Load balancing of LVS-DR mode in four layers

Two methods of LVS-DR construction matters needing attention: At this time, there is only one network card for LVS service; The IP forward forwarding function of the route must be enabled; For client access, the gateway must be specified; The VS service must be configured with a gateway. If the gateway is not ...

Posted by expertis on Mon, 04 Nov 2019 18:34:19 +0100

Go dependency management tool dep

https://segmentfault.com/a/1190000013561841 Go dependency management tool Go dependency management tool Environmental requirements Golang >= 1.9 Dep Current version: dep: version : devel build date : git hash : go version : go1.10 go compiler : gc platform : linux/amd64 Last release is v0.4.1 install go ...

Posted by Youko on Sun, 03 Nov 2019 07:53:25 +0100

SSH blasting emergency response

Problem finding Log in to the virtual machine, and according to the prompt message, it is found that it is suffering from SSH explosion attack, with IP address of 159.65.230.189. Check the log in related security logs: tail -f /var/log/secure, and find other attempts to blow up IP106.12.183.6, 182.61.166.179, 220.88.40.41. Baidu search IP add ...

Posted by gtibok on Sat, 02 Nov 2019 08:06:32 +0100

Building a six layer feedforward neural network

2017-11-23 22:41 According to the derivation in the previous article, let the x-th neuron in the l(n) layer be l(n) (x) and its error value be delta ﹤ l(n) (x), then there is the following formula: delta_l(n)_(x) = delta_l(n+1) * w(n+1) * f'(netl(n)_(x)) Where f '(NETL (n) UU (x)) is the derivative of the Delta (n) UU ...

Posted by philippo on Sat, 02 Nov 2019 00:01:44 +0100

Common script tools

md5sum, command line view configuration I. verifying file integrity with md5sum Command options   1 2 3 4 5 6 md5sum -b Read in file contents in binary mode -t Read in file content in text mode -c Based on generated md5 Value to verify the existing file -w A warning message is given when the verif ...

Posted by pdunn on Fri, 01 Nov 2019 22:33:51 +0100

Learn the other two types of host,none of docker network from scratch

We have already introduced the bridge network, which is more complex. This section introduces two simple networks: host and none. none Network First, we introduce the Network of type none. First look at our Network: duandingyang@duandingyangdeMacBook-Pro  ~/docker/ubuntu-16.04  docker network ls NETWORK ID NAME D ...

Posted by ud2008 on Fri, 01 Nov 2019 20:35:36 +0100

Implementation and deployment of linux Cluster

  (1) configure basic environment //Install virtual tools #cd /media/VMware\ Tools/ #cp VMwareTools-10.0.6-3595377.tar.gz/tmp/ #cd /tmp/ #tar-xvzf VMwareTools-10.0.6-3595377.tar.gz #cd vmware-tools-distrib/ #./vmware-install.pl Stop and shut down the NetworkManager service: service NetworkManager status #service Networ ...

Posted by autocolismo on Fri, 01 Nov 2019 10:15:26 +0100

Positioning process of lock not released due to OOM (in combination with Arthas)

This paper is based on Spring Cloud Fincheley SR4, Arthas 3.1.4 Recently, it is found that the service returns slowly, and feign's fallback is triggered. Check the log and find that the retry is triggered. What triggered the retry is found through the exception stack: Caused by: feign.RetryableException: connect timed out executing GET http:/ ...

Posted by ArneR on Thu, 31 Oct 2019 01:54:50 +0100

Simple TCP communication model

  in TCP/IP protocol, "IP address + TCP or UDP port number" uniquely identifies a process in network communication, "IP address + port number" is called socket. int socket(int domain, int type, int protocol); success file descriptor, failure-1 Streaming socket: non frame synchr ...

Posted by westexasman on Mon, 28 Oct 2019 15:14:44 +0100

Ioshls m3u8 custom AES-128 key chain or link decryption process (play, download, play after downloading local)

Ioshls m3u8 custom AES-128 key chain or link decryption process (play, download, play after downloading local) In fact, in theory, apple supports native direct play AES-128 encryption, as long as it conforms to Apple's encryption standard, but in the actual use process, because there are Android, H5, ...

Posted by james_4k2 on Mon, 28 Oct 2019 03:53:51 +0100