Binary installation Kubernetes (k8s) v1 23.6 ---

backgroundkubernetes binary installation1.23.3 and 1.23.4 and 1.23.5 and 1.23.6 documents and installation packages have been generated.Later, update the new version of the document as soon as possiblehttps://github.com/cby-chen/Kubernetes/releasesScript project address: https://github.com/cby-chen/Binary_installation_of_KubernetesManual projec ...

Posted by Popgun on Thu, 21 Apr 2022 12:41:23 +0300

Linux Summary - users and groups

2019-07-12 17:53:04 User and group relationships In Linux system, user groups are divided into main group and subsidiary group. A user has only one primary group and can have multiple subordinate groups; A group can be used as the primary group of multiple users and as the subsidiary group of multiple users; Personally, the significance of the ...

Posted by spillage on Thu, 21 Apr 2022 10:33:14 +0300

Huawei ECS elastic server cloud disk (CentOS 7) installation series data disk installation

In the last article, we talked about how to expand the system disk of the elastic server. In this article, we talked about how to install the data disk. First, we need to click buy disk in the console of Huawei cloud account, and then follow the prompts to buy a cloud disk. Note: the cloud disk purchased must be in the same area as the server t ...

Posted by StefanRSA on Thu, 21 Apr 2022 07:15:45 +0300

docker - install and deploy K8S cluster

kubernetes In Greek, it means captain or navigator Before the container technology, if multiple applications are running on the physical server, one application may occupy most of the resources, which may lead to the performance degradation of other applications. One solution is to run each application on different physical servers, but it ca ...

Posted by kevinn on Thu, 21 Apr 2022 05:24:35 +0300

Second week study

1, Describe the naming rules and purpose of the system directory name of the Linux distribution Naming rules of linux system directory: 1. Use LSB (Linux Standard Base) hierarchy 2. Follow FHS (File System Hierarchy Standard) standard 3. The file system starts from the root directory "/" 4. The maximum length of the file name is 255 b ...

Posted by DevXen on Thu, 21 Apr 2022 04:26:58 +0300

Basic concepts of embedded Linux partition

background Partition is a means of dividing the disk into regions. By saving the starting address, size and other information to the partition table, the disk can be divided into several regions for storing different contents. The use of partitions can not only make the system file entries clear, compatible with multiple file systems and moun ...

Posted by mlla2 on Wed, 20 Apr 2022 23:55:15 +0300

k8s cluster deployment is applicable to both internal and external cloud servers

Prepare the environment Linux CentOS 7.x two or more, 7.6 used in this paper explain The default configuration in this paper is in the Intranet environment, that is, the server is in the same LAN environment, and the differential configuration of the external network is additionally marked with [difference - serial number]. You can see ...

Posted by palpie on Wed, 20 Apr 2022 23:21:36 +0300

Chapter 17 understanding system services (daemons)

What is daemon and service Service is the embodiment of function. Daemon is the process of implementing services. There is usually no need to make a detailed distinction between the two. Daemon is a program after the program is executed. The name of daemon itself is usually added with d after the name of the service. This D means "dae ...

Posted by stevehaysom on Wed, 20 Apr 2022 21:35:17 +0300

User and file permissions

User identity Administrator: UID is 0. Administrator of the system. Unique ID, 0 is the administrator System user: UID is 1-999. You cannot log in to the server. You can only call the service program Ordinary user: UID starts from 1000. Users created by administrators to complete daily work Tip: redhat5/6 system user: 1-499, ordinary user: 500 ...

Posted by harinath on Wed, 20 Apr 2022 14:21:14 +0300

Exploitation and demonstration of vulnerability ms10-018

Exploitation and demonstration of vulnerability ms10-018 Today we will not learn C (just released two articles) to see the vulnerabilities and utilization of ie browser. The tools we use are: 1. A small white one ready to go 2. A Linux host (for example, kali, I used manjaro in my demonstration, and added the source of black arch. I will ha ...

Posted by Sianide on Tue, 19 Apr 2022 13:35:07 +0300