nginx accesses the project through the domain name (do not receive the project name), cookie loss problem details
Recently, I got a domain name. If I want to use it to directly access the project deployed on Tomcat, I have to add the project name at the beginning. After a short configuration, it succeeded. Visit once and arrive at the landing page. As a result, you can't log in. You have been logging in the inte ...
Posted by bundyxc on Wed, 04 Mar 2020 21:16:34 -0800
Docker - building rabbitmq cluster
Article directory
Docker - building rabbitmq cluster
1. First, pull the image of rabbitmq
2. Then run three instances of rabbitmq
3. Then we build the cluster and synchronize the time zone
4. How to delete a container
5. Open the firewall or port controller for port release and check the operation s ...
Posted by gabe33 on Thu, 27 Feb 2020 01:17:07 -0800
ENSP -- vgmp and HRP protocol -- dual hot standby of firewall
1, Introduction of firewall hot standby
Overview of dual hot standby
Dual hot standby is to solve single point of failure and realize smooth transition of business (session table needs to be synchronized)
The hot standby modes of Huawei firewall include: hot standby mode and load balancing mode
...
Posted by biannucci on Sun, 16 Feb 2020 04:19:09 -0800
MySQL highly available KeepAlived + Dual hosts
MySQL highly available KeepAlived dual hosts
In the production environment, one MySQL host has a single point of failure, so we need to ensure the high availability of MySQL, that is, two MySQL servers. If one of the MySQL servers hangs up, the other can take over immediately.MySQL's high availability schemes are generally as follows: keepali ...
Posted by Joe Haley on Sat, 15 Feb 2020 21:49:04 -0800
kubernetes binary cluster deployment three -- load balancing scheduler deployment
Key points:
1. Experimental environment
2. Load balancing scheduler deployment
1, Experimental environment:
Based on the previously deployed multi Master cluster architecture, deploy two scheduler servers (nginx is used here) to achieve load balancing:
Deployment 1 of kubernetes binary cluster - deployment of etcd storage component and flan ...
Posted by micbox on Mon, 10 Feb 2020 00:30:53 -0800
Kubernetes cluster deployment -- binary cluster load balancing
Based on the previously deployed multi Master cluster architecture, deploy two scheduler servers (nginx is used here) to achieve load balancing:Again, the environment:
role
IP address
master01
192.168.100.110
master02
192.168.100.109
Scheduler 1 (nginx01)
192.168.100.113
Scheduler 2 (nginx02 ...
Posted by edtlov on Sun, 09 Feb 2020 21:44:07 -0800
RHCE exam summary (continuously updated)
Environmental preparation
1. Configure YUM software warehouse
server and desktop machine do the same operation!!!!
# // server:
$ vim /etc/yum.repos.d/base.repo
[rhce]
name = EX300
gpgcheck = 0
baseurl = http://classroom.example.com/content/rhel7.0/x86_64/dvd/
### Clear the previous software warehouse cache
$ yum clean ...
Posted by iamyespee on Sun, 09 Feb 2020 03:55:34 -0800
frp + nginx deploy http intranet penetration service
frp + nginx deploy http intranet penetration service
1, Foreword
frp is a high-performance reverse proxy application developed in Go language, which can be used for intranet penetration. It supports tcp, udp, http and
https. A web service deployed on the local machine can be mapped to an external n ...
Posted by djlfreak on Fri, 07 Feb 2020 02:40:24 -0800
Simulate weak network environment using command line under Mac
For audio and video development, we often need to simulate the weak network environment and observe the performance of APP under the weak network, such as packet loss, delay, jitter, bandwidth restriction, etc. Mac system has a weak network tool APP, called Network Link Conditioner, which supports the visualization of the simulation and config ...
Posted by bugsuperstar37 on Sun, 02 Feb 2020 10:19:02 -0800
1. Simple Topology
1. Simple Topology
Preparatory Knowledge Points
Router principles:
As the third layer device, the basic function of a router is to select routes according to the network layer address.After it judges the packets it receives based on the destination address, it sends them from the interface that can re ...
Posted by Chrysanthus on Sat, 01 Feb 2020 18:44:33 -0800