ZONE for connection tracking

brief introduction At present, a connection trace quintuple is the source destination IP, the transport layer protocol, and the source destination port. In multi-tenant environment, the private address network of tenants may overlap. If only one CT is distinguished by these five elements, it can not meet the needs of multi-tenants. So the conce ...

Posted by jlp09550 on Sat, 12 Oct 2019 07:05:49 -0700

jenkins+maven+java-Tomcat -- Configuration of the project (server.xml)

Tomcat -- About Project Configuration Configuration Ports - involving three ports - modifying conf/server.xml # Close the port of tomcat <Server port="8005" shutdown="SHUTDOWN"> # Establish access to http, browser access <Connector port="8080" protocol="HTTP/1.1" connection ...

Posted by Cerberus_26 on Fri, 04 Oct 2019 18:24:46 -0700

Deep Understanding of the INVALID State of Connection Tracking

Several states in user-mode connection tracking A connection tracking system defines several states in which a connection may be in: NEW: The initial state of a connection (e.g. the arrival of a SYN packet in a TCP connection), or the firewall receives only traffic in one direction (e.g. before the firewall receives a reply packet). ESTABLISHE ...

Posted by Jeremiah on Fri, 27 Sep 2019 06:01:27 -0700

Java programmers are bound to use Linux Quick Search Manual

Contents System Service Management file management view log Compression and decompression Disk and Network Management firewall ftp operation Installation and Management of Software Other System Service Management systemctl The state of each service in the output system: systemctl list-units --type=service View the running status of the serv ...

Posted by Crystal Dragon on Wed, 04 Sep 2019 05:54:13 -0700

Linux iptables and firewalld firewall

iptables The iptables service is used to process or filter traffic policy items (rules). Multiple rules can form a rule chain, which is categorized according to the location of data packet processing. Preprocessing data packets (PREROUTING) before routing; Processing incoming data packets (INPUT); Processing Outgoing Packets (OUTPUT); Proc ...

Posted by hayunna on Sun, 01 Sep 2019 07:42:55 -0700

HAProxy Scheduling Algorithm

Article Directory HAProxy Scheduling Algorithm 1. Static algorithms 1. static-rr 2. first 2. Dynamic algorithms: 1. roundrobin 2. leastconn 3. Hybrid algorithm 1. source 2. uri 3. url_param: 4. hdr 5. rdp-cookie 6. random Difference between ...

Posted by hbalagh on Thu, 22 Aug 2019 18:19:26 -0700

Linux Network - Configuration of Firewall Related Commands

Absrtact: This paper mainly studied how to configure firewall in Linux system. iptables command Iptables is not exactly a firewall, the real firewall is a Netfilter running in the system kernel, and iptables is only a tool to operate netfilter. Its main function is to interact with users, get the user's requirements, and convert them into inf ...

Posted by offsprg01 on Fri, 16 Aug 2019 01:07:21 -0700

kubeproxy source code analysis

kubernetes Off-line Installation Package, only three steps kube-proxy source code parsing ipvs has higher performance and stability than iptables mode. This paper focuses on the source code analysis of iptables mode. If you want to understand the principle of iptables mode, you can refer to its implementation. There is no difference in architec ...

Posted by cutups on Wed, 07 Aug 2019 00:43:36 -0700

k8s practice 18:statefulset learning configuration record

1.Basic concepts statefulset, which can be translated into stateful settings. Contrast with deployment The pod created by deployment deployment is stateless. The rescheduling of pod, the name of pod hostname, the order of starting pod and deleting pod are random. The deployment uses shared storage, and all pods share a single volume. The pod c ...

Posted by kittrellbj on Thu, 25 Jul 2019 03:28:26 -0700

Configuring IPSec with StrongSwan

Using StrongSwan to study IPSec is a good practice to understand IPSec. However, there are so many pits in the process of using Strong Swan, and there are so many incomplete online tutorials that I can hardly explain every step thoroughly, which leads me to scratch my ears and cheeks in the process of using Strong Swan. Programmers naturally w ...

Posted by diagnostix on Tue, 16 Jul 2019 16:10:14 -0700