Spring cloud square development practice (full coverage of three types)
Welcome to my GitHubHere we classify and summarize all the original works of Xinchen (including supporting source code): https://github.com/zq2599/blog_demosOverview of this articleAbove Five minutes to understand spring cloud square It introduces in detail what spring cloud square is and the detailed concepts of three implementation types. Han ...
Added by bryson on Mon, 01 Nov 2021 02:02:50 +0200
Alicloud SMS interface
First of all, I have a rookie. I just studied a few days ago. For wechat payment of small programs, the background is based on ssm. This time, experience the SMS notification after opening and submitting orders. So I took a look at Alibaba cloud. First, open the SMS service. After entering the Alibaba cloud console, search for SMS. You can find ...
Added by Tomcat13 on Sat, 30 Oct 2021 23:12:38 +0300
Problems and solutions in switching back from Typecho to Wordpress
Recently, I transferred this little station that no one visited from Typecho back to Wordpress. There is no special reason. I just changed the host and wanted to toss. Typecho is excellent, but it has not been updated, giving the impression that no one is maintaining it (it seems that a new version will be released soon).
What I have learned a ...
Added by Toot4fun on Wed, 27 Oct 2021 07:44:21 +0300
Cloud computing learning notes (11) (spanning tree protocol STP and MSTP)
Spanning tree protocol (STP)
STP overview
Generation of switching network loop
Formation of broadcast storm Multiframe copy MAC address table disorder
Introduction to STP
STP - Spanning Tree Protocol
Logically disconnect the loop to prevent broadcast stormWhen the line fails, the blocking interface is activated to restore commu ...
Added by LucienFB on Mon, 25 Oct 2021 07:43:58 +0300
Admission webhook in k8s
preface
Kubernetes provides three security access control measures for API access: authentication, authorization and permission control. Authentication solves the problem of who the user is, authorization solves the problem of what the user can do, and permission control plays a role in resource management. Through reasonable authority managem ...
Added by mligor on Wed, 06 Oct 2021 17:49:18 +0300
Day91 ~ 93 PAAS cloud platform_ docker container
Learning objectives
Be able to tell the main differences between docker container and virtual machine Be able to name the kernel technology used by docker Able to install docker Master common operations of mirroring Master the construction and use of image warehouse Master common container operation commands Can find docker storage driv ...
Added by kmutz22 on Wed, 06 Oct 2021 01:21:54 +0300
Intranet penetration to quickly realize remote desktop
1. Preface
When it comes to remote desktop, you may think of third-party software such as TeamViewer and sunflower
However, most of them are commercial software, which is expensive; Even if the free version is provided, there are various restrictions, and the stability and security cannot be guaranteed
This article will introduce how to use ...
Added by paul2463 on Fri, 01 Oct 2021 20:30:24 +0300
Deploy K8S via kubedm networking
environmental information
roleIPsystemmaster10.4.7.152Ubuntu18.04node10.4.7.162Ubuntu18.04
1. Operating system configuration (both nodes need to execute)
Operation node: master, node
Disable swap
swapoff -a #temporary
sed -ri 's/.*swap.*/#&/' /etc/fstab #take/etc/fstab Document swap Line use#Notes (permanently disabled)
Turn off ...
Added by MathewByrne on Thu, 02 Sep 2021 10:53:58 +0300