elasticsearch 7.7 add user name and password authentication

1. First of all, I do not need to install x-pack separately when the ES version of single instance and single node is 7.7 { "name" : "node-1", "cluster_name" : "myes", "cluster_uuid" : "OGiYluA_Sxynl2bXl1TcbQ", "version" : { "number" : "7.7.0", "build_flavor" : "default", "build_type" : "rpm", "build_hash" : "81 ...

Added by bimo on Mon, 18 May 2020 17:24:39 +0300

LXC of Container Technology

What is a container?In life, our common containers are all kinds of bottles, jars and jars, all kinds of things that can hold other materials are called containers. The characteristics of containers are that they have a good isolation function, which makes different materials isolated from each other. In addition, containers are convenient to t ...

Added by bbbaldie on Sat, 16 May 2020 19:21:00 +0300

fork function and vfork function

fork function In many applications, creating multiple processes is an effective method for task decomposition. For example, a network server process can create a new subprocess to process each request while listening for client requests. At the same time, the server process will continue to listen for more client connection requests. Decomposin ...

Added by vinny69 on Wed, 13 May 2020 07:56:54 +0300

MySQL 8.0 InnoDB supports instant add column

Original address: https://mysqlserverteam.com/mysql-8-0-innodb-now-supports-instant-add-column/   For a long time, instant DDL has been one of the most popular InnoDB functions. For the growing and fast-growing data set, any network scale database must have the function of executing DDL immediately. Developers often need to add new columns to m ...

Added by coolfool on Tue, 12 May 2020 16:55:02 +0300

Python co programming practice

On Synergetic process   a collaboration is simply a more lightweight thread that is not managed by the operating system kernel and is completely controlled by the program (executed in user mode). A co program is interruptible within a subroutine, and then switches to other subroutines, returning when appropriate to continue execution. Ad ...

Added by Justin L H on Fri, 08 May 2020 20:28:18 +0300

Introduction to machine learning for programmers

This article will focus on some common skills in the process of machine learning training with Python. Mastering them can make you get twice the result with half the effort. Most of the code used will be based on the last example in the previous article, which is to predict wages according to the conditions of farmers A kind of , if you haven' ...

Added by walshd on Fri, 08 May 2020 09:52:13 +0300

Calico Policy Demo

Total Catalog Index: K8s Network Calico From Getting Started to Abandoning Series 1. Create Front End, Back End, Client and Manage User Interface Applications kubectl create -f https://docs.projectcalico.org/security/tutorials/kubernetes-policy-demo/manifests/00-namespace.yaml kubectl create -f https://docs.projectcalico.org/security/tutorial ...

Added by garrisonian14 on Fri, 08 May 2020 03:30:39 +0300

Take a quick look at Nginx

1, Basic knowledge of Nginx 1. What is Nginx? Nginx is an open source, lightweight, high-performance HTTP server and reverse proxy server.It is characterized by less memory and strong concurrency. 2. What does Nginx do? It can be used as an HTTP server to access and publish websites.It can also be used as a reverse proxy server to achieve load ...

Added by marian on Thu, 07 May 2020 14:43:36 +0300

De1ctf 2020 web [hard ﹣ pentest ﹣ 1] character free injection & SYSVOL restore group policy password

Open the source code directly, see that it is a file upload, check the file size and pass a Check() function judgment, and take a look at the Check() function function Check(){ $BlackExts = array("php"); $ext = explode(".", $_FILES["file"]["name"]); $exts = trim(end($ext)); $file_content = file_get_contents($_FILES["file"]["tmp ...

Added by mrjameer on Thu, 07 May 2020 10:23:40 +0300

The method of modifying and listening IP address in oracle

Modifying and listening IP address of oracle Reference and combine these two blogs Modifying and listening IP address of oracle Oracle modify listening IP address In a very simple way, the problem of monitoring is solved. Now let's combine and rearrange it 1. In cmd, enter hostname discovery hostname 2. Modify the ...

Added by ubunken on Tue, 05 May 2020 23:03:59 +0300