“2020红亚杯:1.Hadoop基础环境准备”的版本间的差异
来自CloudWiki
(创建页面,内容为“基础配置 1.修改主机名 hostnamectl set-hostname master hostnamectl set-hostname slave1 hostnamectl set-hostname slave2 2.配置hosts映射vi /etc/hosts…”) |
(→SSH免密) |
||
(未显示2个用户的2个中间版本) | |||
第1行: | 第1行: | ||
− | 基础配置 | + | ==基础配置== |
− | + | ||
+ | |||
+ | ===修改主机名=== | ||
+ | 全部节点: | ||
+ | |||
hostnamectl set-hostname master | hostnamectl set-hostname master | ||
+ | |||
hostnamectl set-hostname slave1 | hostnamectl set-hostname slave1 | ||
+ | |||
hostnamectl set-hostname slave2 | hostnamectl set-hostname slave2 | ||
− | + | ===配置hosts映射=== | |
− | 172.16.1.3 master | + | 全部节点: |
+ | |||
+ | vi /etc/hosts | ||
+ | |||
+ | <nowiki>172.16.1.3 master | ||
172.16.1.4 slave1 | 172.16.1.4 slave1 | ||
− | 172.16.1.5 slave2 | + | 172.16.1.5 slave2</nowiki> |
+ | |||
+ | ===关闭防火墙=== | ||
+ | 全部节点: | ||
− | |||
systemctl stop firewalld | systemctl stop firewalld | ||
systemctl disable firewalld | systemctl disable firewalld | ||
− | + | ===时间同步=== | |
− | + | Master节点: | |
+ | |||
+ | tzselect 5 9 1 1 | ||
+ | |||
写入到export | 写入到export | ||
− | + | ||
+ | vi /etc/ntp.conf | ||
+ | |||
server 127.127.1.0 | server 127.127.1.0 | ||
fudge 127.127.1.0 stratum 10 | fudge 127.127.1.0 stratum 10 | ||
+ | |||
重启ntp | 重启ntp | ||
− | + | Slave节点:从节点同步(不要启动ntp) | |
+ | |||
ntpdate master | ntpdate master | ||
− | + | ===SSH免密=== | |
− | + | (比赛环境一般已经免密成功 只需删除公钥冲突) | |
− | + | ||
− | + | 主节点: | |
− | + | ||
+ | ssh-keygen -t dsa -P '' -f ~/.ssh/id_dsa | ||
+ | |||
+ | cat id_dsa.pub >> authorized_keys | ||
+ | |||
+ | scp /root/.ssh/authorized_keys root@slave1:/root/.ssh/authorized_keys | ||
+ | |||
+ | scp /root/.ssh/authorized_keys root@slave2:/root/.ssh/authorized_keys | ||
+ | |||
+ | ssh localhost 被动生成.ssh文件(由于权限问题自动生成) | ||
+ | |||
+ | ssh-keygen -t dsa -P ‘’ -f ~/.ssh/id_dsa | ||
+ | |||
+ | cat ~/.ssh/id_dsa.pub >> ~/.ssh/authorized_keys | ||
− | |||
− | |||
− | |||
如果A想 免密登录到B: | 如果A想 免密登录到B: | ||
+ | |||
A: ssh-keygen -t dsa -P ‘’ -f ~/.ssh/id_dsa | A: ssh-keygen -t dsa -P ‘’ -f ~/.ssh/id_dsa | ||
B: cat ~/.ssh/id_dsa.pub >> ~/.ssh/authorized_keys | B: cat ~/.ssh/id_dsa.pub >> ~/.ssh/authorized_keys | ||
− | 结论:B包含了A的公钥,A就可以免密的登录了 | + | |
− | + | 结论:B包含了A的公钥,A就可以免密的登录了 | |
+ | |||
+ | 排错方法:主节点:公钥信息清除: ssh-keygen -R IP |
2020年11月28日 (六) 14:02的最新版本
基础配置
修改主机名
全部节点:
hostnamectl set-hostname master
hostnamectl set-hostname slave1
hostnamectl set-hostname slave2
配置hosts映射
全部节点:
vi /etc/hosts
172.16.1.3 master 172.16.1.4 slave1 172.16.1.5 slave2
关闭防火墙
全部节点:
systemctl stop firewalld systemctl disable firewalld
时间同步
Master节点:
tzselect 5 9 1 1
写入到export
vi /etc/ntp.conf
server 127.127.1.0 fudge 127.127.1.0 stratum 10
重启ntp
Slave节点:从节点同步(不要启动ntp)
ntpdate master
SSH免密
(比赛环境一般已经免密成功 只需删除公钥冲突)
主节点:
ssh-keygen -t dsa -P -f ~/.ssh/id_dsa
cat id_dsa.pub >> authorized_keys
scp /root/.ssh/authorized_keys root@slave1:/root/.ssh/authorized_keys
scp /root/.ssh/authorized_keys root@slave2:/root/.ssh/authorized_keys
ssh localhost 被动生成.ssh文件(由于权限问题自动生成)
ssh-keygen -t dsa -P ‘’ -f ~/.ssh/id_dsa
cat ~/.ssh/id_dsa.pub >> ~/.ssh/authorized_keys
如果A想 免密登录到B:
A: ssh-keygen -t dsa -P ‘’ -f ~/.ssh/id_dsa B: cat ~/.ssh/id_dsa.pub >> ~/.ssh/authorized_keys
结论:B包含了A的公钥,A就可以免密的登录了
排错方法:主节点:公钥信息清除: ssh-keygen -R IP