When nginx is first compiled and installed, http_ ssl_ The module module is not compiled into the nginx binary file by default. If you need to add SSL certificate. That is to say, use the https protocol. Then you need to add http_ssl_module module. Suppose your nginx installation pa ...
Posted by biopv on Tue, 30 Jun 2020 03:42:35 +0200
What is Nginx?
Nginx (engine x) is a lightweight Web server, reverse proxy server and email (IMAP/POP3) proxy server.
What is reverse proxy?
Reverse Proxy means that the proxy server accepts the connection request on the internet, then forwards the request to the server on the internal netwo ...
Posted by neoboffins on Tue, 23 Jun 2020 06:04:08 +0200
NetCat, known as "Swiss Army Knife" in network tools, is short and practical (1.84 version is no more than 25k, old version or reduced version or even smaller), and is designed as a simple and reliable network tool, which can transmit read and write data through TCP or UDP ...
Posted by sargenle on Mon, 22 Jun 2020 09:48:38 +0200
TLS authentication and Token authentication
@author: DavieCopyright: Beijing Qianfeng Internet Technology Co., Ltd
In the last lesson, we learned four flow patterns of gRPC go framework. In the actual production environment, a full-featured service includes not only the basic function of method cal ...
Posted by t0ta11 on Fri, 19 Jun 2020 10:31:10 +0200
Write in front
There are not a few articles about qiniu cloud uploading pictures, but they just use the test domain name given by qiniu cloud. As a webmaster, after upgrading his domain name to https, the obsessive-compulsive patients are not allowed to have the three words of insecurity in the brow ...
Posted by Salis on Wed, 17 Jun 2020 08:52:21 +0200
Tags (space delimited): kubernetes series
1: Introduction to system environment2: Deploy Etcd Cluster3: Install dockerIV: Deploy k8s Master NodeFive: Deploy k8s Worker NodeSix: Deploy Dashboard and Core DNS
1: Introduction to system environment
1.1 Environmental Preparation
Before you begin, deploying the Kubernetes cluster machine require ...
Collect a lot of anti - Crawler sites, there is a very good tool: Octopus... Directly through the browser access, a force to break ten thousand methods
Preparatory work: money, spend money to buy members of Octopus website for a month or more, so that you can do Cloud Collection
Next, grab the data by yourself. After the grab, set the timing ...
Posted by christillis on Tue, 02 Jun 2020 17:02:35 +0200
Through the previous article Istio Sidecar injection principle It can be found that the Sidecar application has been injected at the same time when the application is submitted to the kubernate deployment.
If you are careful, you can also find that in addition to the application of istio proxy, there is also an Init Containers of istio ...
Posted by virtual_odin on Wed, 27 May 2020 13:02:34 +0200