Istio traffic hijacking process

Opening The article about Istio traffic hijacking can be found in a very detailed article in the servicemesher community at present. You can refer to: Sidecar injection and transparent traffic hijacking in Istio . In particular, the "traffic hijacking diagram" collated by the blogger can clearly see the hijacking process. Here I use ...

Added by river001 on Fri, 29 May 2020 09:27:35 +0300

A concise guide to firewall D on Linux

Firewall D is the front-end controller of iptables, which is used to implement persistent network traffic rules. It provides command line and graphical interfaces, which are available in the repositories of most Linux distributions. There are two main differences between using firewall D and controlling iptables directly: Firewall D uses zone ...

Added by 01706 on Thu, 28 May 2020 07:10:56 +0300

suricata uses pfring to monitor multiple network cards for error analysis and resolution

Problem scenarios We use Suricata for traffic analysis. Suricata is deployed on a 48-core physical machine with a multi-network card. Due to business needs, suricata's network card for monitoring traffic has been upgraded from 5 to 6, enp176s0f1 has been added, and several similar errors have been found in suricata's log: <Error> - [ERRC ...

Added by pandaweb on Tue, 26 May 2020 21:51:27 +0300

Alibaba SMS callback. net sdk bug causes 100% troubleshooting of production service CPU

1: Background 1. Story telling Last year, all the isv short message channels on the Jushi tower of Ali connected to Ali communication. We made a connection transformation and used the. net sdk provided by Ali. website: https://help.aliyun.com/document_detail/114480.html Colleagues used ons -. Net In v1.1.3, there will be a program crash a few ...

Added by youwh on Tue, 26 May 2020 14:08:29 +0300

Java Concurrent dry goods: let you understand the producer consumer problem

Source network, only for learning, if there is infringement, please contact delete. Producer consumer model is a very classic model of multithreading concurrent cooperation. Understanding the producer consumer problem can deepen our understanding of concurrent programming. The so-called producer consumer problem, in fact, mainly contains two ...

Added by duall on Tue, 26 May 2020 13:41:25 +0300

Linux command (22) useradd command

useradd command Function Description: add user or update default new user information Usage: useradd [options] login_name option explain -u,--uid UID When adding a new user, specify the UID number manually. The default is the UID+1 of the previous user, the UID usage range (CentOS6) 500 +, (CentOS7) 1000+ -g,--gid group_name When a ...

Added by j152 on Mon, 25 May 2020 14:46:35 +0300

How to deal with the problem that the cloud server cannot access the database remotely after it is installed

Today, my colleague said that a new cloud server is installed, and it is normal to log in Using ssh, but the above service port of Dayun database cannot be accessed. Using netstat ANP to view the port is normal to listen, and the listening address is also allowed to be accessed by any ip And the firewall and iptables are both closed I was also ...

Added by Maskeeper on Sun, 24 May 2020 15:00:06 +0300

Sharing of learning notes in uni

Table of contents 01. Summary of problems encountered 02. About layout settings 03. Basic grammar summary 04. About interaction 06. About returning data 07. About network requests 08. About page refresh 09. Notes 10. To be solved and considered 01. Summary of problems encountered In my page, there is a problem defining the class of view as l ...

Added by astaroth on Sun, 24 May 2020 05:12:06 +0300

Tungsten Fabric Starter's book about cluster updates

Tungsten Fabric Starter Series articles, which are compiled and presented by the TF Chinese community, are from the hands-on experience of technology bulls. They are designed to help novices gain a better understanding of the whole process of TF operation, installation, integration, debugging, etc.If you have relevant experience or quest ...

Added by anand on Sat, 23 May 2020 10:25:19 +0300

2018-ECCV-Progressive Neural Architecture Search-Paper Reading

PNAS 2018-ECCV-Progressive Neural Architecture Search Johns Hopkins University & Google AI & Stanford GitHub: 300+ stars Citation: 504 Motivation current techniques usually fall into one of two categories: evolutionary algorithms(EA) or reinforcement learning(RL). Although both EA and RL methods have been able to lea ...

Added by dorgon on Sat, 23 May 2020 05:56:09 +0300