Spring boot integrated configuration logback-spring.xml

Using logback instead of log4j is because logback is another open source log component designed by the founder of log4j. The kernel of logback has been rewritten and its performance has been improved by more than 10 times on some key execution paths. Moreover, the logback not only improves the performance, but also reduces the initial memory lo ...

Posted by 7724 on Thu, 28 May 2020 01:53:36 -0700

Istio police agent & envoy start process

Opening Through the previous article Istio Sidecar injection principle It can be found that the Sidecar application has been injected at the same time when the application is submitted to the kubernate deployment. If you are careful, you can also find that in addition to the application of istio proxy, there is also an Init Containers of istio ...

Posted by nediaz on Wed, 27 May 2020 05:10:20 -0700

Tomcat CAS (single sign on) version 5.2x configuration database access - yellow Tong

The 5.2 version of CAS single sign on is really a big change. I came up with it after reading a lot of data. The general steps of configuration and the steps of configuring CAS and database are as follows: 1. Copying jar package, 2. Configuring application.properties Database configuration access, 3. Establish database data Preparation be ...

Posted by alivec on Fri, 22 May 2020 09:13:14 -0700

String, file, stream MD5 encryption

Article catalog MD5 introduction use MD5 introduction MD5 message digest algorithm * * (English: MD5 message digest algorithm), a widely used cryptographic hash function, can generate a 128 bit (16 byte) hash value to ensure the integrity and consistency of information transmission. MD5 was designed by Ronald Lin Rives ...

Posted by Madzz on Thu, 21 May 2020 07:47:29 -0700

Kong source code installation

Kong is a cloud-native, fast, scalable, and distributed Microservice API Gateway background Although Kong has reached 2.0, because the previous expansion development was based on Kong 1.2.1, the source code and development environment construction of Kong are based on Version 1.2.1. The subsequent versions can follow this process, but t ...

Posted by rxsid on Sun, 17 May 2020 08:26:34 -0700

Kong source code installation

Kong is a cloud-native, fast, scalable, and distributed Microservice API Gateway background Although Kong has reached 2.0, because the previous expansion development was based on Kong 1.2.1, the source code and development environment construction of Kong are based on Version 1.2.1. The subsequent versions can follow this process, but t ...

Posted by Cugel on Sun, 17 May 2020 08:18:14 -0700

Two-way authentication of https requests and SSL using the Jetty plug-in in eclipse

link Full program source download, csdn not yet validated 1. Include both https and socket ssl test codes 2. All passwords are 123456 Environmental preparation Install run-jetty-run plug-in in eclipse csdn download resource java environment support, need to use keytool command start Generate server certificate keytool -genkey -alias ...

Posted by SecureMind on Thu, 07 May 2020 10:31:07 -0700

Building a high black box monitoring platform

Summary In the monitoring system, we usually divide the monitoring into white box monitoring and black box monitoring Black box monitoring: the main concern is generally what is happening. For example, when an alarm occurs and the service interface is abnormal, this monitoring is the monitoring that can be seen from the user's point of view, ...

Posted by ShaolinF on Wed, 06 May 2020 02:55:43 -0700

K8S binary cluster deployment - single master cluster

1, Cluster environment As introduced in the previous blog, my construction and deployment are also based on the previous one. 2, Deploy master node components The following three core components should be deployed on the Master: Kube APIServer: it is the unified entrance of the cluster. The coordinator of each component, the addition, deletio ...

Posted by Nat on Tue, 05 May 2020 10:11:57 -0700

Complete Kubernetes binary deployment step by step -- component installation (single node)

Complete Kubernetes binary deployment step by step (3) - component installation (single node) Preface In the previous two articles, we have completed the basic environment construction, including etcd cluster (including Certificate creation), flannel network setting, docker engine installation and deployment, etc. in this paper, we will comple ...

Posted by davelr459 on Tue, 05 May 2020 06:42:52 -0700