nacos service registration and discovery

nacos service registration Please refer to the previous blog for basic knowledge of nacos and download and installation: nacos installation, operation and feature understanding The topic of this blog: both consumers and producers are registered in nacos, and consumer services can achieve load balancing and call producers. And it shows that the ...

Added by j0hn_ on Sun, 02 Jan 2022 15:22:17 +0200

Using Alibaba cloud's MSE, the last real gray publishing scheme

1. What is MSE Alibaba cloud MSE (Microservices Engine) microservice engine includes the following three main modules: microservice registry, microservice governance and cloud native gateway. The label routing in the microservice governance function can realize the gray function.  2. Gray demand Except for traffic entry (such as pile ...

Added by jera on Sun, 02 Jan 2022 14:35:39 +0200

Create microservices from scratch - full stack - day9

12 user authentication and gateway integration All requests will pass through the service gateway. The service gateway exposes the service to the outside world, carries out unified user authentication at the gateway, and then the gateway sends them to the service; Since you want to authenticate users in the gateway, the gateway needs to kn ...

Added by louis567 on Sat, 01 Jan 2022 01:55:44 +0200

Pytorch torchserve production environment model deployment

We trained a target detection model, wanted to deploy it in the production environment, checked a lot of data, and finally chose TorchServe to deploy it. TorchServe was jointly developed by AWS and Facebook, so I didn't think much about it. There should be nothing wrong with choosing big factories. I stepped on a lot of holes in the process of ...

Added by TobyRT on Fri, 31 Dec 2021 13:02:39 +0200

GoFrame framework: add Prometheus monitoring Middleware

introduceThrough a complete example, Prometheus monitoring middleware is added to the micro service based on GoFrame framework.What is Prometheus monitoring interceptor / Middleware?The monitoring interceptor will record Prometheus Metrics for each API request.We will use rk-boot To start the micro service of GoFrame framework.Please visit the ...

Added by ltoto on Thu, 30 Dec 2021 21:00:37 +0200

Application practice of Day04~Nacos configuration center

Core knowledge points The birth background of the configuration center.The mainstream configuration center in the market.Introduction to Nacos configuration center.Nacos configuration center introduction practice.Configuration management model of Nacos configuration center. Background analysis We know that in addition to the code, the softw ...

Added by zrocker on Thu, 30 Dec 2021 16:05:22 +0200

SpringCloud microservice practice - build an enterprise level development framework: SpringCloud + Docker + k8s realize packaging deployment - packaging configuration of microservice cluster

   SpringCloud microservices contain multiple SpringBoot runnable applications. In a single application, the packaging and deployment during version release is relatively simple. When there are microservices of multiple applications, the original single application deployment method will appear complex and uncontrollable. Then we will ...

Added by FirePhoenix on Thu, 30 Dec 2021 10:01:41 +0200

Dead letter queue and delay queue of RabbitMQ

RabbitMQ dead letter queue and delay queue RabbitMQ itself has the properties of dead letter queue and dead letter switch. Delay queue can be realized through dead letter queue and dead letter switch. In the e-commerce industry, there is usually a demand: if the order is not paid in time out, the order will be cancelled automatically. Then the ...

Added by Aurasia on Sun, 26 Dec 2021 19:41:36 +0200

Gin security chapter-3: fast implementation of CSRF verification

introduceThis article describes how to rk-boot Implement the CSRF verification logic of the server.What is CSRF?Cross Site Request Forgery (English: Cross Site Request Forgery), also known as one click attack or session riding, usually abbreviated as CSRF or XSRF, is an attack method to coerce users to perform unintentional operations on the cu ...

Added by irwa82 on Sun, 26 Dec 2021 15:10:41 +0200

Architecture learning path

brief introduction Architecture: software architecture is an abstract description of the overall software architecture and components, which is used to guide the design of all aspects of large-scale software systems; Excellent performance, strong TPS/QPS carrying capacity and high availability determine how much PV traffic you can support; du ...

Added by dast on Thu, 23 Dec 2021 08:46:37 +0200