Today, I learned that zookeeper has been deployed on both windows and Alibaba cloud ecs servers. I think it's OK. Let me tell you something to avoid stepping on the pit.
To see how windows is deployed, see
Link: https://blog.csdn.net/Fekerkk/article/details/108004177.
Here's how Alibaba cloud deploys:
First, create a path on the server (the thr ...
Posted by Scropion on Sun, 22 May 2022 16:22:57 +0300
Robot in ROS_ Parameter configuration of param folder in navigation
Transfer from http://www.cnblogs.com/zjiaxing/p/5559382.html
Our robot uses two navigation algorithms to move in the map: global navigation and local navigation. These navigation algorithms process all kinds of information in the map through the cost map. One costmap is used fo ...
Posted by BrentNorin on Sun, 22 May 2022 12:01:23 +0300
What is reflection and what is the function of reflection
Java's reflection mechanism refers to that in the running state of the program, you can construct the object of any class, understand the class to which any object belongs, understand the member variables and methods of any class, and call the properties and methods of any object. Th ...
Posted by mania on Sun, 22 May 2022 09:29:53 +0300
preface
Reference blog: https://blog.csdn.net/qq_41632602/article/details/115366909 Reference blog: https://blog.csdn.net/mshxuyi/article/details/108425487 Based on the two articles, a series of changes have been made according to their own environment and needs
Cluster planning
Overall planning
host nameIP addressrolemaster192.168. ...
Posted by dudejma on Sun, 22 May 2022 06:21:54 +0300
1, Linux IP address configuration
Acquisition method - automatically acquire and specify IP
The first method: automatic acquisition
Note: after logging in, set the automatic acquisition of ip through system settingsFeatures: Linux will automatically obtain ip after startup. The disadvantage is that the ip address obtained automaticall ...
Posted by Chezshire on Sun, 22 May 2022 05:09:10 +0300
Project introduction
This is a daemon framework under Linux
For the purpose of project optimization and learning to master and use X Macro skills, this project skillfully uses X Macro to write a daemon management framework that can expand the number of processes arbitrarily and pass parameters.
This code is extremely concise and easy to use. If ...
Posted by LukeO on Sun, 22 May 2022 04:59:18 +0300
1, Origin
Reduce junk codeReduce the workload of driver developmentSeparation of driver code and device informationRefer to Open Fireware designIt is used to record the attribute information of various hardware devices in the hardware platform
2, Basic composition
There are two kinds of source files:
xxxxx.dts is the abbreviation of ...
Posted by phpsir on Sun, 22 May 2022 03:45:21 +0300
netstat command
netstat command comes from the abbreviation of the English phrase "network statistics". Its function is to display various network related information, such as network connection status, routing table information, interface status, NAT, multicast members, etc.
netstat command is not only applied to Linux system, but ...
Posted by perrij3 on Sun, 22 May 2022 03:35:27 +0300
Like Linux interrupt, the programming of kernel timer only needs to call the API functions provided by the kernel. After the clock interrupt occurs, the kernel will check whether each timer expires. After expiration, it will put its bound timer processing function to the bottom half for execution. Kernel timer essentially depends on hardware ti ...
Posted by bad_gui on Sun, 22 May 2022 01:25:07 +0300