Nginx request body is too large, error 413, request_ The body log is frequently empty, and the whole process of actual investigation

In the previous article, I used openresty to build https proxy and log printing. With the passage of time, the openresty I built has been on the company's production server. A new problem appeared on Friday, so I began to explore! So what's the problem? How to solve it? Let's look down with questions! After this problem occurred, my collea ...

Added by khaldryck on Thu, 10 Feb 2022 07:01:35 +0200

Through examples, you can understand how to analyze the relevant algorithms of binary tree (question: isomorphism of PAT tree)

Basic experiment 4-2.1 isomorphism of trees Give two trees T1 and T2. If T1 can be changed into T2 through several child exchanges, we call the two trees "isomorphic". For example, the two trees given in Figure 1 are isomorphic, because after we exchange the left and right children of nodes A, B and G of one tree, we get another t ...

Added by modcar on Thu, 10 Feb 2022 06:54:15 +0200

MySQL learning notes 1

Operation database Operation database Several basic database operation commands: update user set password=password('123456')where user='root'; Change Password flush privileges; Refresh database show databases; Show all databases use dbname;Open a database show tables; show database mysql All tables in describe user; Display table mysql ...

Added by shibobo12 on Thu, 10 Feb 2022 06:31:44 +0200

2021-05-15 basic part of MySQL interview questions

Database MySql Basics 1. Function classification? What functions are often used? lower upper substr length Trim (remove the leading and trailing spaces and do not remove the spaces in the middle) str_to_date(%Y-%m-%d) date_format Format (decimal) round Random number ifnull (if empty, replace with 0) Aggregate function / grouping function Grou ...

Added by Peggy on Thu, 10 Feb 2022 06:30:10 +0200

expect batch traversal ip to execute the specified code [Zhenxiang warning]

True fragrance reason I'll just say one thing. If you want to restart a service of other servers, you can't build a conventional shell except for the expect method [if you're beaten, I'll delete it]Expect doesn't support any traversal syntax, so it's not too fragrant to use EOF to traverse expect [I don't know whether it's EOF or expect] ...

Added by monkeynote on Thu, 10 Feb 2022 06:22:14 +0200

Data structure - Basic Concepts

1. What is a data structure 1.1 some definitions of data structure "A data structure is a data object and the various relationships between the instances of the object and the data elements that make up the instance. These relationships can be given by defining relevant functions." Sartaj Sahni, data structure, algorithm and App ...

Added by poe on Thu, 10 Feb 2022 06:18:04 +0200

Super detailed Python basic statement summary (multi instance, video explanation, continuous update)

1, Operator 1.1 + -- addition of two objects +Operator is used to add two objects. [example 1] number addition. In Python, we often use + to add values. Common applications are as follows: a = 13 b = 2 c = 4.0 d = 5.0 print(a + b) # Add integers 15 print(c + d) # Floating point number addition 9.0 print(a + c) # Add integer and float ...

Added by alexz on Thu, 10 Feb 2022 06:14:22 +0200

3 - Generic Programming Style

Standard Template Library: Standard Template Library( STL) Sequential container: vector, list. It is mainly used for iterative operations.Associated container: map, set. It is mainly used to quickly find the element value in the container. Generic algorithms provide many operations that can act on container classes and array types. T ...

Added by the182guy on Thu, 10 Feb 2022 06:13:08 +0200

Scrambling part of OFDM

Scrambling code of OFDM 1. Purpose In digital communication, if long 0 or 1 sequences often appear, it will affect the establishment and maintenance of bit synchronization. Using scrambling code in the transmitter can avoid the adverse effect of this data on the timing of the receiver. At the same time, in order to limit the crosstalk caused b ...

Added by DamianTV on Thu, 10 Feb 2022 06:10:46 +0200

imgaug (image enhancement) of Python third-party module

imgaug is a encapsulated python library for image authentication. It supports the transformation of key points and bounding box together. Project home page: imgaug doc 1. Installation and uninstallation # Install via github sudo pip install git+https://github.com/aleju/imgaug # Install via pypi sudo pip install imgaug # For local install ...

Added by dan7474 on Thu, 10 Feb 2022 06:08:39 +0200