IPSEC over GRE static tunnel

This case is the sorting of IPsec over GRE materials on Digital China devices It is used for personal study and record. In case of any doubt, you shall prevail. You are welcome to point out mistakes Function introduction: When using IPSEC static tunnel networking, it is necessary to manually configure the tunnel at both ends of each IPSE ...

Posted by Thikho on Sat, 29 Jan 2022 22:21:40 +0100

Linux Three Swordsmen Arrangement and Widget Expansion

Catalog   1. SED of Three Swordsmen 1.1. Fundamentals 1.1.1. Summary 1.1.2. grammar 1.2. List display 1.2.1. Add in/etc/passwd line 4 1.2.2. Append insert 1.2.3. delete 1.2.4. replace 1.2.5. Print Display 1.2.6. Multipoint Editing 1.2.7 Modify text content 2. AWK of Three Swordsmen 2.1. Summary 2.2. grammar 2.3. List 2.3.1. Se ...

Posted by riyaz123 on Sat, 29 Jan 2022 19:15:27 +0100

The of load balancing cluster -- the deployment of LVS-NAT

1, Overview 1.1 cluster Cluster, also known as cluster It is composed of multiple hosts, which is external as a whole. It only provides one access entry (domain name or IP address), which is equivalent to a mainframe computer 2, Classification There are three types of target differences Load balancing clusterHigh availability clusterHi ...

Posted by Chappers on Sat, 29 Jan 2022 17:44:36 +0100

docker learning notes 1

This note refers to the series of tutorials of crazy God Theory in station B What is docker? Development based on GO language, open source project, container technology The difference between docker and virtual machine technology The traditional virtual machine can create a set of hardware and run a complete operating system. For example, ...

Posted by dlcmpls on Sat, 29 Jan 2022 11:51:33 +0100

Record the processing process of a mining virus that was hijacked and downloaded by the ECS

etc is tampered with, resulting in viruses in the system Cause: The Alibaba cloud server I bought a year ago was not long after I bought it. Because I didn't take any security measures, I somehow hijacked the server and downloaded some mining scripts on it. The processing method at that time was simple and rough. I directly reset my Alibaba c ...

Posted by Ludichrist on Sat, 29 Jan 2022 11:36:24 +0100

Implementation of common load balancing algorithms in mining framework

1 load balancing algorithm The English name of Load Balance is Load Balance, which means to balance the load (work task) and allocate it to multiple operating units for operation, such as FTP server, Web server, enterprise core application server and other main task servers, so as to complete the work task together. Since it involves mul ...

Posted by x2fusion on Sat, 29 Jan 2022 06:34:30 +0100

H3C switch stack (IRF) configuration instance

Case overview Recently, I just finished an IDC project. There are just two h3cs as storage switches to provide 10Gb iSCSI mounting. There was little contact before H3C stacking. This time, it is just used as a record, including the pit that is easy to hit in the middle of the configuration Introduction to IRF Different from the traditional p ...

Posted by camdagr81 on Fri, 28 Jan 2022 22:05:30 +0100

[Docker Series] docker manifest

docker manifest description Manage Docker image lists and inventory lists You need to connect to the network, pull information from the docker hub, and print out the manifest information. Disconnecting the network will cause an error. _Note: This command is experimental on Docker clients. _ It should not be used in production environments ...

Posted by ericwright17 on Fri, 28 Jan 2022 19:46:53 +0100

[Linux] basic usage of log management

1. Basic introduction Log file is an important system information file, which records many important system events, including user login information, system startup information, system security information, mail related information, various service related information, etc.Log is also very important for security. It records all kinds of th ...

Posted by Cagez on Thu, 27 Jan 2022 22:56:08 +0100

65. Spark comprehensive case (Sogou search log analysis)

Sogou lab: the search engine query log database is designed as a collection of Web query log data including some web query requirements of Sogou search engine and user clicks for about one month (June 2008). Provide benchmark research corpus for researchers who analyze the behavior of Chinese search engine users catalogue Original da ...

Posted by Ace_Online on Thu, 27 Jan 2022 16:49:35 +0100