Detailed explanation of OpenSSL self signed certificate
Basic concepts of digital certificateStandards for digital certificates10. 509 version number: indicates which version of X.509 standard is used in the certificate. The version number will affect some specific information in the certificateSerial number: a unique digital number assigned to each certificate by the CA. when the certificate is can ...
Posted by thors1982 on Mon, 27 Dec 2021 20:36:38 +0100
Linux awk command details
Linux awk command details
1, awk
working principle
Read the text line by line. By default, the text is separated by a space or tab key. Save the separated fields to the built-in variable, and execute the editing command according to the mode or condition.
The sed command is often used to process a whole line, while awk prefers to divide a l ...
Posted by iovidiu on Mon, 27 Dec 2021 17:26:27 +0100
Summary of ELK log analysis platform for enterprise operation and maintenance (Elasticsearch installation, Elasticsearch distributed deployment, Elasticsearch plug-in installation)
Preparation for experiment premise: three virtual machines server1 server2 server3
Elasticsearch
brief introduction
Elasticsearch is a Lucene based search server. It provides a distributed multi-user full-text search engine based on RESTful web interface. Elasticsearch is developed in the Java language and released as an open source und ...
Posted by bestpricehost on Sun, 26 Dec 2021 21:55:42 +0100
Ansible operation and maintenance automation
Ansible overviewAnsbile is an it automation tool. It can configure the system, deploy software and coordinate more advanced IT tasks, such as continuous deployment and rolling update.Ansible is suitable for managing enterprise IT infrastructure, from a small scale with a few hosts to an enterprise environment with thousands of instances. Ansibl ...
Posted by kennethl on Sun, 26 Dec 2021 18:56:13 +0100
Detailed explanation of k8s service
Detailed explanation of k8s service
Kubernetes Service defines such an abstraction: a logical set of pods, a policy that can access them - commonly known as microservices. This group of pods can be accessed by the Service, usually through the selector.
For example, consider an image processing backend that runs three copies. These copies ...
Posted by xadmin on Sun, 26 Dec 2021 18:53:15 +0100
kuburnetes service exposed port and its application
service exposes ports in the same way as agent
1. How kubernetes exposes ports
clusterIP This type will provide a virtual IP within the cluster (not in the same network segment as the pod) for communication between pods within the cluster. clusterIP is also the default IP of kubernetes service Type mainly requires the following components Coo ...
Posted by deepson2 on Sun, 26 Dec 2021 18:26:30 +0100
Application of Kubernetes(k8s) Workload Controller
What is a workload controller
Workload Controller Concepts
Workload Controllers are an abstract concept of K8s for deploying and managing Pod s at higher levels of objects.
Common workload controllers
Deployment: Stateless application deployment StatefulSet: Stateful application deployment DaemonSet: Make sure all Node s run the same Pod ...
Posted by christiank on Sun, 26 Dec 2021 17:53:14 +0100
Filter chain, FilterConfig interface, and filter enables users to log in automatically
1: Filter chain Multiple Filter programs can be registered in a Web application, and each Filter program can intercept a URL. If multiple Filter programs intercept the same URL, these filters will form a Filter chain (also known as Filter chain). The Filter chain is represented by the FilterChain object. There is a doFilter () method in the Fi ...
Posted by webtuto on Sun, 26 Dec 2021 13:17:21 +0100
Application of k8s Workload Controller
What is a 1.k8s workload controller
Workload Controllers are an abstract concept of K8s for deploying and managing Pod s at higher levels of objects.
Common workload controllers:
Deployment: Stateless application deploymentStatefulSet: Stateful application deploymentDaemonSet: Make sure all Node s run the same PodJob: One-time taskCro ...
Posted by fredanthony on Sun, 26 Dec 2021 09:08:27 +0100
K8s exposed port and proxy mode
K8s exposed port and proxy mode
How kubernetes exposes ports
Method 1: clusterIP This type provides a virtual IP within the cluster (not in the same network segment as the pod) for communication between pods within the cluster. clusterIP is also the default type of kubernetes service The following components are required to work together ...
Posted by optiplex on Sun, 26 Dec 2021 06:31:10 +0100