Detailed explanation of Linux commands -- curl

Command: curl In Linux, curl is a file transfer tool that uses URL rules to work on the command line. It can be said that curl is a very powerful http command line tool. It supports file upload and download. It is a comprehensive transmission tool, but traditionally, it is used to call URL a download tool. Syntax:# curl [option] [url] Common p ...

Posted by modcar on Tue, 02 Nov 2021 03:52:24 -0700

curl usage guide

brief introduction curl is a common command-line tool for requesting Web servers. Its name means the URL tool of the client. Its function is very powerful, with dozens of command line parameters. If you are proficient, you can completely replace graphical interface tools such as Postman. This paper introduces its main command line paramete ...

Posted by asmon on Mon, 25 Oct 2021 18:31:53 -0700

60 very useful CSS code snippets, recommended collection

Shortcut directory Vertical alignment Extend an element to window height Use different styles based on file format Create image grayscale across browsers Background gradient animation CSS: table column width self applicable Show box shadows on one or both sides only Package long text Make fuzzy text ...

Posted by marlonbtx on Sat, 27 Jun 2020 19:47:19 -0700

Kubernetes advanced -- the life cycle of pod

pod overview Pod is the basic execution unit of Kubernetes application, that is, it is the smallest and simplest unit created or deployed in Kubernetes object model. Pod represents the process running on the cluster. Pod encapsulates application containers (or in some cases multiple containers), stora ...

Posted by wshost on Fri, 26 Jun 2020 21:46:07 -0700

Elasticsearch Series - Index Management for Production Clusters

outline Indexing is one of the most frequent daily operations we use in Elasticsearch. This article takes a look at the indexing operations of Elasticsearch from the perspective of operations personnel. basic operation From the perspective of running children's shoes, let's take a look at the daily operation of the index in addition to CRUD, or ...

Posted by jossejf on Sun, 21 Jun 2020 17:38:00 -0700

I heard that your resources have been stolen. Do you know how the Nginx anti-theft chain works?

As mentioned in the last article Variables and operation principle in Nginx , here is a module that mainly provides variables and modifies the values of variables, that is, the anti-theft chain module we want to talk about: the referer module. Simple and effective means of anti-theft chain scene If you ...

Posted by nats on Sun, 14 Jun 2020 02:39:02 -0700

Using Istio for multi cluster deployment management: single control plane Gateway connection topology

In the single control plane topology, multiple Kubernetes clusters use a single Istio control plane running on one cluster. Pilot on the control plane manages the services on the local and remote clusters and configures the invoke sidecar agent for all clusters. Cluster aware service routing Istio 1.1 introduces the cluster aware service rou ...

Posted by reece_1989 on Thu, 04 Jun 2020 21:55:25 -0700

php WeChat Payment Separate Send Exempt

Write before First of all, this version is V1.3, updated on 2020.03.15. There was a payment score of v1.0 before.v1.0 and v1.3 are already quite different, so don't let me take them off the track if you're doing a good version of this. preparation in advance Looking at this article, I believe you have made preparations, including opening WeChat ...

Posted by nethnet on Tue, 02 Jun 2020 04:02:53 -0700

From enterprise wechat robot to Xiaoai classmate, use Serverless to realize life intelligence!

Through timing trigger, an enterprise wechat robot can be customized simply and quickly. We can use it to realize small functions such as drinking water, eating reminder, etc., and also to push news, weather and even monitor alarm regularly. Use enterprise wechat robot In enterprise wechat, select Add robot: After that, we can customize the ba ...

Posted by EvilPrimate on Wed, 27 May 2020 05:58:34 -0700

Istio police agent & envoy start process

Opening Through the previous article Istio Sidecar injection principle It can be found that the Sidecar application has been injected at the same time when the application is submitted to the kubernate deployment. If you are careful, you can also find that in addition to the application of istio proxy, there is also an Init Containers of istio ...

Posted by nediaz on Wed, 27 May 2020 05:10:20 -0700