1.top command
It is commonly used to monitor the system status of linux, and is a commonly used performance analysis tool, which can display the resource usage of each process in the system in real time.
You can use the top command to find out the threads that take up too much CPU in the JVM, find the corresponding thread code calls through js ...
Posted by ruzztec on Mon, 23 May 2022 14:51:10 +0300
Linux
1 integrated architecture components and service planning
Website architecture is generally considered from two aspects:
User visits website
Site manager visits the site
1.1 user access to website
1.1.1 static cluster architecture
When the user visits the website, first resolve the website through the DNS server, and then send a reques ...
Today, I learned that zookeeper has been deployed on both windows and Alibaba cloud ecs servers. I think it's OK. Let me tell you something to avoid stepping on the pit.
To see how windows is deployed, see
Link: https://blog.csdn.net/Fekerkk/article/details/108004177.
Here's how Alibaba cloud deploys:
First, create a path on the server (the thr ...
Posted by Scropion on Sun, 22 May 2022 16:22:57 +0300
Robot in ROS_ Parameter configuration of param folder in navigation
Transfer from http://www.cnblogs.com/zjiaxing/p/5559382.html
Our robot uses two navigation algorithms to move in the map: global navigation and local navigation. These navigation algorithms process all kinds of information in the map through the cost map. One costmap is used fo ...
Posted by BrentNorin on Sun, 22 May 2022 12:01:23 +0300
What is reflection and what is the function of reflection
Java's reflection mechanism refers to that in the running state of the program, you can construct the object of any class, understand the class to which any object belongs, understand the member variables and methods of any class, and call the properties and methods of any object. Th ...
Posted by mania on Sun, 22 May 2022 09:29:53 +0300
preface
Reference blog: https://blog.csdn.net/qq_41632602/article/details/115366909 Reference blog: https://blog.csdn.net/mshxuyi/article/details/108425487 Based on the two articles, a series of changes have been made according to their own environment and needs
Cluster planning
Overall planning
host nameIP addressrolemaster192.168. ...
Posted by dudejma on Sun, 22 May 2022 06:21:54 +0300
1, Linux IP address configuration
Acquisition method - automatically acquire and specify IP
The first method: automatic acquisition
Note: after logging in, set the automatic acquisition of ip through system settingsFeatures: Linux will automatically obtain ip after startup. The disadvantage is that the ip address obtained automaticall ...
Posted by Chezshire on Sun, 22 May 2022 05:09:10 +0300
Project introduction
This is a daemon framework under Linux
For the purpose of project optimization and learning to master and use X Macro skills, this project skillfully uses X Macro to write a daemon management framework that can expand the number of processes arbitrarily and pass parameters.
This code is extremely concise and easy to use. If ...
Posted by LukeO on Sun, 22 May 2022 04:59:18 +0300
1, Origin
Reduce junk codeReduce the workload of driver developmentSeparation of driver code and device informationRefer to Open Fireware designIt is used to record the attribute information of various hardware devices in the hardware platform
2, Basic composition
There are two kinds of source files:
xxxxx.dts is the abbreviation of ...
Posted by phpsir on Sun, 22 May 2022 03:45:21 +0300