Through the previous article Istio Sidecar injection principle It can be found that the Sidecar application has been injected at the same time when the application is submitted to the kubernate deployment.
If you are careful, you can also find that in addition to the application of istio proxy, there is also an Init Containers of istio ...
Posted by virtual_odin on Wed, 27 May 2020 13:02:34 +0200
DDoS deflate is a very small tool for defense and mitigation of DDoS attacks. It can create a large number of IP address information of Internet connection by monitoring netstat, and prohibit or block these non IP addresses through IPTABLES.
It must be downloaded and installed in the terminal account under root authority. The specific commands ...
Posted by vurentjie on Fri, 22 May 2020 16:45:29 +0200
2, Backup service (rsync)
(1) rsync service introduction
Rsync is an open source, fast, multi-functional, full and incremental local or remote data synchronization backup tool. And it can realize the backup and migration of data without changing the attribute information of the original data. Rsync software is suitable for unix/linux/windows an ...
Posted by bloodl on Fri, 01 May 2020 18:49:54 +0200
I. The concept of firewalls
Firewall technology is a technology that combines all kinds of software and hardware devices for security management and screening to help computer networks build a relatively isolated protection barrier between their internal and external networks to protect user data and information security.
Professional firewall ...
Posted by Gondwana on Thu, 23 Apr 2020 02:21:08 +0200
Dubbo is a mature and widely used framework.Rao is such that in some extreme cases dubbo-based applications will also have the problem of not being able to reconnect zookeeper.Because this problem is easy to cause relatively large failures, the author has spent a lot of time to locate, and now will write a blog to share the investigatio ...
Posted by rschneid on Tue, 07 Apr 2020 05:02:01 +0200
The initial configuration goals to be achieved in this paper are as follows:
ansible configures ssh secret login;
ansible remote configuration host name;
ansible controls remote hosts to add DNS resolution records to each other;
ansible configures the yum mirror source on the remote host and installs some software;
ansible configures time sy ...
Posted by nigelbashford on Sat, 25 Jan 2020 07:29:46 +0100
(applicable but not limited to the above environment)
1, Enable MySQL remote access
Changing the value of mysql.host field to% means that you can log in to MySQL server on any client machine
mysql> use mysql;
mysql> grant all privileges on *.* ...
Posted by Roger Ramjet on Sat, 04 Jan 2020 14:39:08 +0100
Experimental schematic diagram
Step 1: configure the squid proxy server
#Remote share and mount source package
[root@squid ~]# smbclient -L //192.168.142.1
[root@squid ~]# mount.cifs //192.168.142.1/squid /mnt
#Decompress the source package
[root@squid ~]# cd /mnt
[root@squid mnt]# tar zxvf squid-3.4.6.tar.gz -C /opt
#Install build environm ...
Posted by dinku33 on Tue, 10 Dec 2019 11:39:51 +0100
The forward proxy is a server between the client and the original server. In order to obtain content from the original server, the client sends a request to the proxy and specifies the target (the original server), and then the proxy delivers the request to the original server and returns the obtained content to the client. The client can use ...
Posted by kael.shipman on Fri, 06 Dec 2019 10:53:38 +0100
I. descriptionPrometheus collects the data, and Grafana displays the data. The exporters in Prometheus include:1) Node Exporter is responsible for collecting host hardware and operating system data. It will run as a container on all hosts.2) C advisor is responsible for collecting container data. It will run as a container on all host s.3) Ale ...
Posted by brianlange on Sat, 30 Nov 2019 20:06:29 +0100