For the principle of cluster, please refer to Redis design and Implementation - working principle of cluster , I won't go into details here. I introduced how to use redis trib toolset to install cluster a long time ago How to build and use Redis cluster In the past two days, I read the official documents and found a new way of installa ...
Posted by Dillinger on Fri, 17 Jan 2020 03:15:30 -0800
LVS load balancing - DR mode
1: Definition of DR mode
Referred to as DR mode, the semi open network structure is adopted, which is similar to the structure type of TUN mode, but each node is not scattered in different places, but is located in the same physical network with the ...
Posted by gelwa on Thu, 16 Jan 2020 23:22:10 -0800
Besu is the enterprise Ethereum product in Hyperledger, and its biggest advantage is that it is compatible with the Ethereum main network. This tutorial describes how to use Hyperledger Besu to quickly start an enterprise Ethernet network and use JSON RPC for data query and transaction submission, and how to use Truffle to develop enterprise Et ...
Posted by pessi on Thu, 16 Jan 2020 19:06:45 -0800
1, Install PhpUnit
1. Download phpunit: Click to enter
2. Configure phpunit:
1) Add environment variable
Right click my computer and select properties. Click Advanced system settings on the left. At this time, system properties will pop up, select Advanced tab, and click environment variable in t ...
Posted by neroag on Thu, 16 Jan 2020 10:42:29 -0800
03 ° ZigBee sensor network - smoke sensor
Experimental phenomenon: smoke sensor is similar to photosensitive sensor detection method; terminal node collects smoke signal, and
After the coordinator is networked, the collected data is sent to the coordinator, and the coordinator receives th ...
Posted by trinitywave on Thu, 16 Jan 2020 10:34:06 -0800
This chapter is kubernetes series tutorials The second = article mainly introduces the deployment of the kubernetes cluster through the kubeadm installation tool. Considering the limitations of the domestic network, the mirror has been downloaded to the network disk for offline deployment.
1. Overview of the environment
1.1 Instal ...
Posted by dickey on Thu, 16 Jan 2020 09:18:20 -0800
Change from: https://www.jianshu.com/p/fc2d2dbd510b
kerberos is mainly used for identity authentication in network communication, and its main feature is "complexity". So it's best to familiarize yourself with the principles of kerberos before entering the pit. Her ...
Posted by teguh123 on Thu, 16 Jan 2020 06:33:13 -0800
The client program processes multiple socket s. (e.g. non blocking connect)
The client program processes both user input and network connections. (e.g. chat program)
The server should handle listening socket and connecting socket at the same time.
The server processes both TCP and UDP ...
Posted by RHolm on Thu, 16 Jan 2020 03:20:56 -0800
Alibaba cloud functional computing is an event driven fully hosted computing service. Through function calculation, you don't need to manage infrastructure such as servers, just write code and upload it. Function calculation will prepare computing resources for you, run your code in a flexib ...
Posted by faizanno1 on Wed, 15 Jan 2020 23:25:45 -0800
1, Show wait (conditional wait)
The location is clearly right. Why can't the running code find the location.
The location is clearly right. If the location is found, why is the text information empty?
frame not processed
The page rendering speed is slower than the code of automatic test, and the page is locat ...
Posted by arsitek on Wed, 15 Jan 2020 22:44:46 -0800