MongoDB 3.0.6 Start script, user management, import and export Libraries
Preface: Installation steps, please check This blog(https://blog.csdn.net/tingfengqianqu/article/details/101381150)
1. Import database
1) Modify configuration files
Before importing data, you need to annotate the password authentication of mongodb.conf, and you cannot execute the mongodb service befor ...
Added by Jeyush on Mon, 30 Sep 2019 13:11:08 +0300
How to Deploy Application Management/Publishing System Spinnaker on Ali Cloud Container Service ACK
Spinnaker is an open source, multi-cloud, continuous delivery platform that helps you manage applications and deliver applications quickly.
Spinnaker's two main functions are: Application management , Application delivery
Applications, clusters, and server groups are very important concepts in Spinnaker. Load balancers and firewalls describe ...
Added by Miichael on Wed, 25 Sep 2019 12:04:30 +0300
Introduction to Spring Boot Vue Element: Practical Spring Boot+Mybatis+Redis+Swagger
This blog is originally created by the author. It is forbidden to reprint without permission. Please respect the originality! If you have any questions, please contact QQ509961766.
(1) Modification of POM files
Open the pom file
First add spring boot dependencies to the top text
<parent>
& ...
Added by kevo1162 on Tue, 24 Sep 2019 09:44:56 +0300
CentOS Deployment Harbor Mirror Warehouse
About Harbor
Harbor is a mirror warehouse service used to store and distribute Docker images. Compared to Docker Registry, Harbor enhances security, identity, management and is more suitable for enterprise use.
Official website: https://goharbor.io/
Official open source: https://github.com/goharbor/harbor
environmental information
The Harbor ...
Added by potatoCode on Sun, 22 Sep 2019 04:41:36 +0300
Common Sorting Algorithms and Their Corresponding Time and Space Complexities
I organize Java advanced materials for free, covering Java, Redis, MongoDB, MySQL, Zookeeper, Spring Cloud, Dubbo, high concurrent and distributed tutorials, a total of 30G, need to collect. Portal: https://mp.weixin.qq.com/s/JzddfH-7yNudmkjT0IRL8Q
Sorting algorithms have evolved over a long period of time, resulting in many different ...
Added by pfchin on Fri, 20 Sep 2019 10:52:46 +0300
PHP Solves Oversell Problem with redis
Preface
In commodity second killing activities, such as commodity inventory is only 100, but in the rush buying activities, there may be 200 people rushing to buy at the same time, so there is concurrence, 100 items of goods under order to complete the inventory of 0, and may continue to order successfully, there is oversold.
To solve this prob ...
Added by selenin on Mon, 16 Sep 2019 09:11:38 +0300
Lifecycle of redis command execution
baiyan
Introduce
First, let's look at a very familiar redis command execution diagram:Think about it then, when we connect to the redis server, enter and execute a redis command, such as set key1 value1.How on earth was this command sent to the redis server, and how did the redis server parse, process, and return to its successful execution?
Cl ...
Added by luuno on Sun, 15 Sep 2019 10:15:30 +0300
php implements redis message publishing subscription
Basic Introduction
Pub/Sub function (means Publish, Subscribe) is the publishing and subscription function
In event-based systems, Pub/Sub is a widely used communication model, which uses events as the basic communication mechanism to provide loosely coupled interaction modes required by large-scale systems: subscribers (such as clients) expre ...
Added by rheroux on Sun, 15 Sep 2019 05:02:13 +0300
Springboot&security Encrypted Login Process Based on Front-end and Back-end Separation of RSA Password
Introduction to RSA Encryption
RSA encryption is an asymmetric encryption. The decryption can be completed without directly transferring the key. This ensures the security of the information and avoids the risk of being cracked by transfer ...
Added by alkhatareykha on Fri, 13 Sep 2019 09:01:14 +0300
Implementation of Distributed Lock Based on Redis
Let's start by describing what problems would be caused to our cache in the case of high concurrency?
1. Cache Breakdown: In the case of high concurrency, when a hot key fails, a large number of requests will be made to access our data, such as when a commodity is killed in seconds.
2. Cache avalanche: refers to a time when a large number of ke ...
Added by belaraka on Mon, 09 Sep 2019 06:21:20 +0300