First, open Tomcat / conf / server XML file, search Executor name = "tomcatThreadPool", open and adjust to:
<Executor name="tomcatThreadPool" namePrefix="catalina-exec-" maxThreads="500" minSpareThreads="20" maxSpareThreads="50" maxIdleTime="60000"/>
Then, modify the < connector... > node, add the executo ...
Added by Sinikka on Thu, 10 Mar 2022 06:14:07 +0200
Official address: https://rocketmq.apache.org/ Installation package download address: https://archive.apache.org/dist/rocketmq/
1, Introduction to rocketmq
RcoketMQ is a message oriented middleware with low latency, high reliability, scalability and ease of use. It has the following characteristics:
Support publish / subscribe (Pub/Sub) a ...
Added by gwledig on Thu, 10 Mar 2022 04:48:50 +0200
Mysql version mysql Ver 8.0.28-0ubuntu0.20.04.3 for Linux on x86_64 ((Ubuntu)) The following are the errors that I will report after uninstalling and installing mysql several times. No matter how to change the configuration file according to the online tutorial, I will eventually report that the local link is rejected. My ...
Added by pbsonawane on Thu, 10 Mar 2022 02:41:13 +0200
CL236 configuring IP failover – CTDB
This section describes how to configure IP failover. This chapter studies CTDB, mainly to solve the problem of high availability of NFS and Samba.
RHCA column address: https://blog.csdn.net/qq_41765918/category_11532281.html
High availability cluster NAS (this section is extracted from Pro ...
Added by synchro_irl on Wed, 09 Mar 2022 17:58:40 +0200
*How to transfer files from Mac to virtual machine:
Connect the host as follows: Transfer file: scp file location and file name root@IP Address: the location where files need to be stored
1. Configure NAT network
Note: change the network adapter of vm to NAT mode
edit /etc/sysconfig/network-scripts/ifcfg-ens33 file
Modified as BOOTPR ...
Added by brandon on Wed, 09 Mar 2022 17:00:28 +0200
Detect and remove XSS (cross site scripting) attacks from text entered through normalization.
Cross site scripting (XSS) attacks are a form of threat that exploits vulnerabilities in Web applications to plunder user information. Using malicious scripts, attackers can attract different users through normally trusted Web pages and access any inf ...
Added by triphis on Wed, 09 Mar 2022 14:30:08 +0200
[quick reference manual of Linux common commands] pay attention to [entry station], and the background replies to "1001" for self access.The netstat command is used to display statistics related to IP, TCP, UDP and ICMP protocols. It is generally used to check the network connection of each port of the machine. Netstat is a program th ...
Added by PowersWithin on Wed, 09 Mar 2022 11:06:54 +0200
[quick reference manual of Linux common commands] pay attention to [entry station], and the background replies to "1001" for self access.
The netstat command is used to display statistics related to IP, TCP, UDP and ICMP protocols. It is generally used to check the network connection of each port of the machine. Netstat is a pro ...
Added by shadiadiph on Wed, 09 Mar 2022 11:01:51 +0200
View and read permissions
I Permission view
ls -l file view file permissions ls -ld dir view directory permissions
II Understanding permissions
File permission information Directory permission information
$: explanation for each digit  File type
l Soft connection
b Fast equipment
c Character device
s sock ...
Added by varzosu on Tue, 08 Mar 2022 22:50:48 +0200