首页
学习
活动
专区
工具
TVP
发布
精选内容/技术社群/优惠产品,尽在小程序
立即前往
您找到你想要的搜索结果了吗?
是的
没有找到

使用kolla快速部署openstack all-in-one环境

kolla项目是为了容器化openstack,目标是做到100个节点的开箱即用,所有的组件的HA都具备。kolla是一个革命性的项目,我们以前积累的安装部署经验,全部都报废。使用kolla可以快速部署可扩展,可靠的生产就绪的openstack环境。 基本环境 操作系统:CentOS Linux release 7.2.1511 (Core) 内核版本:3.10.0-327.28.3.el7.x86_64 docker版本:Docker version 1.12.1, build 23cf638 部署kolla 1. 安装依赖 yum install -y epel-release python-pip yum install -y python-devel libffi-devel openssl-devel gcc pip install -upgrade pip 2. 修改docker启动文件 # Create the drop-in unit directory for docker.service mkdir -p /etc/systemd/system/docker.service.d # Create the drop-in unit file tee /etc/systemd/system/docker.service.d/kolla.conf <<-'EOF' [Service] MountFlags=shared EOF 3. 重启docker systemctl daemon-reload systemctl restart docker 4. 安装docker的python库 yum install -y python-docker-py or pip install -U docker-py 5. 配置时间同步(此处略) 6. 禁用libvirt systemctl stop libvirtd.service systemctl disable libvirtd.service 7. 安装ansible 这里需要注意的是如果安装stable版的kolla需要Ansible < 2.0,master版需要Ansible > 2.0。默认yum安装ansible版本>2.0,因为我要安装stable/mitaka版,所有指定安装版本。 pip install -U ansible==1.9.4 8. 安装stable版kolla 下载源码 git clone https://git.openstack.org/openstack/kolla -b stable/mitaka 安装依赖 pip install -r kolla/requirements.txt -r kolla/test-requirements.txt 源码安装 pip install kolla/ 9. 安装tox,生成配置文件 pip install -U tox cd kolla/ tox -e genconfig cp -rv etc/kolla /etc/ 10. 安装python client yum install python-openstackclient python-neutronclient 11. 本地docker仓库 all-in-one环境中本地仓库不是必须的这里没有配置 编译镜像 kolla-build 更多的编译选项可以参看:Building Container Images 如果个别镜像编译失败可以重新执行以上操作,因为docker的容器缓存,重新编译会很快 编译成功后生成的镜像如下所示: # docker images REPOSITORY TAG IMAGE ID CREATED SIZE kolla/centos-binary-heat-engine 2.0.3 28956cc878d3 20 hours ago 571.4 MB kolla/centos-binary-heat-api-cfn 2.0.3 d69858fd13fa 20 hours ago 571.4 MB kolla/centos-binary-heat-api 2.0.3 90a92ca6b71a

04

Python开发, 恶意病毒扫描

#!/usr/bin/python ''' Extracts some basic features from PE files. Many of the features implemented have been used in previously published works. For more information, check out the following resources: * Schultz, et al., 2001: http://128.59.14.66/sites/default/files/binaryeval-ieeesp01.pdf * Kolter and Maloof, 2006: http://www.jmlr.org/papers/volume7/kolter06a/kolter06a.pdf * Shafiq et al., 2009: https://www.researchgate.net/profile/Fauzan_Mirza/publication/242084613_A_Framework_for_Efficient_Mining_of_Structural_Information_to_Detect_Zero-Day_Malicious_Portable_Executables/links/0c96052e191668c3d5000000.pdf * Raman, 2012: http://2012.infosecsouthwest.com/files/speaker_materials/ISSW2012_Selecting_Features_to_Classify_Malware.pdf * Saxe and Berlin, 2015: https://arxiv.org/pdf/1508.03096.pdf

06
领券