day43: Apache domain name jump, user authentication and access format

1. apapche user authentication: you need to enter a user name and password when you visit the website, and you can access it only after the authentication is passed, which increases the security: for example, manage the access to the background: 1. First, make authentication for the root directory: that is to say, when you visit the website, y ...

Posted by Plex on Wed, 01 Jan 2020 17:33:41 -0800

Nginx reverse proxy and cache usage

Bowen structureReverse Proxyproxy cache nginx optimization Reverse proxy (case) 1. Reverse Proxy means that a proxy server accepts a client's connection request, then forwards the request to the web server on the network (possibly apache, nginx, tomcat, iis, etc.), and returns the result from the web server to the client requesting the conne ...

Posted by anauj0101 on Wed, 01 Jan 2020 01:03:43 -0800

Single-machine multi-instance monitoring based on WEB-API

Guidance: Author: Jiang Lexing MySQL-DBA currently maintains two MySQL open source tools mysqltools & DBM (dbm-agent dbm-center) on github, and has some experience in machine learning and programmed transactions. Problems facing Solution MySQL Monitoring Gateway Installation Configuration Process Environmental description Instal ...

Posted by beginPHP on Mon, 30 Dec 2019 18:07:31 -0800

PHP Express query API interface, which can be used directly if necessary

It is suitable for docking, such as crowd, enterprise, e-commerce website, WeChat public number platform, which involves regular delivery and express delivery. Support more than 300 domestic and foreign express delivery and logistics companies' express bill number one-stop query. instructions: 1. Kuadidi api.php doesn't need ...

Posted by jerastraub on Sun, 29 Dec 2019 07:20:56 -0800

Nginx Service Optimization ---- (Hide Version + Cache + Modify Users and Groups + Log Split + Process Timeout)

[TOC] Article Directory 1. Configure Nginx Hidden Version Number 1.1. Modify Profile Method 1.2. Modify Source Code Method 2. Modify Nginx Users and Groups 2.1. Modify the profile to specify users and groups 3. Configure Nginx Web Cache Time IV. Configure Log Splitting 5. Connection timeout The installation of nginx has been configured in adva ...

Posted by stringfield on Sat, 28 Dec 2019 10:06:19 -0800

Best practices for AWS IAM Role

I. EC2 For the application above EC2, do not assign User Credentials, use IAM Role Attachment.You can access the meatdata of EC2 to view the Role permission granted curl http://169.254.169.254/latest/meta-data/iam/security-credentials/ 2, Software on local laptop For users who develop and test on their own computers, users need access rights o ...

Posted by mitzleah on Fri, 27 Dec 2019 06:04:52 -0800

Fabric blockchain operation and maintenance monitoring based on Prometheus and StatsD

Hyperledger Fabric is a blockchain that emphasizes operation and maintenance. Since version 1.4, Fabric has included features for operation and maintenance of peer and orderer nodes. This tutorial will introduce how to configure the operation and maintenance management service of Fabric network nodes, and how to use Prometheus and statsD/Graphi ...

Posted by phpparty on Fri, 27 Dec 2019 04:58:12 -0800

k8s storage volume

1.emptyDir storage volume apiVersion: v1 kind: Pod metadata: name: cunchujuan spec: containers: - name: myapp #Define the first container to display the contents of the index.html file image: ikubernetes/myapp:v1 imagePullPolicy: IfNotPresent volumeMounts: #Call Storage Volume - name: html #Use the name of the ...

Posted by abhikerl on Thu, 26 Dec 2019 18:11:57 -0800

Docker Three Swordsmen-docker-compose

1. Introduction to Docker-Compose Compose is a tool for defining and running container docker applications.With Compose, you can use YAML files to fit all the services your application needs.Then, with one command, you can create and start all services from the YAML file pairing.Then you need to understand the basic syntax of YAML files. Basi ...

Posted by jimdelong on Mon, 23 Dec 2019 10:44:49 -0800

Docker Series 3:Docker Mirror Details

1. Introduction to Docker Mirrors 1. Introduction of Mirror Composition      Hierarchical, with bootfs at the bottom and rootfs above bootfs can be of type btrfs, aufs, lxc and require a kernel, but this kernel is only for user controls that launch containers rootfs is represented as a root file system, which contains many files and directori ...

Posted by revdev on Sun, 22 Dec 2019 19:15:54 -0800