ZooKeeper configuration under Hadoop cluster

Install zookeeper environment zookeeper installation package: https://pan.baidu.com/s/1fpdBs8kbjPj5rlrwusv1iw Extraction code: h1wv jdk environment to be prepared: Reference: https://blog.csdn.net/weixin_44147632/article/details/107796624 Decompression: tar -zxf zookeeper-3.4.5-cdh5 14.2. tar. gz -C /opt/bigdata/hadoop/ Renamed: MV zookeeper- ...

Posted by madmindz on Sun, 22 May 2022 16:24:13 +0300

Alibaba cloud server deployment zookeeper+dubbo

Today, I learned that zookeeper has been deployed on both windows and Alibaba cloud ecs servers. I think it's OK. Let me tell you something to avoid stepping on the pit. To see how windows is deployed, see Link: https://blog.csdn.net/Fekerkk/article/details/108004177. Here's how Alibaba cloud deploys: First, create a path on the server (the thr ...

Posted by Scropion on Sun, 22 May 2022 16:22:57 +0300

Robot in ROS_ Parameter configuration of param folder in navigation

Robot in ROS_ Parameter configuration of param folder in navigation Transfer from http://www.cnblogs.com/zjiaxing/p/5559382.html Our robot uses two navigation algorithms to move in the map: global navigation and local navigation. These navigation algorithms process all kinds of information in the map through the cost map. One costmap is used fo ...

Posted by BrentNorin on Sun, 22 May 2022 12:01:23 +0300

On the underlying principle and implementation of dynamic agent and static agent

What is reflection and what is the function of reflection Java's reflection mechanism refers to that in the running state of the program, you can construct the object of any class, understand the class to which any object belongs, understand the member variables and methods of any class, and call the properties and methods of any object. Th ...

Posted by mania on Sun, 22 May 2022 09:29:53 +0300

Kubernetes 1.22.9 build and deploy dashboard visual UI

preface Reference blog: https://blog.csdn.net/qq_41632602/article/details/115366909 Reference blog: https://blog.csdn.net/mshxuyi/article/details/108425487 Based on the two articles, a series of changes have been made according to their own environment and needs Cluster planning Overall planning host nameIP addressrolemaster192.168. ...

Posted by dudejma on Sun, 22 May 2022 06:21:54 +0300

(CentOS7)IP address configuration and host name and hosts mapping

1, Linux IP address configuration Acquisition method - automatically acquire and specify IP The first method: automatic acquisition Note: after logging in, set the automatic acquisition of ip through system settingsFeatures: Linux will automatically obtain ip after startup. The disadvantage is that the ip address obtained automaticall ...

Posted by Chezshire on Sun, 22 May 2022 05:09:10 +0300

A simplified daemon framework written by X macro

Project introduction This is a daemon framework under Linux For the purpose of project optimization and learning to master and use X Macro skills, this project skillfully uses X Macro to write a daemon management framework that can expand the number of processes arbitrarily and pass parameters. This code is extremely concise and easy to use. If ...

Posted by LukeO on Sun, 22 May 2022 04:59:18 +0300

[Linux] kernel driver Chapter 7 - device tree

1, Origin Reduce junk codeReduce the workload of driver developmentSeparation of driver code and device informationRefer to Open Fireware designIt is used to record the attribute information of various hardware devices in the hardware platform 2, Basic composition There are two kinds of source files: xxxxx.dts is the abbreviation of ...

Posted by phpsir on Sun, 22 May 2022 03:45:21 +0300

[Linux] RHCE exam preparation review network communication netstat and ping commands

netstat command netstat command comes from the abbreviation of the English phrase "network statistics". Its function is to display various network related information, such as network connection status, routing table information, interface status, NAT, multicast members, etc. netstat command is not only applied to Linux system, but ...

Posted by perrij3 on Sun, 22 May 2022 03:35:27 +0300

5 kernel timer programming

Like Linux interrupt, the programming of kernel timer only needs to call the API functions provided by the kernel. After the clock interrupt occurs, the kernel will check whether each timer expires. After expiration, it will put its bound timer processing function to the bottom half for execution. Kernel timer essentially depends on hardware ti ...

Posted by bad_gui on Sun, 22 May 2022 01:25:07 +0300