The article is reproduced for easy sorting and induction. The source address is: https://cloud.tencent.com/developer/article/1722230
When a Linux server is attacked, sometimes there are several main IP addresses. If you can reject these IP attacks, it will greatly reduce the pressure on the server, and maybe the server will return to normal. ...
Posted by thallium6 on Thu, 02 Dec 2021 19:40:25 -0800
One: What is a firewall
1. What is a firewall
2. Firewall Classification
3. The principle of firewall
4. What filter network does the firewall pass through?
5. What is a table
6. What is a chain
7. Scenarios for using chains
8. Relationship between tables and chains
9. iptables syntax format
Posted by biz0r on Sat, 04 Sep 2021 19:35:01 -0700
Samba is a free software that implements the SMB protocol on Linux and UNIX systems and consists of server and client programs.SMB (Server Messages Block) is a communication protocol for sharing files and printers on a local area network. It provides file and printer sharing services between different computers in th ...
Posted by rlalande on Mon, 06 Jul 2020 09:15:32 -0700
Squid is a high performance proxy cache server that supports FTP, gopher, HTTPS, and HTTP protocols.Unlike general proxy caching software, Squid handles all client requests in a separate, non-modular, I/O-driven processAgent modeForward proxy allows users to use squid proxy server to access the internet. It also enables simi ...
Posted by son.of.the.morning on Mon, 29 Jun 2020 12:31:27 -0700
**rockermq cluster building
Start NameServer, listen to the port after NameServer gets up, wait for Broker, Producer and Consumer to connect, which is equivalent to a routing control center.
Broker starts, maintains a long connection with all nameservers, and sends heartbeat packets re ...
Posted by vidago on Tue, 16 Jun 2020 23:49:56 -0700
Through the previous article Istio Sidecar injection principle It can be found that the Sidecar application has been injected at the same time when the application is submitted to the kubernate deployment.
If you are careful, you can also find that in addition to the application of istio proxy, there is also an Init Containers of istio ...
Posted by nediaz on Wed, 27 May 2020 05:10:20 -0700
In short, Sidecar injection adds the configuration of additional containers to the Pod template. This refers to the Pod in which the Envoy container is applied.
Currently, the containers required by Istio service grid are:
Istio init is used to set iptables rules so that inbound / outbound traffic passes through the Sidecar agent.
Posted by asparagus on Mon, 25 May 2020 05:12:54 -0700
1) Check the status of the firewall
The firewall service name in centos7 is firewalld, no longer iptables
[root@localhost ~]# systemctl status firewalld
firewalld.service - firewalld - dynamic firewall daemon
Loaded: loaded (/usr/lib/systemd/system/firewalld.service; enabled)
Active: active (running) since One 2017-12 ...
Posted by Adam W on Sun, 10 May 2020 09:00:35 -0700
Alibaba cloud server, operating system CentOS 7.0, installs nginx.
1. First, set alicloud's security group settings and open the 80 port limit:
Open Alibaba cloud official website > console > ECS > Security Group > security group rules:
Select any rule column, click "clone", select "HTTP(80)" for "protoco ...
Posted by mike760534211 on Mon, 04 May 2020 17:06:24 -0700