Docker Container Series Articles Docker file of Docker Container Technology
Previously, the relevant articles are as follows:
Docker Container Series Introduction to Docker Technology (1)
Docker Container Series Introduction to Docker Technology (II)
Docker Container Series: How many of these 20 Docker Command s do you know?
A Brief Introduction to Docker file
Docker can use the content of Dockerfile to automatically b ...
Posted by pjsteinfort on Wed, 18 Sep 2019 00:18:47 -0700
Javaweb - sendRedirect() method to achieve redirection (page jump)
Links to the original text: http://c.biancheng.net/view/4015.html
response.sendRedirect() to achieve redirection (page jump)
In some cases, a Servlet class may not be able to do all the work for a client's request. At this point, you can u ...
Posted by OzRedBoy on Mon, 16 Sep 2019 05:31:50 -0700
Javaweb - ServletConfig and ServletContext interfaces
Links to the original text: http://c.biancheng.net/view/3998.html
Article directory
ServletConfig interface
ServletContext interface
ServletConfig interface
When running a Servlet program, you may need some auxiliary information, suc ...
Posted by MJH Mike on Mon, 16 Sep 2019 04:56:38 -0700
tomcat optimized reality
Original Link: https://my.oschina.net/u/1590001/blog/268213
Memory is not as good as bad pen. Here's tomcat brain-free optimization
1. Memory settings (VM parameter tuning)(1). In Win ...
Posted by metrathon on Sat, 14 Sep 2019 20:06:00 -0700
Docker Builds a disconf Environment, Part 3: Detailed Construction Process
Discof Full Text Link under Docker
Docker Builds a disconf Environment, One of the Trilogy: Building a disconf at a Fast Speed;
Docker Builds a disconf Environment, Trilogy Two: Local Fast Building a disconf Mirror;
Docker Builds a disconf Environment, Trilogy 3: Detailed Construction Process;
Using disconf under Docker: Quick Experienc ...
Posted by conor.higgins on Wed, 11 Sep 2019 19:40:32 -0700
WeakHashMap, Source Code Interpretation
Summary
WeakHashMap is also an implementation class of the Map interface. It is similar to HashMap and is also a hash table that stores key-value pairs and is non-thread-safe. However, WeakHashMap does not introduce a red-black tree to avoid the impact of hash conflicts. The internal implementation is just an array + a single linked list. In a ...
Posted by MytHunter on Sat, 07 Sep 2019 00:49:46 -0700
Using Nginx reverse proxy and load balancing
What is reverse proxy
The reverse proxy server is set up on the server side, which relieves the workload of the server by buffering frequently requested pages, forwards client requests to the target server on the internal network, and returns the ...
Posted by PJ droopy pants on Fri, 06 Sep 2019 02:30:51 -0700
SprBoot Embedded Servlet Container Automatic Configuration Principle
1. Automatic Configuration Principle of Embedded Servlet Container
Embedded Servlet Container AutoConfiguration: Automatic Configuration of Embedded Servlet Containers
@AutoConfigureOrder(Ordered.HIGHEST_PRECEDENCE)
@Configuration
@ConditionalOnWeb ...
Posted by zerogreen on Thu, 05 Sep 2019 22:51:26 -0700
mybatis tramples on multiple data sources and database connections are often disconnected
problem
A strange problem with a project recently is that the database often reports that the connection is closed every few hours.
Even with the following configuration, it is still not possible, and there is no article on the Internet explaining the pit.
test-on-borrow: true
test-while-idle: true
validation-query: select 1 from dual
Trou ...
Posted by xenooreo on Wed, 04 Sep 2019 01:15:26 -0700
Nginx Common Questions
1. Nginx multi-Server priority
When starting to process an http request, nginx takes out the Host variable in the header header and matches each server_name in nginx.conf to determine which server will handle the request. However, how nginx configures multiple identical server_names can lead to priority access conflicts in server_name.
1.1 Prep ...
Posted by tobykw13 on Mon, 02 Sep 2019 06:57:33 -0700