Integrating LVM with Hadoop and providing Elasticity to DataNode Storage
First of all configure namenode and datanode for hadoop cluster. I have configured it on AWS and shared 10GB storage initially.
I have attached two volumes viz. /dev/xvdb and /dev/xvdc to the datanode in order to demonstrate LVM
In this article, I am gonna tell you the trick by which we can increase the size of static partition, although the good practice is to create a dynamic partition using LVM if in future you want to increase or decrease the size of your hard-disk.
So the first step is to launch an operating system, you can use either AWS Instance or virtual machine. Attach a hard-disk (size can be specified depending on the hard-disk of your base OS, I have given 10Gib space to the hard-disk). …
Kubernetes is an open-source orchestration tool developed by Google for managing microservices or containerized applications across a distributed cluster of nodes.
Now that we have understood why K8s is imperative, it’s time to decode the underlying architecture of K8s.
What is clustering?
Clustering is an unsupervised machine learning task that automatically divides the data into clusters, or groups of similar items.
Clustering is guided by the principle that items inside a cluster should be very similar to each other, but very different from those outside.
What is K-mean clustering?
K-means clustering is a type of unsupervised learning, which is used when you have unlabeled data (i.e., data without defined categories or groups). The goal of this algorithm is to find groups in the data, with the number of groups represented by the variable K.
What is Cyber Crime?
Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.
Types of Cyber Crime :-
Hello guys, Here I am come with new article in which we can see the How Industry Use the Jenkins Tool To automate the things.
We will see the use cases of Jenkins, but before that we have to learn basic about Jenkins.
The AWS Command Line Interface (CLI) is a unified tool to manage your AWS services. With just one tool to download and configure, you can control multiple AWS services from the command line and automate them through scripts.
Now, we need to download and install AWS CLI tool in our OS. I will use Version 2.1.17
Google services such as its image search and translation tools use sophisticated machine learning which allow computers to see, listen and speak in much the same way as human do. Google uses machine learning in its Nest “smart” thermostat products — by analyzing how the devices are used in households they become better at predicting when and how their owners want their homes to be heated, helping to cut down on wasted energy.
This results in the broadcasting of around 22 million data points every day, and Google engineers found that by applying machine learning to this data they were…
aws ec2 create-security-group --group-name SecurityGroup --description "Allow all traffic"
Now, I have created my security group named “SecurityGroup”. Now we have to create inbound rule -
aws ec2 authorize-security-group-ingress --group-name SecurityGroup --protocol all --cidr 0.0.0.0/0
The above command will create inbound rules for the security group which will allow all traffic. Next we have to create private key-pair -
aws ec2 create-key-pair --key-name Keypair --query 'KeyMaterial' --output text | out-file -encoding ascii -filepath keypair.pem
Launching an EC2 instance -
I have Key-pair named as Keypair. Let’s launch the instance -
aws ec2 run-instances --image-id ami-0e306788ff2473ccb --instance-type t2.micro --availability-zone ap-south-1a --count…