Detailed explanation of OpenSSL self signed certificate

Basic concepts of digital certificateStandards for digital certificates10. 509 version number: indicates which version of X.509 standard is used in the certificate. The version number will affect some specific information in the certificateSerial number: a unique digital number assigned to each certificate by the CA. when the certificate is can ...

Posted by thors1982 on Mon, 27 Dec 2021 20:36:38 +0100

Linux awk command details

Linux awk command details 1, awk working principle Read the text line by line. By default, the text is separated by a space or tab key. Save the separated fields to the built-in variable, and execute the editing command according to the mode or condition. The sed command is often used to process a whole line, while awk prefers to divide a l ...

Posted by iovidiu on Mon, 27 Dec 2021 17:26:27 +0100

Summary of ELK log analysis platform for enterprise operation and maintenance (Elasticsearch installation, Elasticsearch distributed deployment, Elasticsearch plug-in installation)

Preparation for experiment premise: three virtual machines server1 server2 server3 Elasticsearch brief introduction Elasticsearch is a Lucene based search server. It provides a distributed multi-user full-text search engine based on RESTful web interface. Elasticsearch is developed in the Java language and released as an open source und ...

Posted by bestpricehost on Sun, 26 Dec 2021 21:55:42 +0100

Ansible operation and maintenance automation

Ansible overviewAnsbile is an it automation tool. It can configure the system, deploy software and coordinate more advanced IT tasks, such as continuous deployment and rolling update.Ansible is suitable for managing enterprise IT infrastructure, from a small scale with a few hosts to an enterprise environment with thousands of instances. Ansibl ...

Posted by kennethl on Sun, 26 Dec 2021 18:56:13 +0100

Detailed explanation of k8s service

Detailed explanation of k8s service Kubernetes Service defines such an abstraction: a logical set of pods, a policy that can access them - commonly known as microservices. This group of pods can be accessed by the Service, usually through the selector. For example, consider an image processing backend that runs three copies. These copies ...

Posted by xadmin on Sun, 26 Dec 2021 18:53:15 +0100

kuburnetes service exposed port and its application

service exposes ports in the same way as agent 1. How kubernetes exposes ports clusterIP This type will provide a virtual IP within the cluster (not in the same network segment as the pod) for communication between pods within the cluster. clusterIP is also the default IP of kubernetes service Type mainly requires the following components Coo ...

Posted by deepson2 on Sun, 26 Dec 2021 18:26:30 +0100

Application of Kubernetes(k8s) Workload Controller

What is a workload controller Workload Controller Concepts Workload Controllers are an abstract concept of K8s for deploying and managing Pod s at higher levels of objects. Common workload controllers Deployment: Stateless application deployment StatefulSet: Stateful application deployment DaemonSet: Make sure all Node s run the same Pod ...

Posted by christiank on Sun, 26 Dec 2021 17:53:14 +0100

Filter chain, FilterConfig interface, and filter enables users to log in automatically

1: Filter chain Multiple Filter programs can be registered in a Web application, and each Filter program can intercept a URL. If multiple Filter programs intercept the same URL, these filters will form a Filter chain (also known as Filter chain). The Filter chain is represented by the FilterChain object. There is a doFilter () method in the Fi ...

Posted by webtuto on Sun, 26 Dec 2021 13:17:21 +0100

Application of k8s Workload Controller

What is a 1.k8s workload controller Workload Controllers are an abstract concept of K8s for deploying and managing Pod s at higher levels of objects. Common workload controllers: Deployment: Stateless application deploymentStatefulSet: Stateful application deploymentDaemonSet: Make sure all Node s run the same PodJob: One-time taskCro ...

Posted by fredanthony on Sun, 26 Dec 2021 09:08:27 +0100

K8s exposed port and proxy mode

K8s exposed port and proxy mode How kubernetes exposes ports Method 1: clusterIP This type provides a virtual IP within the cluster (not in the same network segment as the pod) for communication between pods within the cluster. clusterIP is also the default type of kubernetes service The following components are required to work together ...

Posted by optiplex on Sun, 26 Dec 2021 06:31:10 +0100