After verification, upgrade from 3.0.0 to 3.9.7 in the following way. At the same time, support users to change passwords through the web interface. Every user forgets his password and needs the administrator to change it. The workload is not large, but it's really time-consuming and laborious. It's not flattering!1. Installation software prep ...
Posted by many_pets on Wed, 27 May 2020 02:22:54 -0700
A Preliminary Study on the Use and Design of cola Extension Points
Packaging changes provide flexibility to respond to changes in program requirements.
Extension point use
Defines an extension point interface, which can be a validator, converter, entity; must end with ExtPt to represent an extension point.
For example, I define an exten ...
Posted by web_noob on Mon, 25 May 2020 10:01:16 -0700
Kafka Stream concepts and initial high-level architecture diagrams
Kafka Stream is a new Feature introduced by Apache Kafka from version 0.10 that provides streaming and analysis of data stored in Kafka.In short, Kafka Stream is a class library for stream computing, similar to Storm, Spark Streaming, Flink, but much lighter.
Basic concepts of ...
Posted by Dujo on Sun, 24 May 2020 09:39:16 -0700
Conversion operation of DStream
The DStream API provides the following methods related to transformation operations:
Examples of transform(func) and updateStateByKey(func) methods are given below:
(1), transform(func) method
transform methods and similar transformWith(func) methods allow any RDD-to-RDD function to be applied on DStream and can ...
Posted by buildakicker on Sat, 23 May 2020 12:15:37 -0700
>Following the previous article "Apache Shiro takes over the authentication and authorization of Swagger", some enthusiastic netizens said that Apache Shiro seems too simple. In response to this problem, the individual does not make any evaluation (all technologies serve the needs). Today's main share is: how to take over the authe ...
Posted by Chrisinsd on Fri, 22 May 2020 00:13:44 -0700
Built a set of elk by myself 7.x Version environment found that using filebeat to collect nginx or apapche could not customize the directory log directory. If you customize the log directory, it would not be segmented. If you use the default log location, it would be segmented
The solution is hereby recorded
Default load path
[root@kangcw e ...
Posted by phithe on Mon, 18 May 2020 09:03:04 -0700
Purchase domain name. Example: example.com
Set multiple secondary domain names. As shown in the figure:
To configure the tomcat file:
Modify the server.xml File:
The following configuration configures three containers with three different ports.
Please note three points: ① port number: Connector port; ② container name: portservice ...
Posted by kenchucky on Sun, 17 May 2020 08:11:31 -0700
As a qualified programmer, how to make the code more concise and clear, and improve the coding speed.
Today, follow me to learn the application of java 8 stream.
Don't talk much nonsense, go straight to the point.
Considering the following business scenario, there are four personnel information, and we need to count the names of personnel accor ...
Posted by sajidfiaz on Sat, 16 May 2020 07:12:15 -0700
Before JDK11, the HTTP function of java was very weak, only HttpURLConnection was provided for HTTP connection, and it was very complex to use. So we usually use the third-party HTTP client (Apache HttpComponents or OkHttp) to make HTTP requests.
Everything has changed in JDK11. In the java.net.http package, the latest HttpCl ...
Posted by PhilipXVIII18 on Wed, 13 May 2020 15:58:37 -0700
Today, when testing phoenix's secondary index function, the following exception occurred when the index was created to write data:
Caused by: org.apache.hadoop.hbase.client.RetriesExhaustedWithDetailsException: Failed 1 action: org.apache.phoenix.hbase.index.builder.IndexBuildingFailureException: Failed to build index for unexpected reason!
Posted by superhaggis on Sat, 09 May 2020 07:38:49 -0700