IPSEC over GRE static tunnel
This case is the sorting of IPsec over GRE materials on Digital China devices
It is used for personal study and record. In case of any doubt, you shall prevail. You are welcome to point out mistakes
Function introduction:
When using IPSEC static tunnel networking, it is necessary to manually configure the tunnel at both ends of each IPSE ...
Posted by Thikho on Sat, 29 Jan 2022 22:21:40 +0100
Linux Three Swordsmen Arrangement and Widget Expansion
Catalog
1. SED of Three Swordsmen
1.1. Fundamentals
1.1.1. Summary
1.1.2. grammar
1.2. List display
1.2.1. Add in/etc/passwd line 4
1.2.2. Append insert
1.2.3. delete
1.2.4. replace
1.2.5. Print Display
1.2.6. Multipoint Editing
1.2.7 Modify text content
2. AWK of Three Swordsmen
2.1. Summary
2.2. grammar
2.3. List
2.3.1. Se ...
Posted by riyaz123 on Sat, 29 Jan 2022 19:15:27 +0100
The of load balancing cluster -- the deployment of LVS-NAT
1, Overview
1.1 cluster
Cluster, also known as cluster It is composed of multiple hosts, which is external as a whole. It only provides one access entry (domain name or IP address), which is equivalent to a mainframe computer
2, Classification
There are three types of target differences
Load balancing clusterHigh availability clusterHi ...
Posted by Chappers on Sat, 29 Jan 2022 17:44:36 +0100
docker learning notes 1
This note refers to the series of tutorials of crazy God Theory in station B
What is docker?
Development based on GO language, open source project, container technology
The difference between docker and virtual machine technology
The traditional virtual machine can create a set of hardware and run a complete operating system. For example, ...
Posted by dlcmpls on Sat, 29 Jan 2022 11:51:33 +0100
Record the processing process of a mining virus that was hijacked and downloaded by the ECS
etc is tampered with, resulting in viruses in the system
Cause:
The Alibaba cloud server I bought a year ago was not long after I bought it. Because I didn't take any security measures, I somehow hijacked the server and downloaded some mining scripts on it. The processing method at that time was simple and rough. I directly reset my Alibaba c ...
Posted by Ludichrist on Sat, 29 Jan 2022 11:36:24 +0100
Implementation of common load balancing algorithms in mining framework
1 load balancing algorithm
The English name of Load Balance is Load Balance, which means to balance the load (work task) and allocate it to multiple operating units for operation, such as FTP server, Web server, enterprise core application server and other main task servers, so as to complete the work task together. Since it involves mul ...
Posted by x2fusion on Sat, 29 Jan 2022 06:34:30 +0100
H3C switch stack (IRF) configuration instance
Case overview
Recently, I just finished an IDC project. There are just two h3cs as storage switches to provide 10Gb iSCSI mounting. There was little contact before H3C stacking. This time, it is just used as a record, including the pit that is easy to hit in the middle of the configuration
Introduction to IRF
Different from the traditional p ...
Posted by camdagr81 on Fri, 28 Jan 2022 22:05:30 +0100
[Docker Series] docker manifest
docker manifest description
Manage Docker image lists and inventory lists
You need to connect to the network, pull information from the docker hub, and print out the manifest information. Disconnecting the network will cause an error.
_Note: This command is experimental on Docker clients. _ It should not be used in production environments ...
Posted by ericwright17 on Fri, 28 Jan 2022 19:46:53 +0100
[Linux] basic usage of log management
1. Basic introduction
Log file is an important system information file, which records many important system events, including user login information, system startup information, system security information, mail related information, various service related information, etc.Log is also very important for security. It records all kinds of th ...
Posted by Cagez on Thu, 27 Jan 2022 22:56:08 +0100
65. Spark comprehensive case (Sogou search log analysis)
Sogou lab: the search engine query log database is designed as a collection of Web query log data including some web query requirements of Sogou search engine and user clicks for about one month (June 2008). Provide benchmark research corpus for researchers who analyze the behavior of Chinese search engine users
catalogue
Original da ...
Posted by Ace_Online on Thu, 27 Jan 2022 16:49:35 +0100