Tag:Protection mode
-
Time:2021-1-17
2、 Registry 1. Introduction to Eureka Eureka is the core service of microservice systemRole: registration and discoveryTo start all services, you need to register your address in the registry; to call other services, you need to get the registry from the registry to find other services.Service IDHost addressitem-service—localhost:8001user-service—localhost:8101order-service—localhost:8201 2. The working mechanism of Eureka: register […]
-
Time:2020-9-16
RAC RAC: real application clustersrac RAC: real application clustersrac Single node database: one to one correspondence between data files and sample files When an instance is damaged, the database is corrupted RAC architecture database: data files corresponding to multiple instances The most fundamental intention of Rac is instance level fault tolerance, not data-based Instances are […]
-
Time:2020-1-30
Recently, I have been following the operating system course of Tsinghua University. The biggest feature of this course is a series of practical operating system experiments. There are 8 experiments in total. I’m here to record some experience and summary in the experiment. Task1 The main purpose of this task is to be familiar with […]
-
Time:2020-1-11
1. Download the installation package[[email protected] opt]# wget http://download.redis.io/rele… [[email protected] opt]# tar -zxvf redis-5.0.3.tar.gz2. Switch to directory and compile[[email protected] opt]# cd redis-5.0.3 [[email protected] redis-5.0.3]# makeNote that you need GCC environment. You can command GCC – V to see if you want to install GCC environment. If you don’t need to install it separately3. Install redis[[email protected] redis-5.0.3]# […]