Docker Container Series Articles Docker file of Docker Container Technology

Previously, the relevant articles are as follows: Docker Container Series Introduction to Docker Technology (1) Docker Container Series Introduction to Docker Technology (II) Docker Container Series: How many of these 20 Docker Command s do you know? A Brief Introduction to Docker file Docker can use the content of Dockerfile to automatically b ...

Posted by pjsteinfort on Wed, 18 Sep 2019 00:18:47 -0700

Javaweb - sendRedirect() method to achieve redirection (page jump)

Links to the original text: http://c.biancheng.net/view/4015.html response.sendRedirect() to achieve redirection (page jump) In some cases, a Servlet class may not be able to do all the work for a client's request. At this point, you can u ...

Posted by OzRedBoy on Mon, 16 Sep 2019 05:31:50 -0700

Javaweb - ServletConfig and ServletContext interfaces

Links to the original text: http://c.biancheng.net/view/3998.html Article directory ServletConfig interface ServletContext interface ServletConfig interface When running a Servlet program, you may need some auxiliary information, suc ...

Posted by MJH Mike on Mon, 16 Sep 2019 04:56:38 -0700

tomcat optimized reality

Original Link: https://my.oschina.net/u/1590001/blog/268213 Memory is not as good as bad pen. Here's tomcat brain-free optimization 1. Memory settings (VM parameter tuning)(1). In Win ...

Posted by metrathon on Sat, 14 Sep 2019 20:06:00 -0700

Docker Builds a disconf Environment, Part 3: Detailed Construction Process

Discof Full Text Link under Docker Docker Builds a disconf Environment, One of the Trilogy: Building a disconf at a Fast Speed; Docker Builds a disconf Environment, Trilogy Two: Local Fast Building a disconf Mirror; Docker Builds a disconf Environment, Trilogy 3: Detailed Construction Process; Using disconf under Docker: Quick Experienc ...

Posted by conor.higgins on Wed, 11 Sep 2019 19:40:32 -0700

WeakHashMap, Source Code Interpretation

Summary WeakHashMap is also an implementation class of the Map interface. It is similar to HashMap and is also a hash table that stores key-value pairs and is non-thread-safe. However, WeakHashMap does not introduce a red-black tree to avoid the impact of hash conflicts. The internal implementation is just an array + a single linked list. In a ...

Posted by MytHunter on Sat, 07 Sep 2019 00:49:46 -0700

Using Nginx reverse proxy and load balancing

What is reverse proxy The reverse proxy server is set up on the server side, which relieves the workload of the server by buffering frequently requested pages, forwards client requests to the target server on the internal network, and returns the ...

Posted by PJ droopy pants on Fri, 06 Sep 2019 02:30:51 -0700

SprBoot Embedded Servlet Container Automatic Configuration Principle

1. Automatic Configuration Principle of Embedded Servlet Container Embedded Servlet Container AutoConfiguration: Automatic Configuration of Embedded Servlet Containers @AutoConfigureOrder(Ordered.HIGHEST_PRECEDENCE) @Configuration @ConditionalOnWeb ...

Posted by zerogreen on Thu, 05 Sep 2019 22:51:26 -0700

mybatis tramples on multiple data sources and database connections are often disconnected

problem A strange problem with a project recently is that the database often reports that the connection is closed every few hours. Even with the following configuration, it is still not possible, and there is no article on the Internet explaining the pit. test-on-borrow: true test-while-idle: true validation-query: select 1 from dual Trou ...

Posted by xenooreo on Wed, 04 Sep 2019 01:15:26 -0700

Nginx Common Questions

1. Nginx multi-Server priority When starting to process an http request, nginx takes out the Host variable in the header header and matches each server_name in nginx.conf to determine which server will handle the request. However, how nginx configures multiple identical server_names can lead to priority access conflicts in server_name. 1.1 Prep ...

Posted by tobykw13 on Mon, 02 Sep 2019 06:57:33 -0700