ZONE for connection tracking
brief introduction
At present, a connection trace quintuple is the source destination IP, the transport layer protocol, and the source destination port. In multi-tenant environment, the private address network of tenants may overlap. If only one CT is distinguished by these five elements, it can not meet the needs of multi-tenants. So the conce ...
Posted by jlp09550 on Sat, 12 Oct 2019 07:05:49 -0700
jenkins+maven+java-Tomcat -- Configuration of the project (server.xml)
Tomcat -- About Project Configuration
Configuration Ports - involving three ports - modifying conf/server.xml
# Close the port of tomcat
<Server port="8005" shutdown="SHUTDOWN">
# Establish access to http, browser access
<Connector port="8080" protocol="HTTP/1.1"
connection ...
Posted by Cerberus_26 on Fri, 04 Oct 2019 18:24:46 -0700
Deep Understanding of the INVALID State of Connection Tracking
Several states in user-mode connection tracking
A connection tracking system defines several states in which a connection may be in:
NEW: The initial state of a connection (e.g. the arrival of a SYN packet in a TCP connection), or the firewall receives only traffic in one direction (e.g. before the firewall receives a reply packet).
ESTABLISHE ...
Posted by Jeremiah on Fri, 27 Sep 2019 06:01:27 -0700
Java programmers are bound to use Linux Quick Search Manual
Contents
System Service Management
file management
view log
Compression and decompression
Disk and Network Management
firewall
ftp operation
Installation and Management of Software
Other
System Service Management
systemctl
The state of each service in the output system:
systemctl list-units --type=service
View the running status of the serv ...
Posted by Crystal Dragon on Wed, 04 Sep 2019 05:54:13 -0700
Linux iptables and firewalld firewall
iptables
The iptables service is used to process or filter traffic policy items (rules). Multiple rules can form a rule chain, which is categorized according to the location of data packet processing.
Preprocessing data packets (PREROUTING) before routing;
Processing incoming data packets (INPUT);
Processing Outgoing Packets (OUTPUT);
Proc ...
Posted by hayunna on Sun, 01 Sep 2019 07:42:55 -0700
HAProxy Scheduling Algorithm
Article Directory
HAProxy Scheduling Algorithm
1. Static algorithms
1. static-rr
2. first
2. Dynamic algorithms:
1. roundrobin
2. leastconn
3. Hybrid algorithm
1. source
2. uri
3. url_param:
4. hdr
5. rdp-cookie
6. random
Difference between ...
Posted by hbalagh on Thu, 22 Aug 2019 18:19:26 -0700
Linux Network - Configuration of Firewall Related Commands
Absrtact: This paper mainly studied how to configure firewall in Linux system.
iptables command
Iptables is not exactly a firewall, the real firewall is a Netfilter running in the system kernel, and iptables is only a tool to operate netfilter. Its main function is to interact with users, get the user's requirements, and convert them into inf ...
Posted by offsprg01 on Fri, 16 Aug 2019 01:07:21 -0700
kubeproxy source code analysis
kubernetes Off-line Installation Package, only three steps
kube-proxy source code parsing
ipvs has higher performance and stability than iptables mode. This paper focuses on the source code analysis of iptables mode. If you want to understand the principle of iptables mode, you can refer to its implementation. There is no difference in architec ...
Posted by cutups on Wed, 07 Aug 2019 00:43:36 -0700
k8s practice 18:statefulset learning configuration record
1.Basic concepts
statefulset, which can be translated into stateful settings.
Contrast with deployment
The pod created by deployment deployment is stateless. The rescheduling of pod, the name of pod hostname, the order of starting pod and deleting pod are random. The deployment uses shared storage, and all pods share a single volume.
The pod c ...
Posted by kittrellbj on Thu, 25 Jul 2019 03:28:26 -0700
Configuring IPSec with StrongSwan
Using StrongSwan to study IPSec is a good practice to understand IPSec. However, there are so many pits in the process of using Strong Swan, and there are so many incomplete online tutorials that I can hardly explain every step thoroughly, which leads me to scratch my ears and cheeks in the process of using Strong Swan. Programmers naturally w ...
Posted by diagnostix on Tue, 16 Jul 2019 16:10:14 -0700