Contents contributed and discussions participated by 張 旭
SSH原理与运用(二):远程操作与端口转发 - 阮一峰的网络日志 - 0 views
SSH原理与运用 - 0 views
-
SSH是一种网络协议,用于计算机之间的加密登录
-
SSH只是一种协议,存在多种实现,既有商业实现,也有开源实现
-
ssh -p 2222 user@host
- ...2 more annotations...
CertSimple | An nginx config for 2017 - 0 views
-
HAProxy can't terminate a HTTP/2 connection itself.
-
a server OS which includes OpenSSL 1.02 to have ALPN.
-
a new nginx (anything newer than 1.9.5 supports HTTP/2)
- ...6 more annotations...
MySQL :: MySQL 5.7 Reference Manual :: 19.2.1.2 Configuring an Instance for Group Repli... - 0 views
-
store replication metadata in system tables instead of files
-
collect the write set and encode it as a hash using the XXHASH64 hashing algorithm
-
not start operations automatically when the server starts
- ...10 more annotations...
MySQL :: MySQL 5.7 Reference Manual :: 19.1.1.2 Group Replication - 0 views
-
The replication group is a set of servers that interact with each other through message passing.
-
The communication layer provides a set of guarantees such as atomic message and total order message delivery.
-
a multi-master update everywhere replication protocol
- ...8 more annotations...
MySQL :: MySQL 5.7 Reference Manual :: 19.1 Group Replication Background - 0 views
-
the component can be removed and the system should continue to operate as expected
-
network partitioning
-
split brain scenarios
- ...8 more annotations...
MySQL :: MySQL 5.7 Reference Manual :: 20.4 Getting Started with InnoDB Cluster - 0 views
-
InnoDB cluster instances are created and managed through the MySQL Shell.
-
To create a new InnoDB cluster, the MySQL Shell must be connected to the MySQL Server instance. By default, this MySQL Server instance is the seed instance of the new InnoDB cluster and hold the initial data set.
-
Sandbox instance are only suitable for deploying and running on your local machine.
- ...3 more annotations...
MySQL :: MySQL 5.7 Reference Manual :: 20.2 Introducing InnoDB Cluster - 0 views
-
A group of MySQL servers can be configured to create a cluster using MySQL Shell
-
The cluster of servers has a single master, called the primary, which acts as the read-write master.
-
Multiple secondary servers are replicas of the master
- ...6 more annotations...
Understanding Nginx HTTP Proxying, Load Balancing, Buffering, and Caching | DigitalOcean - 0 views
-
allow Nginx to pass requests off to backend http servers for further processing
-
Nginx is often set up as a reverse proxy solution to help scale out infrastructure or to pass requests to other servers that are not designed to handle large client loads
-
explore buffering and caching to improve the performance of proxying operations for clients
- ...48 more annotations...
Rails Environment Variables · RailsApps - 1 views
-
You can pass local configuration settings to an application using environment variables.
-
Operating systems (Linux, Mac OS X, Windows) provide mechanisms to set local environment variables, as does Heroku and other deployment platforms.
-
In general, you shouldn’t save email account credentials or private API keys to a shared git repository.
- ...10 more annotations...
探索 Docker bridge 的正确姿势,亲测有效! | DaoCloud - 1 views
-
Docker bridge 和 Linux bridge 二者,初看如出一辙,再看又相去甚远
-
Linux bridge 模式下,Linux Kernel 会创建出一个虚拟网桥 ,用以实现主机网络接口与虚拟网络接口间的通信
-
Linux bridge 像一台虚拟交换机
- ...15 more annotations...
Rails Database Best Practices - 0 views
-
Databases are extremely feature rich and are really freakin fast when used properly
-
create succinct helpers for accessing subsets of data that are relevant in specific situations
-
Relations are chainable
- ...24 more annotations...
ssl - How to get .pem file from .key and .crt files? - Stack Overflow - 0 views
-
openssl rsa -in server.key -text > private.pem openssl x509 -inform PEM -in server.crt > public.pem
-
A pem file contains the certificate and the private key.
certificate - What is a Pem file and how does it differ from other OpenSSL Generated Ke... - 0 views
-
Certificate Signing Request.
-
Some applications can generate these for submission to certificate-authorities
-
These get signed by the CA and a certificate is returned
- ...15 more annotations...
I am a puts debuggerer | Tenderlovemaking - 0 views
-
method(:render).source_location
-
method(:render).super_method.source_location
-
unbind the method from Kernel, rebind it to the request
- ...9 more annotations...
从达标到卓越 -- API 设计之道 | Taobao FED | 淘宝前端团队 - 0 views
-
高级语言和自然语言(英语)其实相差无几,因此正确地使用(英语的)词法和语法是程序员最基本的素养。
-
只要能够足够接近人类的日常语言和思维,并且不需要引发额外的大脑思考,那就是易用
-
词法和语法
- ...53 more annotations...
Containers Vs. Config Management - 0 views
-
With configuration management systems, you write code that describes how you want some component of your systems to be installed and configured, and when you execute the code on your server, it should end up in the desired state.
-
building a hosting platform that is capable of a lot of things that system administrators used to do manually
-
build modules on deployment via bundler or npm or similar, it can be incredibly slow to run, taking minutes or longer in some cases
- ...10 more annotations...
mqtt - 0 views
-
MQTT is a lightweight publish/subscribe messaging protocol. It is useful for use with low power sensors
-
The MQTT protocol is based on the principle of publishing messages and subscribing to topics, or "pub/sub".
-
Multiple clients connect to a broker and subscribe to topics that they are interested in
- ...22 more annotations...
« First
‹ Previous
441 - 460 of 596
Next ›
Last »
Showing 20▼ items per page