Installing Oracle 19C with CentOS 7

#oracle19c Oracle 19C download address Baidu online disk link: https://pan.baidu.com/s/1mtsWs3dibid4vwFwuv08iQ Extraction code: poi2 Install dependent packages [root@karms ~]# cat /etc/redhat-release CentOS Linux release 7.0.1406 (Core)[root@karms ~]# yum install -y compat-libcap1 compat-libstdc++-33 gcc-c++ ksh libaio-devel libstdc++-deve ...

Added by gtibok on Tue, 08 Mar 2022 00:59:17 +0200

ES migration scheme

Background: Online migration of the current ES cluster to a new machine Current: ES designs a load balancing mechanism for cluster fragmentation. When new nodes join or leave the cluster, the cluster will automatically balance the load distribution of fragmentation Migration target: smooth migration Migration strategy: Turning off cluster auto ...

Added by bbristow on Mon, 07 Mar 2022 22:39:08 +0200

Basic operation network docker

View ifconfig of docker server docker network principle Docker uses Linux bridging. A docker container bridge (docker0) is virtualized in the host. When docker starts a container, it will assign an IP address to the container according to the network segment of docker bridge, which is called container IP. At the same time, docker bridge ...

Added by wolfrock on Mon, 07 Mar 2022 19:56:59 +0200

View, trigger, stored procedure, function, process control, transaction

1, View View is a virtual table (non real). Its essence is to obtain a dynamic data set according to SQL statements and name it. When using, users only need to use the name to obtain the result set, which can be used as a table. Using the view, we can pick out the temporary table in the query process and implement it with the view. In t ...

Added by narked on Mon, 07 Mar 2022 19:30:05 +0200

Freemaker generates word templates

Freemaker generates word templates 1, Introduce dependency <dependency> <groupId>org.freemarker</groupId> <artifactId>freemarker</artifactId> <version>2.3.28</version> </dependency> 2, Tool class Note: for the attribute of Configuration configuration, in some cases, the file grammar wil ...

Added by mesh2005 on Mon, 07 Mar 2022 18:53:14 +0200

Roll it up and take you to write a distributed RPC framework that middle and senior programmers will know

I summary What is RPC? Remote service callOfficial: the idea of requesting services from remote computer programs through the network without understanding the underlying network technologyA little more popular: without knowing the details of the call, the client calls an object that exists on the remote computer, just like calling an objec ...

Added by donald on Sun, 06 Mar 2022 16:46:07 +0200

GoLang's slice bottom layer and expansion rules

GoLang's slice bottom layer and expansion rules 1. Structure In the first part, where are the elements stored? In the second part, how many elements are stored and how many elements can be stored 2. Variable declaration int type slice For example, declare an [] int, and the variable ints is composed of three parts on the right. The el ...

Added by ChrisDarl on Sat, 05 Mar 2022 14:07:33 +0200

[must see] this article is enough for a complete collection of SQL statements

SQL, namely structured query language, is a database query and programming language, which is used to access data and query, update and manage relational database system; SQL language is the widely used standard language of relational database and the basis of various database interaction methods. The following will show how to use SQL to acces ...

Added by cmaclennan on Sat, 05 Mar 2022 12:31:30 +0200

Day03 Shiro study notes

1. Introduction to Shiro Apache Shiro is an open source security framework that provides authentication, authorization, cryptography, and session management. Shiro framework is intuitive and easy to use. At the same time, it can also provide robust security. Although its function is not as powerful as spring security, it is still enough in ord ...

Added by DimArchon84 on Sat, 05 Mar 2022 08:21:46 +0200

Methods, common problems and solutions of modifying root password in MySQL

Method of modifying root password in MySQL As the first barrier to database security, the root account and its password. Learning to manage the root password is undoubtedly a basic skill for the gatekeeper and the unlocking man. Know the password When the password is known, you can log in to the MySQL database and modify it through alter ...

Added by mattcooper on Sat, 05 Mar 2022 03:30:32 +0200