k8s secret

secret is used to store sensitive information, such as passwords or tokens. Create with file [kubeadm@server1 secret]$ echo -n "admin" > username.txt ##Create user information [kubeadm@server1 secret]$ echo -n "aekhg777" > password.txt ##Create user password file [kubeadm@server1 secret]$ kubectl ...

Posted by rivasivan on Mon, 24 Feb 2020 23:34:29 -0800

C + + details

Article directory Separation of implementation and declaration Do not use using namespace std; The enhancement of C + + to C language Key 1 references Notes for reference The nature of quotation Pointer reference Constant reference Member function call const to decorate object instance Construction ...

Posted by Jabop on Mon, 24 Feb 2020 23:27:01 -0800

Several useful python tools

1. PySnooper - debugging Kit Installation: pip install pysnooper Using PySnooper to add a decorator to the function to be debugged, you can get the log of the running function, including the executed code line, execution time and the time when the local variable changes Example import pysnooper @pys ...

Posted by The-Last-Escape on Mon, 24 Feb 2020 21:40:26 -0800

How to solve the basic configuration and common pit in React project?

Basic configuration of React project and solution of common pit 1, Create React project # Global scaffold installation npm install create-react-app -g --save # Create React project create-react-app my-app 2, Implement the loading of Less file 1. Expose profile # Expose the project's profile npm run eject Directory structure after profile e ...

Posted by lady_bug on Mon, 24 Feb 2020 21:24:53 -0800

Apache Shiro security framework

1, What is Shiro security framework shrio is a powerful and flexible open source security framework, which mainly deals with authentication, authorization, session management and encryption. Authentication: sometimes referred to as "login", i.e. authentication of the user. Authori ...

Posted by Kev on Mon, 24 Feb 2020 20:55:28 -0800

6, Bridge mode

Definition The Bridge pattern separates abstraction from implementation so that they can change independently. It is realized by using combination relation instead of inheritance relation, which reduces the coupling degree of abstraction and realization. Main points [advantages] Separation of abstra ...

Posted by Allen4172 on Mon, 24 Feb 2020 20:25:32 -0800

Self implementation of Spring core IOC and AOP

Article directory Spring 1. Core Container 2,Data Access 3,Web 4,AOP 5,Test Correspondence between Spring version and Java version IoC 1. XML parsing: 2. Create objects dynamically based on the information obtained in step 1 The spring-ioc.xml file is as follows Class User Spring provides point p ...

Posted by loveranger on Mon, 24 Feb 2020 20:09:07 -0800

Splitting and Extracting Text Data in pandas

This paper mainly shares the splitting, extracting and merging of text data to prepare for the next visual analysis. The data comes from the employment information of boss and dragnet data analysis positions, totaling 9458. The crawling methods of the pull-hook are as follows: Python selenium+beautifuls ...

Posted by timelf123 on Mon, 24 Feb 2020 19:58:24 -0800

Design Mode Notes - Prototype Mode

First, the problem of cloning sheep Now there is a sheep tom, named tom, age 1, color white, please write a program to create 10 sheep with the same Tom properties 2. Traditional Solutions 1.sheep class package Design Mode.Prototype mode.Traditional way; public class Sheeep { private String ...

Posted by _SAi_ on Mon, 24 Feb 2020 19:24:57 -0800

Teach you how to implement a commodity futures plan delegation tool

When dealing with commodity futures, not all of them are fully automatic trading strategies. There are many semi-automatic and programmed trading tools to replace manual marking.Although this kind of tool is not a complete strategy, it is also based on the user's trading intent, and it is the simplest trading strategy to conduct transactions in ...

Posted by Pudgemeister on Mon, 24 Feb 2020 19:17:14 -0800