day43: Apache domain name jump, user authentication and access format
1. apapche user authentication: you need to enter a user name and password when you visit the website, and you can access it only after the authentication is passed, which increases the security: for example, manage the access to the background:
1. First, make authentication for the root directory: that is to say, when you visit the website, y ...
Posted by Plex on Wed, 01 Jan 2020 17:33:41 -0800
Nginx reverse proxy and cache usage
Bowen structureReverse Proxyproxy cache
nginx optimization
Reverse proxy (case)
1. Reverse Proxy means that a proxy server accepts a client's connection request, then forwards the request to the web server on the network (possibly apache, nginx, tomcat, iis, etc.), and returns the result from the web server to the client requesting the conne ...
Posted by anauj0101 on Wed, 01 Jan 2020 01:03:43 -0800
Single-machine multi-instance monitoring based on WEB-API
Guidance:
Author: Jiang Lexing MySQL-DBA currently maintains two MySQL open source tools mysqltools & DBM (dbm-agent dbm-center) on github, and has some experience in machine learning and programmed transactions.
Problems facing
Solution
MySQL Monitoring Gateway Installation Configuration Process
Environmental description
Instal ...
Posted by beginPHP on Mon, 30 Dec 2019 18:07:31 -0800
PHP Express query API interface, which can be used directly if necessary
It is suitable for docking, such as crowd, enterprise, e-commerce website, WeChat public number platform, which involves regular delivery and express delivery. Support more than 300 domestic and foreign express delivery and logistics companies' express bill number one-stop query.
instructions:
1. Kuadidi api.php doesn't need ...
Posted by jerastraub on Sun, 29 Dec 2019 07:20:56 -0800
Nginx Service Optimization ---- (Hide Version + Cache + Modify Users and Groups + Log Split + Process Timeout)
[TOC]
Article Directory
1. Configure Nginx Hidden Version Number
1.1. Modify Profile Method
1.2. Modify Source Code Method
2. Modify Nginx Users and Groups
2.1. Modify the profile to specify users and groups
3. Configure Nginx Web Cache Time
IV. Configure Log Splitting
5. Connection timeout
The installation of nginx has been configured in adva ...
Posted by stringfield on Sat, 28 Dec 2019 10:06:19 -0800
Best practices for AWS IAM Role
I. EC2
For the application above EC2, do not assign User Credentials, use IAM Role Attachment.You can access the meatdata of EC2 to view the Role permission granted
curl http://169.254.169.254/latest/meta-data/iam/security-credentials/
2, Software on local laptop
For users who develop and test on their own computers, users need access rights o ...
Posted by mitzleah on Fri, 27 Dec 2019 06:04:52 -0800
Fabric blockchain operation and maintenance monitoring based on Prometheus and StatsD
Hyperledger Fabric is a blockchain that emphasizes operation and maintenance. Since version 1.4, Fabric has included features for operation and maintenance of peer and orderer nodes. This tutorial will introduce how to configure the operation and maintenance management service of Fabric network nodes, and how to use Prometheus and statsD/Graphi ...
Posted by phpparty on Fri, 27 Dec 2019 04:58:12 -0800
k8s storage volume
1.emptyDir storage volume
apiVersion: v1
kind: Pod
metadata:
name: cunchujuan
spec:
containers:
- name: myapp
#Define the first container to display the contents of the index.html file
image: ikubernetes/myapp:v1
imagePullPolicy: IfNotPresent
volumeMounts:
#Call Storage Volume
- name: html
#Use the name of the ...
Posted by abhikerl on Thu, 26 Dec 2019 18:11:57 -0800
Docker Three Swordsmen-docker-compose
1. Introduction to Docker-Compose
Compose is a tool for defining and running container docker applications.With Compose, you can use YAML files to fit all the services your application needs.Then, with one command, you can create and start all services from the YAML file pairing.Then you need to understand the basic syntax of YAML files.
Basi ...
Posted by jimdelong on Mon, 23 Dec 2019 10:44:49 -0800
Docker Series 3:Docker Mirror Details
1. Introduction to Docker Mirrors
1. Introduction of Mirror Composition
Hierarchical, with bootfs at the bottom and rootfs above
bootfs can be of type btrfs, aufs, lxc and require a kernel, but this kernel is only for user controls that launch containers
rootfs is represented as a root file system, which contains many files and directori ...
Posted by revdev on Sun, 22 Dec 2019 19:15:54 -0800