SST import without dependency on Nebula Exchange

This article tries to share the steps of SST writing in Nebula Exchange in a minimum way (stand-alone, containerized Spark, Hadoop and Nebula Graph). This article applies to v2 5 or above versions of Nebula Exchange. Original link: Foreign visits: https://siwei.io/nebula-exchange-sst-2.x/ Domestic visits: https://cn.siwei.io/nebula-exc ...

Posted by R0bb0b on Fri, 04 Mar 2022 20:21:59 +0100

Enhancing Kubernetes network security with Cilium

TL;DR In this article, we use Kubernetes' native network strategy and Cilium's network strategy to realize the isolation of Pod network level. The difference is that the former only provides the network strategy based on L3/4; The latter supports L3/4 and L7 network policies. Improving network security through network strategy can greatly r ...

Posted by AQHost on Wed, 16 Feb 2022 11:50:17 +0100

Istio 1.6.3 release - new features and quick installation

Istio 1.6.3 released. Istio is an open source project jointly developed by Google, IBM and Lyft, aiming to provide a unified way of microservice connection, security, management and monitoring. Specifically, istio is an open source services grid platform, which ensures that microservices are interconnected in a specified way when they handle ...

Posted by Sephirangel on Tue, 23 Jun 2020 10:15:27 +0200

Enterprise practice (13) details of LVS load balancing DR (direct routing) mode

What is cluster A group of computers interconnected by a high-speed network and managed in a single system mode. Many servers are put together to provide the same service, which looks like only one server in the client. It can obtain relatively high benefits in performance, reliability and flexibilit ...

Posted by sone_br on Mon, 22 Jun 2020 07:03:24 +0200

Mechanism and implementation of wechat domain name detection

<!-- /\* Font Definitions \*/ @font-face {font-family:Tahoma; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 680460288 22 0 262145 0;} @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:1; mso-gener ...

Posted by mr00047 on Fri, 12 Jun 2020 09:27:30 +0200

Server is implanted into Trojan horse, CPU soars 200%

Author: my name is Liu Banxianhttps://my.oschina.net/liughDevelop/blog/1786631 The online server uses a certain cloud, running the Tomcat, MySQL, MongoDB, ActiveMQ and other programs happily and perfectly. Suddenly a bad news came from the front: the website can't be accessed! I am in charge of this project. I immediately opened the server at ...

Posted by WeAnswer.IT on Fri, 12 Jun 2020 05:43:47 +0200

Go Daily library twirp

brief introduction twirp Is a RPC framework based on Google Protobuf.Trp automatically produces server and client code by defining the service in the.proto file.Let's focus more on business logic.Huh?Isn't this gRPC?Unlike gRPC, which implements its own set of HTTP servers and network transport layers, twirp uses the standard library net/http.I ...

Posted by om.bitsian on Wed, 10 Jun 2020 19:04:20 +0200

Collection artifact, Octopus Automatic Grab strategy and warehousing operation!

Collect a lot of anti - Crawler sites, there is a very good tool: Octopus... Directly through the browser access, a force to break ten thousand methods Preparatory work: money, spend money to buy members of Octopus website for a month or more, so that you can do Cloud Collection Next, grab the data by yourself. After the grab, set the timing ...

Posted by christillis on Tue, 02 Jun 2020 17:02:35 +0200

Istio police agent & envoy start process

Opening Through the previous article Istio Sidecar injection principle It can be found that the Sidecar application has been injected at the same time when the application is submitted to the kubernate deployment. If you are careful, you can also find that in addition to the application of istio proxy, there is also an Init Containers of istio ...

Posted by virtual_odin on Wed, 27 May 2020 13:02:34 +0200

Docker data volume of container technology

In the previous essay, we learned about docker's network related instructions. Please refer to https://www.cnblogs.com/qiuhom-1874/p/12952616.html Today, let's talk about docker's data management instructions; In the previous blog, we emphasized that the image of docker is built hierarchically. After the image is started as a container, docker ...

Posted by Kinsbane on Mon, 25 May 2020 13:00:27 +0200