First of all configure namenode and datanode for hadoop cluster. I have configured it on AWS and shared 10GB storage initially.

I have attached two volumes viz. /dev/xvdb and /dev/xvdc to the datanode in order to demonstrate LVM


In this article, I am gonna tell you the trick by which we can increase the size of static partition, although the good practice is to create a dynamic partition using LVM if in future you want to increase or decrease the size of your hard-disk.

So the first step is to launch an operating system, you can use either AWS Instance or virtual machine. Attach a hard-disk (size can be specified depending on the hard-disk of your base OS, I have given 10Gib space to the hard-disk). …


What is Kubernetes?

Kubernetes is an open-source orchestration tool developed by Google for managing microservices or containerized applications across a distributed cluster of nodes.

What features Does K8s Offer?

  • Automated Scheduling
  • Self-Healing Capabilities
  • Automated rollouts & rollback
  • Assures high availability with zero downtime
  • Highly performant and scalable
  • Reliable infrastructure to support data recovery with ease
  • Provides a higher density of resource utilization
  • Offers enterprise-ready features
  • Application-centric management

Now that we have understood why K8s is imperative, it’s time to decode the underlying architecture of K8s.

Kubernetes Architecture


Clustering is an unsupervised machine learning task that automatically divides the data into clusters, or groups of similar items.

Clustering is guided by the principle that items inside a cluster should be very similar to each other, but very different from those outside.

K-means clustering is a type of unsupervised learning, which is used when you have unlabeled data (i.e., data without defined categories or groups). The goal of this algorithm is to find groups in the data, with the number of groups represented by the variable K.


Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.


Hello guys, Here I am come with new article in which we can see the How Industry Use the Jenkins Tool To automate the things.

We will see the use cases of Jenkins, but before that we have to learn basic about Jenkins.

Let’s start...

⚡ What is Jenkins?


What is AWS CLI ?

The AWS Command Line Interface (CLI) is a unified tool to manage your AWS services. With just one tool to download and configure, you can control multiple AWS services from the command line and automate them through scripts.

Let’s start….

Now, we need to download and install AWS CLI tool in our OS. I will use Version 2.1.17


GOOGLE :

The Amazing Ways Google Uses Artificial Intelligence And Satellite Data To Prevent Illegal Fishing

Google services such as its image search and translation tools use sophisticated machine learning which allow computers to see, listen and speak in much the same way as human do. Google uses machine learning in its Nest “smart” thermostat products — by analyzing how the devices are used in households they become better at predicting when and how their owners want their homes to be heated, helping to cut down on wasted energy.

This results in the broadcasting of around 22 million data points every day, and Google engineers found that by applying machine learning to this data they were…


Creating security group for EC2 instance.

aws ec2 create-security-group --group-name SecurityGroup --description "Allow all traffic"

Now, I have created my security group named “SecurityGroup”. Now we have to create inbound rule -

aws ec2 authorize-security-group-ingress --group-name SecurityGroup --protocol all  --cidr 0.0.0.0/0

The above command will create inbound rules for the security group which will allow all traffic. Next we have to create private key-pair -

aws ec2 create-key-pair --key-name Keypair --query 'KeyMaterial' --output text | out-file -encoding ascii -filepath keypair.pem

Launching an EC2 instance -

I have Key-pair named as Keypair. Let’s launch the instance -

aws ec2 run-instances --image-id ami-0e306788ff2473ccb --instance-type t2.micro --availability-zone ap-south-1a --count…

Sunil Sirvi

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store