Python Network Request library Requests, mom will never worry about my network Requests again

I. General Situation Then the last article said that if you really think that the Requests network request library only has Get Requests and Post Requests, it's a big mistake. It has some other uses, which are often needed by reptiles. Let's take a look. Two, use Auth verification I don't know if the little partner has configured the router ...

Posted on Tue, 25 Feb 2020 06:25:04 -0500 by KirstyScott

New features interpretation | MySQL 8.0 new features - replica set

Author: Yang Taotao Introduction Previously, I introduced a "MySQL Innodb Cluster literacy chapter". MySQL Innodb Cluster = MySQL Shell + MySQL Router + MySQL Group Replication(MGR) MySQL Shell manages the aggregation suite of MGR operations. After MySQL 8.0.19 is released, this combination extends to MySQL Replication (master-slave ...

Posted on Mon, 24 Feb 2020 05:27:19 -0500 by apsomum

Email from PHP page using GMail SMTP server

I am trying to send e-mail through GMail's SMTP server from a PHP page, but this error occurred: Authentication failed [SMTP: SMTP server does not support authentication (Code: 250, response: mx.google.com, service for you, [98.117.99.235] size is 35651584 8-bit mime starttls enhancedstatusscodes pipelining]] Can I help you? This is ...

Posted on Thu, 13 Feb 2020 02:45:46 -0500 by ryanlwh

Single node deployment of Kubernetes binary deployment

K8s single node binary deployment Steps for building K8s binary deployment: 1: Self signed ETCD certificate 2: ETCD deployment 3: Node install docker 4: Flannel deployment (write subnet to etcd first) ---------master---------- 5: Self signed APIServer certificate 6: Deploy the APIServer component (token, csv) 7: Deploy the controller manag ...

Posted on Mon, 10 Feb 2020 05:51:55 -0500 by dreamscape

Nginx-based https service (ssl certificate making)

  I. Role of Certificates An SSL certificate is a digital certificate, similar to a driver's license or passport.Following the SSL protocol, issued by a trusted digital certification authority CA after authenticating the server; Benefits of SSL certificates: Reference links https://baijiahao.bai ...

Posted on Thu, 06 Feb 2020 00:50:31 -0500 by archonis

nginx reverse proxy and https certificate configuration

author: yunqimg(ccxtcxx0) 1. Compile and install nginx Download from official website nginx source code , and compile the installation ./configure --prefix=/usr/local/nginx --with-http_stub_status_module --with-http_ssl_module make && make install Pay attention to adding SSL module during compilation, otherwise https configuration wi ...

Posted on Sun, 02 Feb 2020 01:27:11 -0500 by lew14

mysql master-slave replication encryption (ssl)

After reading several blogs, I also refer to other people's documents and row many holes. It's done Summarize the steps: 1. Download openssl 2. Generate CA organization and certificate. 3. Generate the corresponding certificate and key for the master and slave of mysql 4. Modify mysql configuration file 5 ...

Posted on Fri, 31 Jan 2020 10:29:47 -0500 by mirana

JAVA -- a simple web crawler DEMO based on HttpComponents(HttpClient)

Basic concepts HttpComponents(HttpClient): Hypertext Transfer Protocol (HTTP) is probably the most important protocol used on the Internet today. The growth of Web services, network enabled devices and network computing continues to extend the role of HTTP protocol beyond user driven web browsers ...

Posted on Wed, 22 Jan 2020 09:26:54 -0500 by centered effect

WeChat public number uses PHP to get authorized user information of H5 web page.

1, Prepare tools Service number (subscription number can't get information of authorized user of web page), domain name, server Two, configure the public number. 1. Get developer id and password:2. Set the authorized domain name of the web page: Business domain name and js interface security domain ...

Posted on Sat, 18 Jan 2020 03:52:38 -0500 by nootkan

The implementation source code of kubernetes service scatter algorithm

In the distributed scheduling, in order to ensure the high availability and disaster recovery requirements of the service, it is usually said that the service is evenly distributed in multiple areas, racks and nodes, so as to avoid the service unavailability caused by a single point of failure. The algorithm, SelectorSpread, is naturally implem ...

Posted on Sat, 18 Jan 2020 02:05:50 -0500 by d~l