Blogs
- 
      Huawei Trust ConceptFriday, June 28, 2024 in Security Categories:Huawei Trust Concept Security: The product has strong anti-attack capabilities to safeguard the confidentiality, integrity, and availability of services and data. Resilience: When under attack, the system maintains a defined operational state … 
- 
      Huawei Intranet Security AnalysisFriday, June 28, 2024 in Security Categories:Huawei Intranet Security Analysis Huawei has plenty of excellent internal learning materials, and I have amassed a wealth of knowledge and experience myself; I have long wondered how to import them into my personal knowledge base. I am fully aware … 
- 
      DDoS DefenseFriday, June 28, 2024 in Security Categories:DDoS Defense DDoS Definition Two kinds of DoS attacks: Crash the service Congest the network Attack Types Attack Type Attack Method Countermeasure Distributed DoS Multiple independent-IP machines begin attacking simultaneously 1. Degrade service 2. … 
- 
      ingress-nginx is not the same as nginx ingressTuesday, June 18, 2024 in Blogs Categories:After two weeks of reading documents, I finally realized that Ingress-Nginx and Nginx Ingress are not the same thing; they differ in functionality as well as implementation. There are even documents guiding the migration. Migrating from the … 
- 
      Using Alibaba Cloud Distributed Storage with Self-Built K8s ClustersFriday, June 14, 2024 in Blogs Categories:Introduction This article, written on 2024-06-14, explains how to use Alibaba Cloud distributed storage in a self-built cluster on Alibaba Cloud. At the end you will find document links; the official Alibaba Cloud documentation is in Chinese, while … 
- 
      Using DNS to Gracefully Switch Network ServicesWednesday, June 12, 2024 in adguard Categories:Assume the service domain name is example.domain, the original server IP is A, and the new server IP is B after migration or IP change. To keep users unaware, we can use DNS to gracefully switch network services. Original state: example.domain … 
- 
      Volume Classification and MethodologyWednesday, June 05, 2024 in Blogs Categories:Volumes Persistent Volumes Projected Volumes Ephemeral Volumes Storage Classes Dynamic Provisioning Volume Snapshots Volume Snapshot Classes Volume Cloning 
- 
      Baota Docker Source AccelerationMonday, June 03, 2024 in Tricky Issues Categories:In Baota 8.2 and earlier, enabling Docker source acceleration is ineffective, and manually editing the configuration on the UI does not work. This is because the Docker configuration file resides at /etc/docker/daemon.json. Both the directory and … 
- 
      Troubleshooting Linux Network IssuesTuesday, May 28, 2024 in Network Categories:Troubleshooting Tools Tool Description Usage Note ping Test network connectivity ping baidu.com traceroute Route tracing traceroute ip route Routing table route -n netstat Network connections netstat -ano nslookup DNS resolution nslookup baidu.com … 
- 
      Wuhan's crayfish vendors now offer on-site processingSaturday, May 18, 2024 in Game Theory Categories:Wuhan’s crayfish market has started offering processing services. After you buy your crayfish, there’s a free wash-and-prep station right next to the stall, staffed by three people working in tandem. The first vendors to roll out this perk gain an …