27, K8s minimum service vulnerability 1-PSP
1, Experimental environment
The underlying system is Ubuntu 18 04, then install k8s on each node and build a cluster. The IP address of the Master node is 192.168 26.71/24, the IP address of two worker nodes is 192.168 26.72/24,192.168. 26.73/24.
2, PSP Foundation
1.PSP overview Pod Security Policy is a cluster level resource (it does not ...
Added by wei on Wed, 15 Dec 2021 04:26:27 +0200
redis master-slave replication, sentinel mode, cluster mode
catalogue
redis cluster
redis master-slave replication
Role of master-slave replication:
Master slave replication process
Set up master-slave replication:
Environment configuration:
Install Redis
Master node Redis profile
Slave node Redis profile
Verify master-slave effect
Verify the slave node on the Master node
Redis sentinel mode ...
Added by dml on Tue, 14 Dec 2021 09:29:53 +0200
26, K8s system enhanced 2-seccomp and sysdig
1, Experimental environment
The underlying system is Ubuntu 18 04, then install k8s on each node and build a cluster. The IP address of the Master node is 192.168 26.71/24, the IP address of two worker nodes is 192.168 26.72/24,192.168. 26.73/24.
2, Seccomp
1.Seccomp concept seccomp (full name: secure computing mode) is a security mechanis ...
Added by viraj on Tue, 14 Dec 2021 03:53:54 +0200
Tencent Cloud creates subaccounts and restricts access to cloud server CVM rights through custom policies
intention
These days, I plan to temporarily transfer my cloud server to someone else. If I send my account directly to someone else, the risk is too high. Discover that you can configure subaccounts under your own main account and set resource access permissions for subaccounts. Now we have made some explorations, mainly to achieve the fol ...
Added by coder4Ever on Thu, 02 Dec 2021 19:08:04 +0200
Python decorator, one is enough (get materials below)
Decorators are an important part of Python. Simply put: they are functions that modify the functions of other functions. It helps to make our code shorter and more python. Many Python users don't know where to use them and where decorators can make the code more concise. Through the study of this article, you can understand and learn the decora ...
Added by nickmanners on Sat, 27 Nov 2021 02:56:36 +0200
[Introduction to Cloud Computing Experiment 3] MapReduce programming
Pre-environment
You need to set up a hadoop pseudo-distributed cluster platform, which you can see in this tutorial Quick Start Tutorial for Hadoop Big Data Technology and Pseudo-Distributed Clustering
Eclipse Environment Configuration
Eclipse(Windows Local System)
1. Install plug-ins:
hadoop-eclipse-plugin-2.7.3.jar
Address: https:// ...
Added by bc2013 on Thu, 25 Nov 2021 20:05:01 +0200
The Spring Cloud Gateway modifies the content of the request and response body
Welcome to my GitHubhttps://github.com/zq2599/blog_demosContent: classification and summary of all original articles and supporting source code, involving Java, Docker, Kubernetes, DevOPS, etc;Overview of this articleAs the ninth part of the Spring Cloud Gateway practice series, let's talk about how to use Spring Cloud Gateway to modify the ori ...
Added by realjumper on Thu, 25 Nov 2021 00:32:55 +0200
Spring Cloud Gateway practice 2: more routing configuration methods
Welcome to my GitHubhttps://github.com/zq2599/blog_demosContent: classification and summary of all original articles and supporting source code, involving Java, Docker, Kubernetes, DevOPS, etc;Overview of this articleThis article is the second in the Spring Cloud Gateway practical combat series. Through the previous article, we learned that the ...
Added by Paingiver on Tue, 09 Nov 2021 02:10:32 +0200
uniapp app & Tencent cloud IM communication encapsulation basic login method
Mechanism of login user
1. Understand login mechanism 2. Encrypted user data generation session
preface
Tencent is the earliest and largest instant messaging developer in China. QQ and wechat have become essential applications for every Internet user. In line with the trend of digital transformation in the industry, Tencent will op ...
Added by laffin on Sat, 06 Nov 2021 10:50:26 +0200
Cloud Computing Practice Series 22 (Python Programming II)
Supplementary content
1, The way we manipulate the code, the terminal file terminal string needs quotation marks
The file name ends in. py. The interpreter declares the terminal execution file
The execution process of the input command belongs to code -- > interpreter -- > syntax and lexical analysis
Create a hello.py file in t ...
Added by jrodd32 on Mon, 01 Nov 2021 09:02:22 +0200