Common command operation of firewall of CentOS7 series
firewalld
Introduction to firewalld
firewalld is a daemon that can configure and monitor system firewall rules. It covers the settings of iptables, IP6 tables and ebtables.
firewalld features
The dynamic firewall function is realizedYou can communicate with firewalld through DBus message system to request to open the network port, so as to ...
Posted by planethax on Thu, 10 Mar 2022 15:56:19 +0100
"Learn now and forget now" docker foundation - 10. Docker installation
Python wechat ordering applet course video
https://edu.csdn.net/course/detail/36074
Python actual combat quantitative transaction financial management system
https://edu.csdn.net/course/detail/35475 Catalogue* 1. Premise
2. Install Docker using yum or up2date
(1) Update yum package(2) Remove old Docker version(3) Install required package ...
Posted by faraco on Thu, 10 Mar 2022 05:44:34 +0100
Killall command and examples in Linux
The Linux command line provides various commands to terminate the process. For example, the "kill" command can be used to kill a process by passing its PID as a parameter, and the "pkill" command takes a pattern as input and kills all matching running processes. However, there is a command 'kill', which exactly matches the ...
Posted by toledojimenez on Wed, 09 Mar 2022 14:56:35 +0100
Jenkins configuring email notifications
After the continuous integration deployment based on jenkins is completed, the task construction is completed, and the test results need to be notified to relevant personnel. Here is how to configure email notification in jenkins.
1, Install mail plugin System management - > management plug-in - > optional plug-in, select email extension ...
Posted by supratwinturbo on Wed, 09 Mar 2022 13:12:37 +0100
SpringBoot04: JSR303 data verification and multi environment switching
JSR303 data verification
Let's see how to use it first
In Springboot, @ validated can be used to verify the data. If the data is abnormal, exceptions will be thrown uniformly to facilitate the unified processing of the exception center. Let's write a comment here so that our name can only support Email format;
@Component //Register bean
@Con ...
Posted by iacataca on Wed, 09 Mar 2022 12:20:15 +0100
The concept of process and the usage of exec
I Process concept
1. The difference between process and procedure? Uncompiled program ------------ executable program Program: a pile of programs to be executed GCC hello C - O hello (program is a static data) script
Process: only when the program is loaded into the CPU and occupies resources, it can form a truly dynamic process by reacting t ...
Posted by faza on Wed, 09 Mar 2022 09:45:54 +0100
IBGP load balancing, equivalent routing / EBGP load balancing
BGP routing principle
When Huawei routers have multiple routes to the same destination, BGP selects routes according to the following policy sequence:
If the next hop of this route is unreachable, ignore this route
The route with the highest PrefVal is preferredThe route with the highest Local_Pref is preferredLocal originating BGP routes ar ...
Posted by mattyj10 on Tue, 08 Mar 2022 20:20:53 +0100
SpringBoot Admin2.0 integrated Java diagnostic artifact Arthas practice
Author | sparrow Source| Alibaba cloud official account
This article is from Arthas. It was submitted in March 2021. The way of participation in the award-winning essay in April can be seen at the end of the article.
The project initially used Arthas for two purposes:
Through arthas, we can solve the problem of realizing the performance pr ...
Posted by lulubell on Tue, 08 Mar 2022 07:48:16 +0100
Linux learning notes (17.9) -- processing the follow-up work of keys in the work queue
Work queue Soft interrupts run in the context of interrupts, so they cannot block and sleep. Tasklets are implemented with soft interrupts, and of course they cannot block and sleep. But what if a delay handler needs sleep or blocking? Never mind, the work queue will be as you want. The delayed task is called work, and its data structure is wo ...
Posted by jkrettek on Mon, 07 Mar 2022 22:37:57 +0100
Introduction to THCP and RIP
1, DHCP
1. Application background and scenario
① Background: in large enterprise networks, a large number of hosts or devices need to obtain network parameters such as IP address. If manual configuration is adopted, the workload is heavy and difficult to manage. If users modify network parameters without authorization, it may cause problems s ...
Posted by rolajaz on Mon, 07 Mar 2022 20:59:01 +0100