Latest posts

Protect user privacy data in the log

Protect user privacy data in the log

Technology 1 months ago (04-14) Views: 2 Comments: 0

2019 "315" Party artificial intelligence calls the plot of nuisance calls to let the public know the importance of protecting personal privacy in the information age.This article shares seven best practices for protecting user privacy data in logging. Is completely different from the "Chinese people are willing to exchange privacy for convenience" mentality, Europe and the US in the protection of personal privacy obviously go a little earlier and further.In the period before and after the release of GDPR in May 2018, the need to protect personal privacy was rapidly raised, and the daily work of an ordinary programmer like me who developed international products was affected by this, and we put down our business requirements Card (Story), Instead, do the security needs associated with GDPR. In healthcare or the financial sector in general, there are very strict rules restricting access to sensitive data for customers, especially after the promulgation of the European GDPR, the consequences of the company's disclosure of personal data are also very serious.In terms of personal privacy protection, the country is currently lagging behind in terms of law and awareness, but many people are more or less aware of the troubles caused to themselves by the

Take advantage of ModSecurity to protect your WordPress blog

Take advantage of ModSecurity to protect your WordPress blog

Technology 2 months ago (03-12) Views: 2 Comments: 0

ModSecurity is an intrusion detection and blocking engine that is primarily used for WEB applications, so it can also be called a WEB application firewall; it can be run as a module of the Apache Web server or as a separate application.The purpose of ModSecurity is to enhance the security of WEB applications to protect WEB applications from attack. Availability of ModSecurity 2.9.1 ModSecurity feature Features HTTP Traffic Logging The log functionality already available on the Web server is sufficient for access request analysis, but there are some shortcomings in the application analysis of the web, especially in most cases there is no way to record the request body.Your opponent is well aware of this, so many times the attack is generated through POST requests and causes your system to be blind.ModSecurity fully gets the content in the HTTP interaction and records the full request and response.Its logging capabilities allow you to make more detailed judgments about exactly what is logged in and make sure that the relevant data is recorded.Some of the key fields in some requests and responses may contain sensitive data, and ModSecurity can be configured to hide them before recording these audit logs. Real-time monitoring and

"Open source" Zipkin-js-instrumentation-axios: Integrated Axios and Zipkin

"Open source" Zipkin-js-instrumentation-axios: Integrated Axios and Zipkin

Technology 3 months ago (02-19) Views: 5 Comments: 0

Zipkin is a distributed tracking system developed and open source by Twitter, while Axios is a common Javascript HTTP client.Because ZIPKIN-JS officials did not provide axios suitability, and the same type of library Zipkin-jinstrumentation-axios has destroyed the original functionality of Axios, for which the very guest made this library for integration Zipkin and Axios, All of the original method properties of Axios can be supported, and their usage is exactly the same as Axios. Zipkin-js-instrumentation-axios Adds Zipkin Tracing for the Axios JS HTTP client library. It supports all features of . Installation Usage You need to I wfucntion to wrap the native Ainstance, and the Ainstance's type/functions/attributes a Re not affected. As a result, you can-zithe same as A for example:   Interceptors of Axios also supported You can intercept requests or responses before and is handled by then or catch.   The test cases all passed

K8S use ready and survival probes to configure health checks

K8S use ready and survival probes to configure health checks

Technology 4 months ago (01-17) Views: 4 Comments: 0

Health Check Health check can be used for state monitoring of service operation, such as the D monitoring of Tencent's DNSPOD, which requires the configuration of an access path to determine whether a website is properly accessible is actually a health check, When a health check is found to have failed, an email notification or text message is sent to inform the webmaster of the repair. In some modern distributed systems, user access is no longer a single host, but a cluster of hundreds of instances, user requests distributed to different instances through the load balancer, load balancing helps to solve the access pressure of a single server, while improving the system's high availability, and health checks are often used as current instances to see if "Available" criteria for judging.That is, when the system finds that an instance health check does not pass, the load balancer will not direct traffic to the instance. Today's cloud service vendors, such as AWS, are generally equipped with health checks for load balancing, while Kubernetes provides two probes to check the status of containers, Liveliness and Readiness, and according to official documents, Liveliness probes are designed to see if the container is running, Translated

Trip to San Francisco

Trip to San Francisco

years 5 months ago (12-22) Views: 3 Comments: 0

There are mountains on the west coast, known as "San Francisco." It smells xianshan at sea. Before the plane landed in San Francisco, the green hills such as Dee, Jiangshanyuha, mountains in the ethereal nothingness. [Caption Id= "align=" Alignnone "width=" 900 "] Mountain in ethereal nothingness [/caption] A bird's-eye view of the streets, like the map of the United States, is cut to the full rules. Old and full-meaning streets Wandering the streets of San Francisco, there is no imaginary prosperity, compared with the domestic streets, the biggest feeling is that there are too few people, as if the city's background noise are a few decibels small, unconsciously from the heart feel quiet. It is reckoned that San Francisco's urban infrastructure, unlike China, has been built in recent years, or refurbished and rebuilt, as a whole, without China feeling so new, with uneven roads and low power lines entangled in the city's American corners, but the architecture is full of history and artistic sensations, unlike domestic buildings. [Caption Id=] "align=" AlignCenter "width=" 602 "] old and Implication streets [/caption] Once into San Francisco's Chinatown, the sense of familiarity and intimacy is from the inside out.Into the shop, and China's commissary

