Detailed process of springboot framework building

1. Create 1.1 Create a new springboot project, as shown in the figure. 1.2 Select Spring Initializr. 1.3 Fill in Group, Artifact, and Name, where you choose the default, then click next, as shown in the following image. 1.4 Choose the components you want: The basic components are the web and web s ...

Added by Jax2 on Thu, 11 Jun 2020 19:19:20 +0300

Distributed Lock+Redis for Cluster Business Data Caching

Article Directory Distributed Lock 1. Distributed Lock Implementation 2. Distributed Lock Using redis Learning optimization summary Problems in the redis cluster state: Solving distributed locks using redisson 1. Import dependent service-util 2. Configure redisson Reentrant Lock Test Code Dis ...

Added by dev99 on Wed, 10 Jun 2020 19:17:31 +0300

Java implements 23 design patterns: sharing element pattern

Classification of 23 design patterns 1, Overview Definition of Flyweight pattern: using sharing technology to support reuse of a large number of fine-grained objects. It can reduce the number of objects to be created and avoid the cost of a large number of similar classes by sharing the existing o ...

Added by bronzemonkey on Wed, 10 Jun 2020 07:10:32 +0300

django user authentication component auth

brief introduction django provides a very useful component which is responsible for the full set of functions of user login authentication, which is the auth component. With the auth component, we no longer need to manually write the login check decorator, nor set session s manually to save user state. The django project executes the databas ...

Added by oughost on Wed, 10 Jun 2020 04:51:49 +0300

CSS_ Necessary knowledge of back-end Engineer - from entry to detailed explanation of dissuasion - painstaking writing (funny)

Article catalog 1, CSS introduction 2, Grammatical format 3, How to use CSS 1. Embedded 2. Outer chain 3. Line style 4. Three style priorities and application scenarios 4, Selector 1. Basic selector 1. All tuple selection 2. Label selector 3. id selector 4. Class selector 5. Overall operation cod ...

Added by rsnell on Tue, 09 Jun 2020 05:00:57 +0300

Page Search Box Date Search Criteria Data to Background Type Conversion (Timestamp)

The date type defined by the background database is Long, which is stored as a time stamp; the date type of the search box on the page is String.The String and Long types of dates are not equal on time stamps! I show you how to convert date types in my code, and you can understand the difference between debug and timestamp converters.     1. Fi ...

Added by zahadum on Mon, 08 Jun 2020 19:15:00 +0300

Kettle and Hadoop perform Sqoop jobs

catalog 1, Sqoop export 2, Sqoop import 1, Sqoop export 1. Create a job to export the HDFS file to the MySQL database. (1) Open PDI and create a new job, as shown in Figure 1. Figure 1   (2) Edit the 'Sqoop export' job item, as shown in Figure 2. Figure 2 Description: CDH631 is a buil ...

Added by cloudhybrid on Mon, 08 Jun 2020 06:13:45 +0300

Database idle connection disconnection caused by firewall

catalog 1, Problem description 2, Step by step analysis of problems 1, java.net.SocketException : how is the broken pipe exception generated? What's the impact? 2. Why is the database TCP connection broken? 3. The effect of firewall cutting off database connection 3, Solutions 1. Adjust the cut-of ...

Added by Popcorn on Fri, 05 Jun 2020 10:51:02 +0300

An elastic search to use and synchronize data

1, Background ES is a distributed search framework. It can quickly query data, mainly including elastic search, kibana (a web interface used to query es data) Where does the data come from? Of course, it comes from the database or inserts into ES one by one. So this time, the requirement is to impo ...

Added by apollyon on Thu, 04 Jun 2020 16:50:17 +0300

SpringSecurity - Authentication + Authorization Code Implementation

Authentication + Authorization Code Implementation Spring Security is a security framework based on Spring AOP and Servlet filters.It provides a comprehensive security solution while handling authentication and authorization at the Web request and method call levels. Previously, I blogged about the theory of authentication and authorization ...

Added by john_nyc on Thu, 04 Jun 2020 04:08:57 +0300