27, K8s minimum service vulnerability 1-PSP

1, Experimental environment The underlying system is Ubuntu 18 04, then install k8s on each node and build a cluster. The IP address of the Master node is 192.168 26.71/24, the IP address of two worker nodes is 192.168 26.72/24,192.168. 26.73/24. 2, PSP Foundation 1.PSP overview Pod Security Policy is a cluster level resource (it does not ...

Added by wei on Wed, 15 Dec 2021 04:26:27 +0200

redis master-slave replication, sentinel mode, cluster mode

catalogue redis cluster redis master-slave replication Role of master-slave replication: Master slave replication process Set up master-slave replication: Environment configuration: Install Redis Master node Redis profile Slave node Redis profile Verify master-slave effect Verify the slave node on the Master node Redis sentinel mode ...

Added by dml on Tue, 14 Dec 2021 09:29:53 +0200

26, K8s system enhanced 2-seccomp and sysdig

1, Experimental environment The underlying system is Ubuntu 18 04, then install k8s on each node and build a cluster. The IP address of the Master node is 192.168 26.71/24, the IP address of two worker nodes is 192.168 26.72/24,192.168. 26.73/24. 2, Seccomp 1.Seccomp concept seccomp (full name: secure computing mode) is a security mechanis ...

Added by viraj on Tue, 14 Dec 2021 03:53:54 +0200

Tencent Cloud creates subaccounts and restricts access to cloud server CVM rights through custom policies

intention These days, I plan to temporarily transfer my cloud server to someone else. If I send my account directly to someone else, the risk is too high. Discover that you can configure subaccounts under your own main account and set resource access permissions for subaccounts. Now we have made some explorations, mainly to achieve the fol ...

Added by coder4Ever on Thu, 02 Dec 2021 19:08:04 +0200

Python decorator, one is enough (get materials below)

Decorators are an important part of Python. Simply put: they are functions that modify the functions of other functions. It helps to make our code shorter and more python. Many Python users don't know where to use them and where decorators can make the code more concise. Through the study of this article, you can understand and learn the decora ...

Added by nickmanners on Sat, 27 Nov 2021 02:56:36 +0200

[Introduction to Cloud Computing Experiment 3] MapReduce programming

Pre-environment You need to set up a hadoop pseudo-distributed cluster platform, which you can see in this tutorial Quick Start Tutorial for Hadoop Big Data Technology and Pseudo-Distributed Clustering Eclipse Environment Configuration Eclipse(Windows Local System) 1. Install plug-ins: hadoop-eclipse-plugin-2.7.3.jar Address: https:// ...

Added by bc2013 on Thu, 25 Nov 2021 20:05:01 +0200

The Spring Cloud Gateway modifies the content of the request and response body

Welcome to my GitHubhttps://github.com/zq2599/blog_demosContent: classification and summary of all original articles and supporting source code, involving Java, Docker, Kubernetes, DevOPS, etc;Overview of this articleAs the ninth part of the Spring Cloud Gateway practice series, let's talk about how to use Spring Cloud Gateway to modify the ori ...

Added by realjumper on Thu, 25 Nov 2021 00:32:55 +0200

Spring Cloud Gateway practice 2: more routing configuration methods

Welcome to my GitHubhttps://github.com/zq2599/blog_demosContent: classification and summary of all original articles and supporting source code, involving Java, Docker, Kubernetes, DevOPS, etc;Overview of this articleThis article is the second in the Spring Cloud Gateway practical combat series. Through the previous article, we learned that the ...

Added by Paingiver on Tue, 09 Nov 2021 02:10:32 +0200

uniapp app & Tencent cloud IM communication encapsulation basic login method

Mechanism of login user 1. Understand login mechanism 2. Encrypted user data generation session preface Tencent is the earliest and largest instant messaging developer in China. QQ and wechat have become essential applications for every Internet user. In line with the trend of digital transformation in the industry, Tencent will op ...

Added by laffin on Sat, 06 Nov 2021 10:50:26 +0200

Cloud Computing Practice Series 22 (Python Programming II)

  Supplementary content 1, The way we manipulate the code, the terminal file terminal string needs quotation marks The file name ends in. py. The interpreter declares the terminal execution file The execution process of the input command belongs to code -- > interpreter -- > syntax and lexical analysis Create a hello.py file in t ...

Added by jrodd32 on Mon, 01 Nov 2021 09:02:22 +0200