Skip to main content

服务器服务开通

服务器服务开通(Server provisioning)是指:以合适的系统、数据和软件来准备一个服务器,并使其可用于网络操作的一系列动作。开通一个服务器的典型任务是:从一个可用服务器的池里面选择一个服务器,载入相应的软件操作系统设备驱动中间件应用程序),适当地对系统和软件进行定制化和配置,从而为这个服务器创建或改变一个引导映像(boot image),并随后更改其参数,例如网际协议(IP)地址网际协议网关,以找到相关的网络和存储资源(某些时候被独立分出为资源开通)来审计该系统。通过审计此系统,确保只有有限的漏洞并遵从开放式漏洞和评价语言(Open Vulnerability and Assessment Language,简称OVAL),保证承诺,或安装补丁。在这些动作后,重启系统并载入新软件。这使得系统做好了运营的准备。通常,一个互联网服务提供商(Internet service provider,简称ISP)或网络操作中心(Network Operations Center)将用一系列定义明确的参数来执行这些任务,例如,一个由某个机构同意的并且它使用授予了许可证的软件的引导映像。许多这样一个引导映像的实例创建一个虚拟专有主机。
许多软件产品可以用于自动化服务器、服务和和最终用户设备开通,例如来自Stratavia博思软件(BladeLogic)、国际商业机器公司惠普这些供应商的。中间件和应用程序既可以在操作系统被安装的时候安装,也可以在之后使用一个应用程序服务自动化(Application service automation)工具安装。更多的问题被在学术界讨论,例如服务开通将在何时被发出,以及在多层或多服务的应用程序中需要多少服务器。
简单地说,服务器开通基于资源需求配置服务器。对硬件或软件组件(例如,单/双处理器、内存硬盘独立冗余磁盘阵列控制器、网卡数量、应用程序、操作系统等)的使用视服务器的功能而定,例如因特网服务提供商(ISP)、虚拟化、网络操作系统(NOS)或语音处理。服务器冗余视服务器在机构中的可用性而定。关键应用在使用集群服务器、独立冗余磁盘阵列或镜像系统时停机时间会更少。
部分由大型中心使用的服务要避免如此。额外的资源开通可能依每个服务而做。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...