In order to improve the performance of the website, we can adopt the load balancing cluster scheme and the read-write separation. My previous blog described the configuration of WTM framework Separation of reading and writing , now we continue to build a load balancing cluster based on the previous ...
Posted by shellyrobson on Sun, 21 Jun 2020 01:14:37 -0700
1. Install the corresponding compilation tools
In the root user (do not use ordinary users, trouble), all copy and paste in the past, a one-time installation
yum -y groupinstall "Development tools"
yum -y install zlib-devel bzip2-devel openssl-devel ncurses-devel sqlite-devel readline-devel tk-devel gdbm-devel db4-devel libpcap-devel xz-devel ...
Posted by guido88 on Thu, 18 Jun 2020 20:12:07 -0700
1, Pre knowledge points
1.1 two ways to deploy Kubernetes cluster in production environment
At present, there are two ways to deploy Kubernetes cluster in production:
Kubeadm is a K8s deployment tool that provides kubeadm init and kubeadm join for rapid deployment of Kubernetes clusters.
Official address: https://kubernetes.io ...
Posted by deathrider on Fri, 05 Jun 2020 03:18:29 -0700
In view of the need for home-based work during the epidemic, remote work is necessary. At present, the simplest way is to realize it through the direct port mapping of the company's route, but there are inevitably security risks, For this reason, the editor temporarily decided to build openvpn to realize this function. Speaking of ope ...
Posted by danwatt on Wed, 03 Jun 2020 22:06:39 -0700
Recently, more than 10 secondary domain names of individuals need to issue certificates. Let's Encrypt provides free SSL certificates with a term of three months. When they expire, they need renew. The official also provides certbot, a tool for automatic renew. Here, we record the general certificate that uses Let's Encrypt to generate t ...
Posted by iRock on Fri, 29 May 2020 00:36:59 -0700
Using logback instead of log4j is because logback is another open source log component designed by the founder of log4j. The kernel of logback has been rewritten and its performance has been improved by more than 10 times on some key execution paths. Moreover, the logback not only improves the performance, but also reduces the initial memory lo ...
Posted by 7724 on Thu, 28 May 2020 01:53:36 -0700
Through the previous article Istio Sidecar injection principle It can be found that the Sidecar application has been injected at the same time when the application is submitted to the kubernate deployment.
If you are careful, you can also find that in addition to the application of istio proxy, there is also an Init Containers of istio ...
Posted by nediaz on Wed, 27 May 2020 05:10:20 -0700
The 5.2 version of CAS single sign on is really a big change. I came up with it after reading a lot of data. The general steps of configuration and the steps of configuring CAS and database are as follows: 1. Copying jar package, 2. Configuring application.properties Database configuration access, 3. Establish database data
Preparation be ...
Posted by alivec on Fri, 22 May 2020 09:13:14 -0700
MD5 message digest algorithm * * (English: MD5 message digest algorithm), a widely used cryptographic hash function, can generate a 128 bit (16 byte) hash value to ensure the integrity and consistency of information transmission. MD5 was designed by Ronald Lin Rives ...
Posted by Madzz on Thu, 21 May 2020 07:47:29 -0700
Kong is a cloud-native, fast, scalable, and distributed Microservice API Gateway
Although Kong has reached 2.0, because the previous expansion development was based on Kong 1.2.1, the source code and development environment construction of Kong are based on Version 1.2.1. The subsequent versions can follow this process, but t ...
Posted by rxsid on Sun, 17 May 2020 08:26:34 -0700