Virtual Machine migration refers to the migration of virtual machine operating systems and applications running on the Source Physical host to the target physical host or virtual machine, and the migration can run normally on the target host. In
Why do I need to manually compile and install the RPM package?
Due to my limited level, I have two answers to this question:
1. Since the RPM package on the network is compiled by the author on his own machine, it is not suitable for the hardware
Squid standard traditional proxy
Cache proxy
As the agent service software at the application layer, Squid mainly provides cache acceleration and application layer filter control functions.
Standard traditional proxy
It is a common proxy service.
What is rsync:Rsync is an application software in Unix and Unix-like systems. It is a software that can achieve remote data synchronization between hosts. An important feature in rsync that is not seen in most other similar programs or protocols is
In the past few days, you have prepared to install the linux operating system on the network. Finally, we decided to use pxe + kickstart. After the principles and solutions are completed, the system starts construction and the result is blocked by
Recently I wrote a php script to check whether the website can log on normally. It can be used as a Nagios plug-in.
Nagios plug-in is a component provided by Nagios that can be deployed in an extended manner. It supports development in Java, C \ C ++
The LDAP server is used to uniformly authenticate account information, which is similar to the address book to achieve centralized management of user accounts. The system is CentOS6.4.
Install openldap and Berkeley DB. openldap uses Berkeley DB to
I. PreparationsLab environment: Vmware virtualizes three hosts, with the system CentOS_6.4_i386Used Software: Hadoop-1.2.1-1.i386.rpm, jdk-7u9-linux-i586.rpmHost planning:IP address host name role192.168.2.22 master. flyence. tk NameNode, JobTracker1
LVS (Linux VirtualServer) is a high-scalability and high-availability server built on a series of real servers. It works on a layer-4 network, that is, based on the IP address and port mode. The LVS Server Load balancer works on Linux. As an
DHCP:Dynamic host configuration protocolDHCP works at the OSI Application Layer and helps the computer obtain the configuration information protocol from the specified DHCP server. (Including IP addresses, subnet masks, gateways, and dns)Working
1 Hadoop fs
--------------------------------------------------------------------------------The root directory for executing the hadoop sub-command set is the/home Directory, which is/user/root on the local machine.
----------------------------------
In Linux, there are two major monitoring tools: cacti + nagios. Next I will record the steps for building my own nagios so that you can view it later.
First install the dependency package# Yum install-y httpd mysql-devel mysql-server php-mysql gcc-c
Installation Package introduction:
Install the specified software as required. Nginx is installed in/usr/local/nginx by default, and the startup script is in/usr/local/nginx/conf/nginx; php is installed in/usr/local/php, the STARTUP script
Server Load balancer (as a distributor)1. browser-based distributionBrowser-based distribution is distributed according to browser requests on different platforms. For example, mobile browsers require low resource speeds and save traffic, therefore,
Network File System (NFS) is a mechanism for attaching partitions (directories) on remote hosts to local systems through the Network, with support for the network file system, you can operate on the shared partition (directory) of the remote host on
IPTABLES rules: deny all links first.
Available IPTABLES operations
(1)-L: first, all the policies in the selected chain are IPTABLES-t filter-L
(2)-A: (chain name): Add A new policy to the end of the selected chain.
For example, IPTABLES-t filter-a
Storm ensures that every tuple sent from the spout will be completely processed. This article describes how storm achieves this guarantee and how our users can make full use of storm's reliability characteristics.What does a tuple mean by
To establish a security trust relationship between the root of the Client and the root of the Server, follow these steps:
1. Run the ssh-keygen command on the Client to generate a certificate that establishes a security trust relationship.
[Root @
I recently maintained a RedHat 5.4 X64 system. The environment is Nginx. When running a forum, I need to submit POST data to the HTML page. All the results are intercepted and an error is displayed: "nginx 405 Not Allowed" is almost no good solution.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service