ELK log collection system advanced use, this article mainly explains how to build a real and available online environment log collection system. With it, you can say goodbye to go to the server to search for logs!
ELK environment installation
ELK refers to the log collection system built ...
Posted on Mon, 22 Jun 2020 02:32:07 -0400 by ChrisF79
In Java development, in order to avoid too many magic values, we use enumeration classes to encapsulate some static state codes. However, it's not so smooth to return the meaning of these enumerations to the front end correctly and comprehensively. We usually use the Jackson class library to serialize objects into JSON. Today, we'll ...
Posted on Mon, 22 Jun 2020 00:27:23 -0400 by suspect
2. Use scenario
2.1. Peak shaving
The origin of peak shaving
2.2 log processing
2.3 Application decoupling
2.4 asynchronous processing
3. Introduction to rabbitmq
4. AMQP agreement
5. Single node installation in Windows Environment
Download the installation pac ...
Posted on Sun, 21 Jun 2020 06:42:52 -0400 by yes3no2
In the previous section, we built several service modules, User, Order and Pay, which communicate with each other directly to access objects. In the production environment, we generally require users to log in and authorize before performing related operations. If each microservice does a set o ...
Posted on Sun, 21 Jun 2020 05:36:11 -0400 by jdorsch
First of all, let's understand two nouns
Java Message Service, a set of message service standards defined by Java, conforms to JMS standard specifications, and is a general Java Message Service
Message Oriented Middleware is a middleware product that conforms to message development standard ...
Posted on Sun, 21 Jun 2020 03:46:55 -0400 by hastishah
When a user logs in, as long as anyone who has a little basic knowledge of browsing the web page knows that opening the browser console can get the header information of the post request in the request grabbing block, and our user's login account password is just saved here. If no encryption ...
Posted on Sun, 21 Jun 2020 02:55:49 -0400 by D3xt3r
Spring boot uses spring security by default. Spring security is a powerful security framework, needless to say. However, if you are used to shiro, you will not use spring security for a while, so you need to integrate shiro in spring boot. When it comes to integrating shiro, there are many online tutorials, but online tutorials are not necessar ...
Posted on Sun, 21 Jun 2020 02:28:31 -0400 by jollyjumper
[emergency shelter] mybatis can use XML and annotation at the same time
Put the conclusion first
How do you use it?
Reason for the establishment of mode 1
Limitations of mode 2
Reasons for the establishment of mode 3
Put the conclu ...
Posted on Sun, 21 Jun 2020 02:13:16 -0400 by KashKurcura
In the actual project, the message consumption often fails, so it is necessary to resend the message. For example, after the failure of payment message consumption, N times of message retransmission reminder should be performed in different time periods.
This paper simulates the scene
Message consumption succeeds when the amount is less than ...
Posted on Sun, 21 Jun 2020 00:29:09 -0400 by garfield213
Operating system: Ubuntu 20.04
Development tool: IntelliJ IDEA 2020.1.2 (Community Edition)
➜ ~ java -version
openjdk version "14.0.1" 2020-04-14
OpenJDK Runtime Environment (build 14.0.1+7-Ubuntu-1ubuntu1)
OpenJDK 64-Bit Server VM (build 14.0.1+7-Ubuntu-1ubuntu1, mixed ...
Posted on Sat, 20 Jun 2020 23:58:02 -0400 by keegan