Three different implementation methods of LVS-DR
1. Implementation of VIP and DIP in the same network segment Network topology Configuration environment Configure RIP1 of Client gateway pointing to ...
Firewalld firewall advanced configuration - (real world chapter!!)
Experimental topology Experimental requirement 1. Intranet users of the company need to share the Internet through the gateway server2. Internet user...
ovn implementation of container Internet access, nat, fip
Experimental topology Physical topology Logical topology 172.24.4.8 is the fip of pod 100.60.0.31. step Get ready Create logical router ovn cluster ov...
Weblogic domain Start, Set Default User Name and Password, and Problems encountered
Weblogic's domain instance is starting and needs to set default passwords, etc. If the default password is not set at startup, an exception will...
Analysis of Mysql 5.7 Error Reporting 1546, 1577 and 1682
Environmental description:The backup data of xtrabackup on MySQL 5.6.40 is imported into MySQL 5.7.24 instance, the service of MySQL 5.7 is started, ...
Practice VxLAN under Linux
This article was first published in my public number Linux cloud computing network (id: cloud_dev), focusing on dry goods sharing. There are 10T books...
format of nginx default configuration syntax and log
nginx default configuration To see which default configuration files are available for nginx, open the / etc/nginx/nginx.conf file to see the end line...
Build your own ngrok service
1. Server preparation I tried it on CentOS 6 and the compiler got stuck. It is said that it is. Git As a result of the low version, I want to upgrade...
zookeeper Pseudo-Distributed Architecture
Get the zookeeper binary package, address[ https://www.apache.org/dyn/closer.cgi/zookeeper/](https://www.apache.org/dyn/closer.cgi/zookeeper/The curr...
Use Electron to customize menus
Use Electron to customize menus Application examples for this series of articles have been published GitHub: electron-api-demos-Zh_CN Clone or run it ...
Some Problems Needing Attention in Linux System Security
Write on the front: When you deploy a server, the first step should not be to deploy the application, security is the first task. If one day you log o...
Ubuntu Server 18.04 configuration rsync (system ctl)
[Server Configuration] System version # lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 18.04.2 LTS Release: ...
Linux-Day3-Installation Software
There are three ways to install software in Linux: 1.rpm # is equivalent to clicking on windows to install next step 2.yum # is equivalent to one-cli...
CentOS 7 Installation Discuz 3.3 (Pit Filling)
Official Installation Method Released First Official Installation Method The following is the normal installation method: 1. Install CentOS 7 Server ...
C/C++ TCP/IP Protocol Cluster Checksum Computing Method (tcpip checksum)
This article will provide a really usable TCP/IP protocol checksum calculation, that is, it is not the theoretical TCPIP checksum calculation method,...
linux module export symbol EXPORT_SYMBOL_GPL EXPORT_SYMBOL
Turn from http://blog.csdn.net/lisan04/article/details/4076013 The'/ prob/kallsyms'file of Linux 2.6 corresponds to the symbol table of the ...
File and directory permissions chmod, change owner and group chown, umask, hidden permissions lsattr/chattr
chmod command Look at the file information and use the ls-l command. After execution, the results are as follows: [root@test-01 ~]# ls -l Total dosage...
Linux memory management: ARM Memory Layout and mmu configuration
Before page initialization and mmu configuration in the kernel, you need to know the whole memory map. 1. ARM Memory Layout PAGE_OFFSET Start address...