Tag:Single point
-
Time:2021-3-26
In the distributed environment, how to support PC, app (IOS, Android) and other multi terminal session sharing is also a solution that all companies need. I think it’s out. Can we find a general solution, such as SSO single sign on between multiple systems with traditional CAS or the third-party sign on scheme with OAuth? […]
-
Time:2021-3-15
1. Learn about single sign on The main characteristics of SSO are: Web protocol (such as HTTPS) is used between SSO applications, and there is only one login entry There are three roles in the system of SSO 1) User (multiple) 2) Web Applications (multiple) 3) SSO Certification Center (one) 2. SSO implementation includes the […]
-
Time:2021-1-21
Microservice architecture is adopted to reduce the coupling between systems and the impact of single application failure on business system. Meanwhile, this architecture is adopted to lay a technical foundation for Devops in the future. At the same time, it also reduces the interdependence between teams and improves work efficiency Build microservice architecture based […]
-
Time:2021-1-19
Open source project address: project address:https://github.com/ning1875/prome_shard Project description Single point problem of Prometheus Collection type Collect machine level indicators Collecting k8s basic monitoring indexes Collect VM business indicators deployed behind LB Collect business indicators deployed in pod Collect indicators of various middleware, such as Kafka ZK Clickhouse, etc Faced with such a complex collection type, […]
-
Time:2021-1-13
This is the video of Shen Jian’s speech at mpd2016 Beijing station. Comprehensively analyze the availability architecture and optimization of single point system, accessibility architecture of message system and consistency architecture and optimization of optimization / transaction system. 1. Availability architecture and optimization of Internet single point systemClick here to watch the video. The duration […]
-
Time:2020-12-24
First of all, the recent tutorials written by song Ge are all in series. It’s boring to write about some repetitive things, so it’s the default that everyone has understood the previous content in each article. Therefore, it’s suggested to read the relevant series first if you can’t understand anything below Spring Security Series: Dig […]
-
Time:2020-12-8
Problem: after downloading the python extension, you can’t just click to debug the code Cause: not configured The configuration is as follows: Open vscode settings, search python.pythonPath , configure Python to follow the path, and its own can be input at the terminal according to the path which python3 Fill in the following figure: go […]
-
Time:2020-12-7
New topic of get Come and write a blog In fact, this is what I have said before… I didn’t listen to it carefully… Now I can understand Sequence block board questions – LOJ 6277 introduction to block 1 Link up- https://loj.ac/problem/6277 The problem surface is very simple – interval addition of series, single point […]
-
Time:2020-12-5
Series block topic No.2 Block application and promotionIf you don’t know how to block, please learn “block 1” first->Click here to learn Put on question number – LOJ 6278 block entry 2Link up- https://loj.ac/problem/6278Question surface – give a sequence of numbers, 2 operations, interval addition and ask the number of elements less than a certain […]
-
Time:2020-11-16
MaxkeyThe single sign on system means that the key is the biggest keyIndustry leading enterprise class Iam identity management and authentication productsSupport OAuth 2.0 / openid connect, SAML 2.0, JWT, CAS, SCIM and other standard protocolsSimple, standard, safe and openUser identity management (IDM), identity authentication (AM), single sign on (SSO), RBAC privilege management and resource […]
-
Time:2020-11-14
MaxkeyThe single sign on system means that the key is the biggest keyIndustry leading enterprise class Iam identity management and authentication productsSupport OAuth 2.0 / openid connect, SAML 2.0, JWT, CAS, SCIM and other standard protocolsSimple, standard, safe and openUser identity management (IDM), identity authentication (AM), single sign on (SSO), RBAC privilege management and resource […]
-
Time:2020-11-6
background In the real-time computing scenario of byte skipping, we have many tasks (2k +) that will directly serve the online products, and their output delay and stability will directly affect the user experience of online products. Such tasks usually have the following characteristics: High traffic and high concurrency (the maximum task parallelism exceeds 1W) […]