Kubedm deploys kubernetes (k8s) -- detailed version 1.17.0
Experimental requirements: Kubernetes was successfully deployed to prepare for subsequent experiments
1. Environmental requirements
Server requirements: • recommended minimum hardware configuration: 2-core CPU, 2G memory, 20G hard disk • it is better for the server to access the external network. There will be a need to pull the ima ...
Posted by Branden Wagner on Mon, 06 Dec 2021 17:37:29 -0800
[embedded] transplantation of FreeRTOS, task running status and optimization and improvement of source code
preface
FreeRTOS is very popular in the embedded field because of its simplicity, compactness and complete functions. As shown in the figure below, FreeRTOS is the real-time operating system with the largest market share in the global embedded field except Linux. uCOS, RTX, ThreadX, etc. are far behind. In addition, it has been acquired by ...
Posted by Deemo on Mon, 06 Dec 2021 17:30:34 -0800
SpringBoot default connection pool HikariCP
HikariCPNow many companies are using HikariCP. HikariCP has also become the default connection pool of SpringBoot. With SpringBoot and microservices, HikariCP will be widely popularized.Next, Chen will take you to analyze why HikariCP can be favored by Spring Boot from the perspective of source code. The article directory is as follows:catalogu ...
Posted by spajetty on Mon, 06 Dec 2021 17:27:27 -0800
react source code analysis 8.render phase (see I'll compare Fiber)
react source code analysis 8.render phaseVideo Explanation (efficient learning): Enter learningPrevious articles:1. Introduction and interview questions2. Design concept of react3.react source code architecture4. Source directory structure and debugging5. JSX & Core api6.legacy and concurrent mode entry functions7.Fiber architecture8.render ...
Posted by cmzone on Mon, 06 Dec 2021 17:18:29 -0800
Super detailed web automation tutorial - advanced operation of TestCafe page
prefaceThis article follows the previous one to introduce some advanced operations of TestCafe page interaction.1, Mouse drag1. Drag element offsetMethod: t.drag can offset and drag the element relative to the original position.caseimport { Selector } from 'testcafe';fixture element drag.page `https://www.runoob.com/try/try.php?filename=jqueryu ...
Posted by chiefrokka on Mon, 06 Dec 2021 17:14:42 -0800
Java: realize human-computer interaction through Scanner module
preface
Scanner module is almost everywhere. It establishes a communication channel between people and computers. Scanner means scanner in English. As the name suggests, it connects the data we input into the computer into the program variables we set, so that the variables become meaningful in subsequent operations.
In a word, it is simple h ...
Posted by Catharsis on Mon, 06 Dec 2021 16:58:57 -0800
Configure c + + for vscode under linux to debug it like visual studio 2019
c + + compiling mode under linux
Under win, visual studio has carried out a large number of encapsulation for us, and designed a large number of easy-to-use configurations and interfaces, so that developers pay too much attention to the underlying compilation and linking process, and only need to pay attention to t ...
Posted by ultk on Mon, 06 Dec 2021 16:48:56 -0800
The strongest domestic open source API gateway, without one, does not accept any refutation!
This paper mainly analyzes the architecture and basic functions of several open source API gateways, such as NGINX, Kong, apisik, Tyk, Zuul and Gravitee, and tests the performance of each API gateway in a certain scenario.Under the microservice architecture, API gateway is a common architecture design pattern. The following are common problems ...
Posted by debuitls on Mon, 06 Dec 2021 16:22:46 -0800
Gin - RSA512 signature using JWT's asymmetric encryption algorithm
1.RSA asymmetric encryption
RSA asymmetric encryption encrypts the signature, not the header and load of jwt. The header and load are encrypted with base64 jwt official website You can know Tokens are put together by spelling strings. It is concluded that: 1. User defined data can be placed in the load, but sensitive data cannot be placed. ...
Posted by panic! on Mon, 06 Dec 2021 16:03:23 -0800
Databend built in scalar function development guide
Original text: https://databend.rs/development/how-to-write-scalar-functions/What is a scalar function? ¶Scalar functions (sometimes referred to as user-defined functions / UDFs) return a single value for each record, rather than as a result SET, and can be used in most places in queries or SET statements, except for the FROM clause.One to ...
Posted by thankqwerty on Mon, 06 Dec 2021 15:53:24 -0800