Istio traffic hijacking process
Opening
The article about Istio traffic hijacking can be found in a very detailed article in the servicemesher community at present. You can refer to: Sidecar injection and transparent traffic hijacking in Istio . In particular, the "traffic hijacking diagram" collated by the blogger can clearly see the hijacking process. Here I use ...
Added by river001 on Fri, 29 May 2020 09:27:35 +0300
A concise guide to firewall D on Linux
Firewall D is the front-end controller of iptables, which is used to implement persistent network traffic rules.
It provides command line and graphical interfaces, which are available in the repositories of most Linux distributions. There are two main differences between using firewall D and controlling iptables directly:
Firewall D uses zone ...
Added by 01706 on Thu, 28 May 2020 07:10:56 +0300
suricata uses pfring to monitor multiple network cards for error analysis and resolution
Problem scenarios
We use Suricata for traffic analysis. Suricata is deployed on a 48-core physical machine with a multi-network card. Due to business needs, suricata's network card for monitoring traffic has been upgraded from 5 to 6, enp176s0f1 has been added, and several similar errors have been found in suricata's log:
<Error> - [ERRC ...
Added by pandaweb on Tue, 26 May 2020 21:51:27 +0300
Alibaba SMS callback. net sdk bug causes 100% troubleshooting of production service CPU
1: Background
1. Story telling
Last year, all the isv short message channels on the Jushi tower of Ali connected to Ali communication. We made a connection transformation and used the. net sdk provided by Ali.
website: https://help.aliyun.com/document_detail/114480.html
Colleagues used ons -. Net In v1.1.3, there will be a program crash a few ...
Added by youwh on Tue, 26 May 2020 14:08:29 +0300
Java Concurrent dry goods: let you understand the producer consumer problem
Source network, only for learning, if there is infringement, please contact delete.
Producer consumer model is a very classic model of multithreading concurrent cooperation. Understanding the producer consumer problem can deepen our understanding of concurrent programming.
The so-called producer consumer problem, in fact, mainly contains two ...
Added by duall on Tue, 26 May 2020 13:41:25 +0300
Linux command (22) useradd command
useradd command
Function Description: add user or update default new user information
Usage: useradd [options] login_name
option
explain
-u,--uid UID
When adding a new user, specify the UID number manually. The default is the UID+1 of the previous user, the UID usage range (CentOS6) 500 +, (CentOS7) 1000+
-g,--gid group_name
When a ...
Added by j152 on Mon, 25 May 2020 14:46:35 +0300
How to deal with the problem that the cloud server cannot access the database remotely after it is installed
Today, my colleague said that a new cloud server is installed, and it is normal to log in Using ssh, but the above service port of Dayun database cannot be accessed.
Using netstat ANP to view the port is normal to listen, and the listening address is also allowed to be accessed by any ip
And the firewall and iptables are both closed
I was also ...
Added by Maskeeper on Sun, 24 May 2020 15:00:06 +0300
Sharing of learning notes in uni
Table of contents
01. Summary of problems encountered
02. About layout settings
03. Basic grammar summary
04. About interaction
06. About returning data
07. About network requests
08. About page refresh
09. Notes
10. To be solved and considered
01. Summary of problems encountered
In my page, there is a problem defining the class of view as l ...
Added by astaroth on Sun, 24 May 2020 05:12:06 +0300
Tungsten Fabric Starter's book about cluster updates
Tungsten Fabric Starter Series articles, which are compiled and presented by the TF Chinese community, are from the hands-on experience of technology bulls. They are designed to help novices gain a better understanding of the whole process of TF operation, installation, integration, debugging, etc.If you have relevant experience or quest ...
Added by anand on Sat, 23 May 2020 10:25:19 +0300
2018-ECCV-Progressive Neural Architecture Search-Paper Reading
PNAS
2018-ECCV-Progressive Neural Architecture Search
Johns Hopkins University & Google AI & Stanford
GitHub: 300+ stars
Citation: 504
Motivation
current techniques usually fall into one of two categories: evolutionary algorithms(EA) or reinforcement learning(RL).
Although both EA and RL methods have been able to lea ...
Added by dorgon on Sat, 23 May 2020 05:56:09 +0300