Now Nginx has become the first choice for many companies as front-end proxy pass servers. In practical work, they often encounter a lot of requirements for jump (Rewriting URL). For example, after changing the domain name, you need to keep the old domain name jump to the new domain name, change a web page and jump to a new page, we ...
Posted by landysaccount on Wed, 10 Nov 2021 06:05:24 -0800
If kept has 10 VIPs, how to check the traffic of each VIP?
Here you can use the sar command to view the network card traffic. The premise is that when you keep listening to the network card. Set the subinterface when setting up the network card.
That is, your network card is bound to the sub interface. In this way, eth0:0 and eth0:1 can see t ...
Posted by XenoPhage on Mon, 08 Nov 2021 11:01:58 -0800
Computer network is a computer system that links multiple computers and their external devices with independent functions in different geographical locations through communication lines, and realizes resource sharing and information transmission under the management and coordination of network operating system, network managemen ...
Posted by TKirahvi on Sat, 06 Nov 2021 02:17:18 -0700
✨ Learn, grow and love life with warmth ✨
Today, let's talk about the content related to linux commands. In the ranking of the top 500 operating systems of supercomputers in the world, the proportion of Linux has been maintained at more than 85% for a long time in recent ten years, and has been showi ...
In this article, I want to complete the basic notes of the network programming model supported by Java, so that I and you can understand the I/O mode of network programming supported by Java.
Introduction (small stove)
Speaking of network programming, let's first understand the I/O modes of network programming supported by Java: BIO, NIO, and ...
Posted by richblend on Fri, 05 Nov 2021 15:16:24 -0700
Today, let's play ChaosMesh to simulate the network duplicate package. At the same time, we should also look at the direct impact on the application.
Simulate network duplicate packets.
yaml file configuration
[root@s5 ChaosMesh]# cat network-duplicate.yaml
kind: NetworkC ...
Posted by neiltaylormade on Tue, 02 Nov 2021 22:49:42 -0700
In Linux, curl is a file transfer tool that uses URL rules to work on the command line. It can be said that curl is a very powerful http command line tool. It supports file upload and download. It is a comprehensive transmission tool, but traditionally, it is used to call URL a download tool.
Syntax:# curl [option] [url]
Common p ...
Posted by modcar on Tue, 02 Nov 2021 03:52:24 -0700
My Ubuntu is installed with VMware and connected with. nat. By default, VMware will automatically assign one of the many ip addresses to the virtual machine installed with. nat, that is, the ip address may change. The steps to configure a static IP address are as follows: (1) Open VMware's virtua ...
Posted by dave_55 on Tue, 02 Nov 2021 02:50:45 -0700
Core concepts and models of network programming
How to program network?
2. The essence of network programming
Using the interface function provided by the operating system, the application has the ability to send and receive network data.
The network interface is a function provided by the operating system at the code level
Posted by g00fy_m on Mon, 01 Nov 2021 20:08:24 -0700
Huawei 1+x network communication and maintenance
1, Experimental topology
2, VLAN information
3, ip information
4, Equipment naming
In order to facilitate the later maintenance, fault location and network standardization, it is necessary to name the network equipment. Please name the device according to Figure 3-1 experimental test t ...
Posted by GSHelpBoy on Sun, 31 Oct 2021 03:34:47 -0700