Spring cloud square development practice (full coverage of three types)

Welcome to my GitHubHere we classify and summarize all the original works of Xinchen (including supporting source code): https://github.com/zq2599/blog_demosOverview of this articleAbove Five minutes to understand spring cloud square It introduces in detail what spring cloud square is and the detailed concepts of three implementation types. Han ...

Added by bryson on Mon, 01 Nov 2021 02:02:50 +0200

Alicloud SMS interface

First of all, I have a rookie. I just studied a few days ago. For wechat payment of small programs, the background is based on ssm. This time, experience the SMS notification after opening and submitting orders. So I took a look at Alibaba cloud. First, open the SMS service. After entering the Alibaba cloud console, search for SMS. You can find ...

Added by Tomcat13 on Sat, 30 Oct 2021 23:12:38 +0300

Problems and solutions in switching back from Typecho to Wordpress

Recently, I transferred this little station that no one visited from Typecho back to Wordpress. There is no special reason. I just changed the host and wanted to toss. Typecho is excellent, but it has not been updated, giving the impression that no one is maintaining it (it seems that a new version will be released soon). What I have learned a ...

Added by Toot4fun on Wed, 27 Oct 2021 07:44:21 +0300

Cloud computing learning notes (11) (spanning tree protocol STP and MSTP)

Spanning tree protocol (STP) STP overview Generation of switching network loop Formation of broadcast storm Multiframe copy MAC address table disorder Introduction to STP STP - Spanning Tree Protocol Logically disconnect the loop to prevent broadcast stormWhen the line fails, the blocking interface is activated to restore commu ...

Added by LucienFB on Mon, 25 Oct 2021 07:43:58 +0300

Admission webhook in k8s

preface Kubernetes provides three security access control measures for API access: authentication, authorization and permission control. Authentication solves the problem of who the user is, authorization solves the problem of what the user can do, and permission control plays a role in resource management. Through reasonable authority managem ...

Added by mligor on Wed, 06 Oct 2021 17:49:18 +0300

Day91 ~ 93 PAAS cloud platform_ docker container

Learning objectives Be able to tell the main differences between docker container and virtual machine Be able to name the kernel technology used by docker Able to install docker Master common operations of mirroring Master the construction and use of image warehouse Master common container operation commands Can find docker storage driv ...

Added by kmutz22 on Wed, 06 Oct 2021 01:21:54 +0300

Intranet penetration to quickly realize remote desktop

1. Preface When it comes to remote desktop, you may think of third-party software such as TeamViewer and sunflower However, most of them are commercial software, which is expensive; Even if the free version is provided, there are various restrictions, and the stability and security cannot be guaranteed This article will introduce how to use ...

Added by paul2463 on Fri, 01 Oct 2021 20:30:24 +0300

Deploy K8S via kubedm networking

environmental information roleIPsystemmaster10.4.7.152Ubuntu18.04node10.4.7.162Ubuntu18.04 1. Operating system configuration (both nodes need to execute) Operation node: master, node Disable swap swapoff -a #temporary sed -ri 's/.*swap.*/#&/' /etc/fstab #take/etc/fstab Document swap Line use#Notes (permanently disabled) Turn off ...

Added by MathewByrne on Thu, 02 Sep 2021 10:53:58 +0300