Spring boot integrated configuration logback-spring.xml
Using logback instead of log4j is because logback is another open source log component designed by the founder of log4j. The kernel of logback has been rewritten and its performance has been improved by more than 10 times on some key execution paths. Moreover, the logback not only improves the performance, but also reduces the initial memory lo ...
Posted by 7724 on Thu, 28 May 2020 01:53:36 -0700
Istio police agent & envoy start process
Opening
Through the previous article Istio Sidecar injection principle It can be found that the Sidecar application has been injected at the same time when the application is submitted to the kubernate deployment.
If you are careful, you can also find that in addition to the application of istio proxy, there is also an Init Containers of istio ...
Posted by nediaz on Wed, 27 May 2020 05:10:20 -0700
Tomcat CAS (single sign on) version 5.2x configuration database access - yellow Tong
The 5.2 version of CAS single sign on is really a big change. I came up with it after reading a lot of data. The general steps of configuration and the steps of configuring CAS and database are as follows: 1. Copying jar package, 2. Configuring application.properties Database configuration access, 3. Establish database data
Preparation be ...
Posted by alivec on Fri, 22 May 2020 09:13:14 -0700
String, file, stream MD5 encryption
Article catalog
MD5 introduction
use
MD5 introduction
MD5 message digest algorithm * * (English: MD5 message digest algorithm), a widely used cryptographic hash function, can generate a 128 bit (16 byte) hash value to ensure the integrity and consistency of information transmission. MD5 was designed by Ronald Lin Rives ...
Posted by Madzz on Thu, 21 May 2020 07:47:29 -0700
Kong source code installation
Kong is a cloud-native, fast, scalable, and distributed Microservice API Gateway
background
Although Kong has reached 2.0, because the previous expansion development was based on Kong 1.2.1, the source code and development environment construction of Kong are based on Version 1.2.1. The subsequent versions can follow this process, but t ...
Posted by rxsid on Sun, 17 May 2020 08:26:34 -0700
Kong source code installation
Kong is a cloud-native, fast, scalable, and distributed Microservice API Gateway
background
Although Kong has reached 2.0, because the previous expansion development was based on Kong 1.2.1, the source code and development environment construction of Kong are based on Version 1.2.1. The subsequent versions can follow this process, but t ...
Posted by Cugel on Sun, 17 May 2020 08:18:14 -0700
Two-way authentication of https requests and SSL using the Jetty plug-in in eclipse
link
Full program source download, csdn not yet validated
1. Include both https and socket ssl test codes
2. All passwords are 123456
Environmental preparation
Install run-jetty-run plug-in in eclipse csdn download resource
java environment support, need to use keytool command
start
Generate server certificate
keytool -genkey -alias ...
Posted by SecureMind on Thu, 07 May 2020 10:31:07 -0700
Building a high black box monitoring platform
Summary
In the monitoring system, we usually divide the monitoring into white box monitoring and black box monitoring
Black box monitoring: the main concern is generally what is happening. For example, when an alarm occurs and the service interface is abnormal, this monitoring is the monitoring that can be seen from the user's point of view, ...
Posted by ShaolinF on Wed, 06 May 2020 02:55:43 -0700
K8S binary cluster deployment - single master cluster
1, Cluster environment
As introduced in the previous blog, my construction and deployment are also based on the previous one.
2, Deploy master node components
The following three core components should be deployed on the Master:
Kube APIServer: it is the unified entrance of the cluster. The coordinator of each component, the addition, deletio ...
Posted by Nat on Tue, 05 May 2020 10:11:57 -0700
Complete Kubernetes binary deployment step by step -- component installation (single node)
Complete Kubernetes binary deployment step by step (3) - component installation (single node)
Preface
In the previous two articles, we have completed the basic environment construction, including etcd cluster (including Certificate creation), flannel network setting, docker engine installation and deployment, etc. in this paper, we will comple ...
Posted by davelr459 on Tue, 05 May 2020 06:42:52 -0700