Explanation of Oauth Authorization Code-Php Oauth2 Implementation

> What is Oauth2? Oauth is an Open Network Identity. The current version is 2.0, so it is called Oauth2. > Why use Oauth2? For example, if you want to log on to XX website, but XX website needs to register, it is very troublesome, and if all websites need to log on, it is very difficult to remember, then if we only register a website, oth ...

Added by scanreg on Sun, 07 Jul 2019 00:48:49 +0300

Notes on Basic Learning Day 03

Android Foundation Day 3 1 Database Creation under Android When do we use databases for data storage? When large amounts of data with the same structure need to be stored. MySQL SQL Server 2000 SQLite embedded lightweight SqliteOpenHelper Create a database step: 1. To create a class integration SqliteOpenHelper, you need to add a constru ...

Added by phpmady on Sat, 06 Jul 2019 22:17:39 +0300

MySQL MHA High Availability Scheme

introduce MHA (Master High Availability) is currently a relatively mature solution to MySQL high availability. It is a set of excellent high availability software as fault handover and master-slave promotion in MySQL high availability environment. In the process of MySQL fault switching, MHA can automatically complete the database fault swi ...

Added by budder on Sat, 06 Jul 2019 02:18:30 +0300

CentOS7 installs MySQL database

How to install MySQL under Linux 1. Download MySQL: Official Website https://www.mysql.com/ Click Downlosas, turn to the bottom of the page, download the community version, go all the way, select Universal Linux, download the 64-bit one, pay attention to checking MD5 Value. 2. Install the key steps and post the command directly [roo ...

Added by Joshua F on Sat, 06 Jul 2019 01:21:16 +0300

Mysql Learning Notes (6) - Stored Procedures

Catalog: 1. What is a stored procedure Two. Six Stored Procedures 1. Stored procedures with input parameters 2. Stored procedures with output parameters 3. Stored procedures with input and output parameters 4. Stored Procedures with Conditional Judgement 5. Stored Procedures with Looping Procedures 6. Use the results of the query a ...

Added by dotsc on Fri, 05 Jul 2019 19:26:14 +0300

Easily deploy your PHP7 runtime environment on the server

brief introduction Sometimes the installation and deployment of the server, each time in some process, forgot to always find out the previous notes, now the whole process will be sorted out. This is Centos 7.2, which will help you to spend less time looking for notes in the future. Blog Address My github address Welcome your attention Servi ...

Added by codygoodman on Fri, 05 Jul 2019 04:03:16 +0300

Xtrabackup backup recovery

Xtrabackup description and installationXtrabackup description and installationFull backup and recovery of XtrabackupFull and incremental backup and recovery of XtrabackupIV. Partial Completeness, Increment and Recovery of XtrabackupXtrabackup description and installation1. Introduction and description of XtrabackupPercona XtraBackup is the only ...

Added by toro04 on Thu, 04 Jul 2019 20:43:53 +0300

In a master-slave environment, if the master library hangs, how to elect a slave library as the master library?

In a master-slave environment, if the master library hangs, how to elect a slave library as the master library?As shown in the figure:If M hangs, how do I elect a slave library from S1 and S2 as the master library?Solutions to Traditional Reproduction(1) View the status of slave libraries:S1: show slave status;S2: show slave status;root@local ...

Added by shinagawa on Wed, 03 Jul 2019 22:07:38 +0300

Learning docker from scratch Introduction to Docker Compose

We start with this section with a very important tool, Docker Compose, which is used frequently. Let's start with a case study of why we use Docker Compose. Case study: How do I deploy a WordPress via a container? Now pull WordPress locally: docker pull wordpress docker image ls REPOSITORY TAG IMAGE ID ...

Added by mlavwilson on Wed, 03 Jul 2019 19:50:25 +0300

RSyslog+Log Analyzer Log Collection System for Linux

Introduction to Log AnalyrThe Log Analyzer tool provides an easy-to-use, powerful front-end for searching, viewing and analyzing network activity data, including system logs, event logs and many other log sources. Since it only presents data to our users, the data itself needs to be collected by another program, such as syslogd, rsyslog (now th ...

Added by Hitoshi on Wed, 03 Jul 2019 02:04:59 +0300