Common command operation of firewall of CentOS7 series

firewalld Introduction to firewalld firewalld is a daemon that can configure and monitor system firewall rules. It covers the settings of iptables, IP6 tables and ebtables. firewalld features The dynamic firewall function is realizedYou can communicate with firewalld through DBus message system to request to open the network port, so as to ...

Posted by planethax on Thu, 10 Mar 2022 15:56:19 +0100

"Learn now and forget now" docker foundation - 10. Docker installation

Python wechat ordering applet course video https://edu.csdn.net/course/detail/36074 Python actual combat quantitative transaction financial management system https://edu.csdn.net/course/detail/35475 Catalogue* 1. Premise 2. Install Docker using yum or up2date (1) Update yum package(2) Remove old Docker version(3) Install required package ...

Posted by faraco on Thu, 10 Mar 2022 05:44:34 +0100

Killall command and examples in Linux

The Linux command line provides various commands to terminate the process. For example, the "kill" command can be used to kill a process by passing its PID as a parameter, and the "pkill" command takes a pattern as input and kills all matching running processes. However, there is a command 'kill', which exactly matches the ...

Posted by toledojimenez on Wed, 09 Mar 2022 14:56:35 +0100

Jenkins configuring email notifications

After the continuous integration deployment based on jenkins is completed, the task construction is completed, and the test results need to be notified to relevant personnel. Here is how to configure email notification in jenkins. 1, Install mail plugin System management - > management plug-in - > optional plug-in, select email extension ...

Posted by supratwinturbo on Wed, 09 Mar 2022 13:12:37 +0100

SpringBoot04: JSR303 data verification and multi environment switching

JSR303 data verification Let's see how to use it first In Springboot, @ validated can be used to verify the data. If the data is abnormal, exceptions will be thrown uniformly to facilitate the unified processing of the exception center. Let's write a comment here so that our name can only support Email format; @Component //Register bean @Con ...

Posted by iacataca on Wed, 09 Mar 2022 12:20:15 +0100

The concept of process and the usage of exec

I Process concept 1. The difference between process and procedure? Uncompiled program ------------ executable program Program: a pile of programs to be executed GCC hello C - O hello (program is a static data) script Process: only when the program is loaded into the CPU and occupies resources, it can form a truly dynamic process by reacting t ...

Posted by faza on Wed, 09 Mar 2022 09:45:54 +0100

IBGP load balancing, equivalent routing / EBGP load balancing

BGP routing principle When Huawei routers have multiple routes to the same destination, BGP selects routes according to the following policy sequence: If the next hop of this route is unreachable, ignore this route The route with the highest PrefVal is preferredThe route with the highest Local_Pref is preferredLocal originating BGP routes ar ...

Posted by mattyj10 on Tue, 08 Mar 2022 20:20:53 +0100

SpringBoot Admin2.0 integrated Java diagnostic artifact Arthas practice

Author | sparrow Source| Alibaba cloud official account This article is from Arthas. It was submitted in March 2021. The way of participation in the award-winning essay in April can be seen at the end of the article. The project initially used Arthas for two purposes: Through arthas, we can solve the problem of realizing the performance pr ...

Posted by lulubell on Tue, 08 Mar 2022 07:48:16 +0100

Linux learning notes (17.9) -- processing the follow-up work of keys in the work queue

Work queue Soft interrupts run in the context of interrupts, so they cannot block and sleep. Tasklets are implemented with soft interrupts, and of course they cannot block and sleep. But what if a delay handler needs sleep or blocking? Never mind, the work queue will be as you want. The delayed task is called work, and its data structure is wo ...

Posted by jkrettek on Mon, 07 Mar 2022 22:37:57 +0100

Introduction to THCP and RIP

1, DHCP 1. Application background and scenario ① Background: in large enterprise networks, a large number of hosts or devices need to obtain network parameters such as IP address. If manual configuration is adopted, the workload is heavy and difficult to manage. If users modify network parameters without authorization, it may cause problems s ...

Posted by rolajaz on Mon, 07 Mar 2022 20:59:01 +0100