Background: Online migration of the current ES cluster to a new machine Current: ES designs a load balancing mechanism for cluster fragmentation. When new nodes join or leave the cluster, the cluster will automatically balance the load distribution of fragmentation Migration target: smooth migration Migration strategy: Turning off cluster auto ...
Added by bbristow on Mon, 07 Mar 2022 22:39:08 +0200
View ifconfig of docker server
docker network principle
Docker uses Linux bridging. A docker container bridge (docker0) is virtualized in the host. When docker starts a container, it will assign an IP address to the container according to the network segment of docker bridge, which is called container IP. At the same time, docker bridge ...
Added by wolfrock on Mon, 07 Mar 2022 19:56:59 +0200
View is a virtual table (non real). Its essence is to obtain a dynamic data set according to SQL statements and name it. When using, users only need to use the name to obtain the result set, which can be used as a table.
Using the view, we can pick out the temporary table in the query process and implement it with the view. In t ...
Added by narked on Mon, 07 Mar 2022 19:30:05 +0200
Freemaker generates word templates
1, Introduce dependency
2, Tool class
Note: for the attribute of Configuration configuration, in some cases, the file grammar wil ...
Added by mesh2005 on Mon, 07 Mar 2022 18:53:14 +0200
What is RPC?
Remote service callOfficial: the idea of requesting services from remote computer programs through the network without understanding the underlying network technologyA little more popular: without knowing the details of the call, the client calls an object that exists on the remote computer, just like calling an objec ...
Added by donald on Sun, 06 Mar 2022 16:46:07 +0200
GoLang's slice bottom layer and expansion rules
In the first part, where are the elements stored? In the second part, how many elements are stored and how many elements can be stored
2. Variable declaration int type slice
For example, declare an  int, and the variable ints is composed of three parts on the right. The el ...
Added by ChrisDarl on Sat, 05 Mar 2022 14:07:33 +0200
SQL, namely structured query language, is a database query and programming language, which is used to access data and query, update and manage relational database system; SQL language is the widely used standard language of relational database and the basis of various database interaction methods. The following will show how to use SQL to acces ...
Added by cmaclennan on Sat, 05 Mar 2022 12:31:30 +0200
1. Introduction to Shiro
Apache Shiro is an open source security framework that provides authentication, authorization, cryptography, and session management. Shiro framework is intuitive and easy to use. At the same time, it can also provide robust security. Although its function is not as powerful as spring security, it is still enough in ord ...
Added by DimArchon84 on Sat, 05 Mar 2022 08:21:46 +0200
Method of modifying root password in MySQL
As the first barrier to database security, the root account and its password. Learning to manage the root password is undoubtedly a basic skill for the gatekeeper and the unlocking man.
Know the password
When the password is known, you can log in to the MySQL database and modify it through alter ...
Added by mattcooper on Sat, 05 Mar 2022 03:30:32 +0200