis server being monitored has problems. Automatic failover: When a primary server does not work properly, Sentinel starts an aut ...

Posted by jrottman on Tue, 13 Aug 2019 20:49:55 -0700

PXE Remote Network Installation and CentOS 7 Unattended Installation

In large Linux applications, such as Web Clustering, Distributed Computing, and so on, servers often do not have CD-ROM drives. In this case, how can you quickly install the system for hundreds of server bare machines?The traditional installation methods such as USB CD-ROM, mobile hard disk, etc. are obviously out of order, so it needs to be - ...

Posted by jakebur01 on Mon, 12 Aug 2019 19:27:34 -0700

Build ldap dual main mode

1. Install OpenLDAP yum install openldap openldap-clients openldap-servers Start directly after installation ``` systemctl start slapd ``` Set Administrator Password``` slappasswd -h {SSHA} ``` You will then be asked to enter a clear text password and return to you an encrypted password, remembering the password that was returne ...

Posted by roustabout on Thu, 08 Aug 2019 12:14:57 -0700

Environment Preparedness --- Configure tomcat (yum installation openjdk) under linux

What is tomcat? How does Tomcat work? please Reference website https://tomcat.apache.org/tomcat-9.0-doc/index.html For more information, please click on https://www.cnblogs.com/xdp-gacl/p/4097608.html Method 1: Download the tomcat installation package decompression Run. / startup.sh under bin file bin: It's about opening and changing To ...

Posted by Anti-Moronic on Mon, 05 Aug 2019 21:48:07 -0700

kubeadm Build Highly Available kubernetes 1.15.1

role IP role operating system Remarks 192.168.10.210 master CentOS 7 haproxy,keepalived master 192.168.10.211 master CentOS 7 Haproxy, keep alived ready 192.168.10.212 master CentOS 7 Haproxy, keep alived ready 192.168.10.213 node CentOS 7 Do Nodes Only Host preparation:1. Install necessary software and upgrade all software yum - ...

Posted by kryles on Sun, 04 Aug 2019 09:23:16 -0700

Installing Kubernetes1 with kubeadm

Installing Kubernetes 1.13.3 using kubeadm Preparatory environment: two CentOS 7 system servers, 2 cores, 2G host name Ip role K8s-master 192.168.2.7 K8s master node K8s-node1 192.168.137.4 K8s slave node 1 Docker version: 1.18.3 Kubernetes Version: 1.13.3 (1) Preparations (1) All nodes ...

Posted by callisto11 on Thu, 01 Aug 2019 20:29:52 -0700

OpenStack Component - Keystone Identity Authentication

1. Introduction to Keystone Kestone is one of the components of OpenStack, which is used to provide unified authentication services for other members of OpenStack family, including authentication, token issuance and verification, service list, user rights definition and so on. The authorization and authentication of all services in the cloud e ...

Posted by noirsith on Mon, 29 Jul 2019 04:08:07 -0700