CentOS7 Configuration Firewall

I. The concept of firewalls Firewall technology is a technology that combines all kinds of software and hardware devices for security management and screening to help computer networks build a relatively isolated protection barrier between their internal and external networks to protect user data and information security. Professional firewall ...

Posted by Gondwana on Thu, 23 Apr 2020 02:21:08 +0200

Solve Bug Path - dubbo apps cannot reconnect zookeeper

Preface Dubbo is a mature and widely used framework.Rao is such that in some extreme cases dubbo-based applications will also have the problem of not being able to reconnect zookeeper.Because this problem is easy to cause relatively large failures, the author has spent a lot of time to locate, and now will write a blog to share the investigatio ...

Posted by rschneid on Tue, 07 Apr 2020 05:02:01 +0200

Anible Notes - Batch Initialization Server

The initial configuration goals to be achieved in this paper are as follows: ansible configures ssh secret login; ansible remote configuration host name; ansible controls remote hosts to add DNS resolution records to each other; ansible configures the yum mirror source on the remote host and installs some software; ansible configures time sy ...

Posted by nigelbashford on Sat, 25 Jan 2020 07:29:46 +0100

MySQL open remote access complete solution

Applicable environment MySQL 5.7 Ubuntu 16.04 (applicable but not limited to the above environment) 1, Enable MySQL remote access Changing the value of mysql.host field to% means that you can log in to MySQL server on any client machine mysql> use mysql; Database changed mysql> grant all privileges on *.* ...

Posted by Roger Ramjet on Sat, 04 Jan 2020 14:39:08 +0100

Squid proxy application (traditional and transparent)

Experimental schematic diagram Step 1: configure the squid proxy server #Remote share and mount source package [root@squid ~]# smbclient -L //192.168.142.1 [root@squid ~]# mount.cifs //192.168.142.1/squid /mnt #Decompress the source package [root@squid ~]# cd /mnt [root@squid mnt]# tar zxvf squid-3.4.6.tar.gz -C /opt #Install build environm ...

Posted by dinku33 on Tue, 10 Dec 2019 11:39:51 +0100

Teach you how to easily deploy squid forward agent in 5 minutes

The forward proxy is a server between the client and the original server. In order to obtain content from the original server, the client sends a request to the proxy and specifies the target (the original server), and then the proxy delivers the request to the original server and returns the obtained content to the client. The client can use ...

Posted by kael.shipman on Fri, 06 Dec 2019 10:53:38 +0100

Docker compose quickly build Prometheus+Grafana monitoring system

I. descriptionPrometheus collects the data, and Grafana displays the data. The exporters in Prometheus include:1) Node Exporter is responsible for collecting host hardware and operating system data. It will run as a container on all hosts.2) C advisor is responsible for collecting container data. It will run as a container on all host s.3) Ale ...

Posted by brianlange on Sat, 30 Nov 2019 20:06:29 +0100

Introduction and installation of K8s (Kubernetes)

Preface: k8s is the abbreviation of Kubernetes. Because there are eight letters between K and S, it is called k8s. k8s was originally used within Google for more than 10 years. Its predecessor was Borg, and it was not donated as an open source project by Google until 2015. If we have contacted OpenStack before, we should know that OpenStack c ...

Posted by tinyashcities on Tue, 05 Nov 2019 01:45:24 +0100

IPVS matching extension of Netfilter

The iptables command below looks at the help information for the ipvs matching extension. The matching fields are protocol number, address, port, direction of data flow, forwarding mode and port number of control connection. For FTP like services, the control connection port is 21 and the data port is 2 ...

Posted by Design on Thu, 24 Oct 2019 15:29:31 +0200

synproxy for connection tracing

Principle analysis Synproxy is a convenient function to mitigate syn flood attacks. linux supports synproxy with a connection tracking extension. The following article explains in detail why linux synproxy is implemented. The article links to https://lwn.net/Articles/563151/: The following patches against nf-next.git implement a SYN proxy for ...

Posted by john010117 on Fri, 11 Oct 2019 11:24:45 +0200