stateless processes
9More
The Twelve-Factor App - 0 views
-
a production deploy of a sophisticated app may use many process types, instantiated into zero or more running processes.
- ...6 more annotations...
-
“sticky sessions” – that is, caching user session data in memory of the app’s process and expecting future requests from the same visitor to be routed to the same process.
10More
The Twelve-Factor App - 1 views
-
The build stage is a transform which converts a code repo into an executable bundle known as a build.
- ...7 more annotations...
-
The release stage takes the build produced by the build stage and combines it with the deploy’s current config.
-
the Capistrano deployment tool stores releases in a subdirectory named releases, where the current release is a symlink to the current release directory.
5More
The Twelve-Factor App - 0 views
-
A deploy of the twelve-factor app should be able to swap out a local MySQL database with one managed by a third party (such as Amazon RDS) without any changes to the app’s code.
- ...2 more annotations...
西南航空:讓員工熱愛公司的瘋狂處方-凱文.傅萊伯、賈姬.傅萊伯 - 三民網路書店 - 1 views
19More
Baseimage-docker: A minimal Ubuntu base image modified for Docker-friendliness - 0 views
-
Baseimage-docker is a special Docker image that is configured for correct use within Docker containers.
- ...16 more annotations...
-
You have Ubuntu installed in Docker. The files are there. But that doesn't mean Ubuntu's running as it should.
-
The only processes that will be running inside the container is the CMD command, and all processes that it spawns.
-
When a system is started, the first process in the system is called the init process, with PID 1. The system halts when this processs halts.
-
If your init process is your app, then it'll probably only shut down itself, not all the other processes in the container.
-
a Docker container, which is a locked down environment with e.g. no direct access to many kernel resources.
-
write a small shell script which runs your daemon, and runit will keep it up and running for you, restarting it when it crashes, etc.
Kubernetes 101: Pods, Nodes, Containers, and Clusters - 0 views
15More
Configuration - docker-sync 0.5.10 documentation - 0 views
-
- ...9 more annotations...
-
production stack (docker-compose.yml) does not need any changes and would look like this (and is portable, no docker-sync adjustments).
-
docker-compose-dev.yml ( it needs to be called that way, look like this ) will override
-
In case the folder we mount to has been declared as a VOLUME during image build, its content will be merged with the name volume we mount from the host
61More
phusion/baseimage-docker - 1 views
-
- ...57 more annotations...
-
Password and challenge-response authentication are disabled by default. Only key authentication is allowed.
-
The Docker developers advocate the philosophy of running a single logical service per container. A logical service can consist of multiple OS processes.
-
Splitting your logical service into multiple OS processes also makes sense from a security standpoint.
-
Baseimage-docker advocates running multiple OS processes inside a single container, and a single logical service can consist of multiple OS processes.
-
All executable scripts in /etc/my_init.d, if this directory exists. The scripts are run in lexicographic order.
-
One of the ideas behind Docker is that containers should be stateless, easily restartable, and behave like a black box.
-
However the downside of this approach is that the init system is not started. That is, while invoking COMMAND, important daemons such as cron and syslog are not running. Also, orphaned child processes are not properly reaped, because COMMAND is PID 1.
-
Baseimage-docker provides a facility to run a single one-shot command, while solving all of the aforementioned problems
-
Nginx is one such example: it removes all environment variables unless you explicitly instruct it to retain them through the env configuration option.
-
According to the Unix process model, the init process -- PID 1 -- inherits all orphaned child processes and must reap them
-
The shell script must be called run, must be executable, and is to be placed in the directory /etc/service/<NAME>. runsv will switch to the directory and invoke ./run after your container starts.
-
If your process is started with a shell script, make sure you exec the actual process, otherwise the shell will receive the signal and not your process.
-
any environment variables set with docker run --env or with the ENV command in the Dockerfile, will be picked up by my_init
-
We ignore HOME, SHELL, USER and a bunch of other environment variables on purpose, because not ignoring them will break multi-user containers.
-
modify the environment variables in my_init (and therefore the environment variables in all child processes that are spawned after that point in time), by altering the files in /etc/container_environment
-
syslog-ng is started separately before the runit supervisor process, and shutdown after runit exits.
23More
你到底知不知道什麼是 Kubernetes? | Hwchiu Learning Note - 0 views
-
Storage(儲存) 實際上一直都不是一個簡單處理的問題,從軟體面來看實際上牽扯到非常多的層級,譬如 Linux Kernel, FileSystem, Block/File-Level, Cache, Snapshot, Object Storage 等各式各樣的議題可以討論。
- ...20 more annotations...
