docker container network
docker container network
Docker automatically provides three networks after installation and can be viewed using the docker network ls command
[root@localhost ~]# docker network ls
NETWORK ID NAME DRIVER SCOPE
9692fae45042 bridge bridge local
cd5368439dc0 host host local
c49a1db81682 none null local ...
Added by severndigital on Sat, 04 Dec 2021 04:02:03 +0200
docker container network management
1. Virtualized Networks
Network Namespace is a function provided by the Linux kernel and an important function for network virtualization. It can create multiple isolated network spaces, which have their own network stack information. Whether it's a virtual machine or a container, it runs as if it's all in a separate network. And the resou ...
Added by csplrj on Fri, 03 Dec 2021 19:43:38 +0200
docker single host network type
As a small note reference!!!
This article mainly writes the docker single host network type none host container bridge
The first three are simple. Finally, I will talk about the bridge network in detail
When docker is installed, three different networks will be created by default:
[^_^] kfk ~# docker network ls
NE ...
Added by ollie007 on Thu, 02 Dec 2021 00:29:39 +0200
Methods of crawling network requests using jsup (java,post,get, proxy IP)
Original link: https://www.cnblogs.com/blog5277/p/9334560.html
Original author: blog Garden -- Qugao end and widowhood
See the original link above****************
When you use crawlers at work, you will encounter the following problems:
1. Anti crawler mechanism of the website (verification code, IP sealing, poisoning, js dynamic rendering ...
Added by harristweed on Wed, 01 Dec 2021 18:46:08 +0200
How long have you not seen the stars? [climb all the pictures on NASA's popular science website]
1. Summary of prospects
When surfing the Internet, I saw that NASA had a popular science website with a popular science picture every day, which was very high-definition. I wanted to download it to make wallpaper.
So I'm going to write a Java crawler to crawl all the pictures. I can also add some notifications to check every night. When an up ...
Added by Ammar on Wed, 01 Dec 2021 02:36:40 +0200
Installation and deployment of Ansible
1. Installation of Ansible
epel source dnf install ansible -y ansible --viersion
Basic information of ansible: /etc/ansible/ansible.conf ## Global configuration file, rarely modified by default /etc/ansible/hosts &nb ...
Added by damnsaiyan on Mon, 29 Nov 2021 16:17:02 +0200
[Java Foundation] 22 Network Programming
Network-related concepts
TCP and UDP
TCP Protocol: Transport Control Protocol
Before using TCP protocol, TCP connection must be established to form transmission data channelIt is reliable to shake hands three times before transmissionTwo application processes for TCP protocol communication: client and serverLarge amount of data can be transf ...
Added by dhope on Mon, 29 Nov 2021 01:12:52 +0200
I/O model - > Java BIO
I/O model
Java BIO programming
1. Basic description of the model
The simple understanding of I/O model is that what channel is used to send and receive data, which largely determines the performance of program communication.Java supports three network programming model I/O modes: BIO, NIO and AIOJava BIO: synchronous and blocking (traditiona ...
Added by jmcc on Fri, 26 Nov 2021 09:40:50 +0200
Java uses Hutool tool to complete encryption and decryption
explain
POM
When using Hutool encryption and decryption tool, the following dependencies are introduced
Copy code behind code
<dependency>
<groupId>cn.hutool</groupId>
<artifactId>hutool-crypto</artifactId>
<version>5.7.15</version>
</dependency>
Symmetric encryption and asymmetri ...
Added by NovaArgon on Wed, 24 Nov 2021 22:18:19 +0200
Concurrent programming case: high performance current limiter Guava RateLimiter
Guava is Google's open source Java class library, which provides a tool class RateLimiter. Let's take a look at the use of RateLimiter to give you a sensory impression of current limiting. Suppose we have a thread pool, which can only process two tasks per second. If the task submitted is too fast, it may lead to system instability. At this tim ...
Added by mirana on Tue, 23 Nov 2021 18:43:40 +0200