Detailed explanation of Linux commands -- curl
Command: curl
In Linux, curl is a file transfer tool that uses URL rules to work on the command line. It can be said that curl is a very powerful http command line tool. It supports file upload and download. It is a comprehensive transmission tool, but traditionally, it is used to call URL a download tool.
Syntax:# curl [option] [url]
Common p ...
Posted by modcar on Tue, 02 Nov 2021 03:52:24 -0700
curl usage guide
brief introduction
curl is a common command-line tool for requesting Web servers. Its name means the URL tool of the client.
Its function is very powerful, with dozens of command line parameters. If you are proficient, you can completely replace graphical interface tools such as Postman.
This paper introduces its main command line paramete ...
Posted by asmon on Mon, 25 Oct 2021 18:31:53 -0700
60 very useful CSS code snippets, recommended collection
Shortcut directory
Vertical alignment
Extend an element to window height
Use different styles based on file format
Create image grayscale across browsers
Background gradient animation
CSS: table column width self applicable
Show box shadows on one or both sides only
Package long text
Make fuzzy text
...
Posted by marlonbtx on Sat, 27 Jun 2020 19:47:19 -0700
Kubernetes advanced -- the life cycle of pod
pod overview
Pod is the basic execution unit of Kubernetes application, that is, it is the smallest and simplest unit created or deployed in Kubernetes object model. Pod represents the process running on the cluster.
Pod encapsulates application containers (or in some cases multiple containers), stora ...
Posted by wshost on Fri, 26 Jun 2020 21:46:07 -0700
Elasticsearch Series - Index Management for Production Clusters
outline
Indexing is one of the most frequent daily operations we use in Elasticsearch. This article takes a look at the indexing operations of Elasticsearch from the perspective of operations personnel.
basic operation
From the perspective of running children's shoes, let's take a look at the daily operation of the index in addition to CRUD, or ...
Posted by jossejf on Sun, 21 Jun 2020 17:38:00 -0700
I heard that your resources have been stolen. Do you know how the Nginx anti-theft chain works?
As mentioned in the last article Variables and operation principle in Nginx , here is a module that mainly provides variables and modifies the values of variables, that is, the anti-theft chain module we want to talk about: the referer module.
Simple and effective means of anti-theft chain
scene
If you ...
Posted by nats on Sun, 14 Jun 2020 02:39:02 -0700
Using Istio for multi cluster deployment management: single control plane Gateway connection topology
In the single control plane topology, multiple Kubernetes clusters use a single Istio control plane running on one cluster. Pilot on the control plane manages the services on the local and remote clusters and configures the invoke sidecar agent for all clusters.
Cluster aware service routing
Istio 1.1 introduces the cluster aware service rou ...
Posted by reece_1989 on Thu, 04 Jun 2020 21:55:25 -0700
php WeChat Payment Separate Send Exempt
Write before
First of all, this version is V1.3, updated on 2020.03.15. There was a payment score of v1.0 before.v1.0 and v1.3 are already quite different, so don't let me take them off the track if you're doing a good version of this.
preparation in advance
Looking at this article, I believe you have made preparations, including opening WeChat ...
Posted by nethnet on Tue, 02 Jun 2020 04:02:53 -0700
From enterprise wechat robot to Xiaoai classmate, use Serverless to realize life intelligence!
Through timing trigger, an enterprise wechat robot can be customized simply and quickly. We can use it to realize small functions such as drinking water, eating reminder, etc., and also to push news, weather and even monitor alarm regularly.
Use enterprise wechat robot
In enterprise wechat, select Add robot:
After that, we can customize the ba ...
Posted by EvilPrimate on Wed, 27 May 2020 05:58:34 -0700
Istio police agent & envoy start process
Opening
Through the previous article Istio Sidecar injection principle It can be found that the Sidecar application has been injected at the same time when the application is submitted to the kubernate deployment.
If you are careful, you can also find that in addition to the application of istio proxy, there is also an Init Containers of istio ...
Posted by nediaz on Wed, 27 May 2020 05:10:20 -0700