-
管理者可能會直接在 NFS Server 上進行 MDADM 來設定相關的 Block Device 並且基於上面提供 Export 供 NFS 使用,甚至底層套用不同的檔案系統 (EXT4/BTF4) 來獲取不同的功能與效能。
-
基本上 Pod 裡面每個 Container 會使用 Volume 這個物件來代表容器內的掛載點,而在外部實際上會透過 PVC 以及 PV 的方式來描述這個 Volume 背後的儲存方案伺服器的資訊。
-
kubernetes 在 Service/Ingress 中間自行實現了一個模組,大抵上稱為 kube-proxy, 其底層可以使用 iptables, IPVS, user-space software 等不同的實現方法,這部分是跟 CNI 完全無關。
-
對於 kubernetes 來說,其實本身並不在意到底底下的容器化技術實際上是怎麼實現的,你要用 Docker, rkt, CRI-O 都無所謂,甚至背後是一個偽裝成 Container 的 Virtaul Machine virtlet 都可以。
3More
How To Benchmark HTTP Latency with wrk on Ubuntu 14.04 | DigitalOcean - 0 views
-
Latency refers to the time interval between the moment the request was made (by wrk) and the moment the response was received (from the service).
11More
The Twelve-Factor App - 0 views
-
An app’s config is everything that is likely to vary between deploys (staging, production, developer environments, etc)
- ...8 more annotations...
11More
The Twelve-Factor App - 0 views
-
Libraries installed through a packaging system can be installed system-wide (known as “site packages”) or scoped into the directory containing the app (known as “vendoring” or “bundling”).
- ...8 more annotations...
-
The full and explicit dependency specification is applied uniformly to both production and development.
-
Bundler for Ruby offers the Gemfile manifest format for dependency declaration and bundle exec for dependency isolation.
1More
Two Generals' Problem - Wikipedia - 0 views
-
"In computing, the Two Generals Problem is a thought experiment meant to illustrate the pitfalls and design challenges of attempting to coordinate an action by communicating over an unreliable link. In the experiment, two generals are only able to communicate with one another by sending a messenger through enemy territory. The experiment asks how they might reach an agreement on the time to launch an attack, while knowing that any messenger they send could be captured."
1More
二階段提交 - 維基百科,自由的百科全書 - 0 views
-
"二階段提交(英語:Two-phase Commit)是指在計算機網絡以及資料庫領域內,為了使基於分布式系統架構下的所有節點在進行事務提交時保持一致性而設計的一種演算法。通常,二階段提交也被稱為是一種協議(Protocol)。在分布式系統中,每個節點雖然可以知曉自己的操作時成功或者失敗,卻無法知道其他節點的操作的成功或失敗。當一個事務跨越多個節點時,為了保持事務的ACID特性,需要引入一個作為協調者的組件來統一掌控所有節點(稱作參與者)的操作結果並最終指示這些節點是否要把操作結果進行真正的提交(比如將更新後的數據寫入磁碟等等)。因此,二階段提交的算法思路可以概括為: 參與者將操作成敗通知協調者,再由協調者根據所有參與者的反饋情報決定各參與者是否要提交操作還是中止操作。 需要注意的是,二階段提交(英語:2PC)不應該與並發控制中的二階段鎖(英語:2PL)混淆。"
13More
SSL Certificate Features - 0 views
- ...9 more annotations...
-
Any certificate in between your certificate and the root certificate is called a chain or intermediate certificate.
-
These must be installed to the web server with the primary certificate for your web site so that user's browers can link your certificate to a trusted authority.
12More
Public Key Infrastructure (PKI) Overview - 0 views
-
A PKI allows you to bind public keys (contained in SSL certificates) with a person in a way that allows you to trust the certificate.
-
Public Key Infrastructures, like the one used to secure the Internet, most commonly use a Certificate Authority (also called a Registration Authority) to verify the identity of an entity and create unforgeable certificates.
-
An SSL Certificate Authority (also called a trusted third party or CA) is an organization that issues digital certificates to organizations or individuals after verifying their identity.
- ...9 more annotations...
-
An SSL Certificate provides assurances that we are talking to the right server, but the assurances are limited.
-
An SSL Certificate in a PKI is a digital document containing a public key, entity information, and a digital signature from the certificate issuer.
-
it is much more practical and secure to establish a chain of trust to the Root certificate by signing an Intermediate certificate
-
there are four primary trust stores that are relied upon for the majority of software: Apple, Microsoft, Chrome, and Mozilla.
-
a revocation system that allows a certificate to be listed as invalid if it was improperly issued or if the private key has been compromised.
9More
What is a CSR (Certificate Signing Request)? - 0 views
-
usually generated on the server where the certificate will be installed and contains information that will be included in the certificate such as the organization name, common name (domain name), locality, and country.
-
CSR or Certificate Signing request is a block of encoded text that is given to a Certificate Authority when applying for an SSL Certificate
- ...6 more annotations...
-
A certificate authority will use a CSR to create your SSL certificate, but it does not need your private key.
-
The certificate created with a particular CSR will only work with the private key that was generated with it.
-
The bit-length of a CSR and private key pair determine how easily the key can be cracked using brute force methods.
View AllMost Active Members
View AllTop 10 Tags
- 151system
- 133programming
- 102docker
- 101rails
- 89development
- 83devops
- 81kubernetes
- 80javascript
- 77database
- 71ruby
- 68linux
- 64web
- 61server
- 58networking
- 52security
- 49python
- 42mysql
- 42php
- 40framework
- 35performance