Cloudformation and the "infrastructure as code" behind it

Cloudformation and the "infrastructure as code" behind it

Technology 6 months ago (11-16) Views: 0 Comments: 0

Familiar with AWS will certainly not be unfamiliar with Cloudformation, AWS official definition of Cloudformation is as follows: AWS CloudFormation Cloud Resource Services enable developers and system administrators to create, manage, and update related AWS cloud resource templates in an easy and orderly manner.Use an AWS template or create your own cloud resources. In order to be the fastest to Cloudformation in the heart a little bit of a concept, I distilled the following keywords for you: Stakeholders: operations or DevOps areas A service to manage cloud resources Provided by AWS Manage cloud resources with template files (or configuration files, code) Code vs Visualization Operations When it comes to the experience of using cloud services before, beginners should first be able to think, can I use Cloudformation to apply for a host, create Loadbalance, rather than manually "dot" on the AWS console (Console)? Yes.If Cloudformation only makes visual interface manipulation code, this may only arouse the interest of code enthusiasts, and we know many of the benefits of code, such as higher efficiency and automatic machine execution. However, because not everyone likes the code.For people with "code phobia," or professional operators accustomed to configuring on the interface, interface operations are

Communication begins away from the spray

Communication begins away from the spray

Geek Viewpoint 6 months ago (11-11) Views: 3 Comments: 0

The spray or the bar may not know that he is a spray or a bar, just want to refute the views of others to show their sense of existence, to satisfy their vanity and proud of it.It is a pity that they have lost a chance to learn and absorb other people's ideas.There is also a higher level of spray, do not know that the other side sometimes say the words have his special context, but take the words out of the other side, do not think about the author in the specific context of the context, but to find the surface of the loophole to spray, to such people suggested that they learn "pragmatics." [Caption Id= "align=" AlignCenter "width=" 500 "] communication [/caption] And for the spray, can not care too much, some ideas if it is their own moment of insight, can be written down, because it is right in the context of this moment, if in time these ideas are indeed wrong, there is no need to thin themselves, because this is a process of growing and perfecting their own ideas.If you care too much about other people's comments, you dare not say anything, there will

AWS Fargate Quick Facts

AWS Fargate Quick Facts

Technology 7 months ago (11-05) Views: 20 Comments: 0

The AWS fargate re:invent Conference, released in November 2017, is a technology that lets you run containers without having to manage servers or clusters, and we only care about the application image and the resources it needs. [Caption Id= "" align= "AlignCenter" width= "743"] Location of AWS Fargate on the technology radar [/caption] AWS fargate: Keywords DevOps, cloud computing domain A cloud service for AWS Severless: No Server Container running Platform and EC2 instance at a level Support for ECS, Eks:amazon Ecs/eks has two modes: Fargate Startup Type and EC2 Startup type Properties due to ECS Monitoring Elastic Scaling Health Check Blue-Green Deployment Load Balancing Ecr:aws Mirror Warehouse Scheduled Tasks Network configuration Cloudformation: Infrastructure is code From the container running platform aspect: Fargate compared to EC2 Instance difference, Advantage [Caption Id= "" align= "AlignCenter" width= "644"] EC2 vs Fargate: architecture [/caption] EC2 Instance vs Fargate: Security Transfer security responsibilities to cloud service vendors Ami: System Update Security vulnerabilities Ssh SSH Key Fortress machine EC2 Instance vs Fargate: Pricing method Fargate Total cost (in resources) = Total cost of Vcpus + total memory cost Total Vcpus cost = number of Vcpus x per cpu-second price x CPU duration (seconds) Total memory

Elasticsearch incremental data synchronization and seamless upgrade

Elasticsearch incremental data synchronization and seamless upgrade

Technology 8 months ago (10-07) Views: 17 Comments: 0

Elasticsearch as an open-source full-text search engine in today's software development has been more and more widely used in business function development, you can choose Elasticsearch to provide more powerful than database query search method, Also based on search results scoring (weights) and highlighting makes it easy for us to implement a search engine within a station. ElasticSearch VS Database When we first approached Elasticsearch (ES), we often used it in analogy with the database to learn from the structure: Indices similar to database Type a table similar to database fields are similar to columns in a data table Documents are similar to the rows of a data table (that is, each record) at the same time, the database provides the search syntax to find shadows on ES, such as the database provides and, or logical operators, ES has must, should, and the database such as "like" The text matching feature is more powerful in ES. Still, ES is essentially a search engine.NoSQL and ES all have the same loosely structured structure, although we also have some discussion about whether ES can be used to replace non-relational databases (regardless of if ES is a nosql), but one reality is that

"Open source" rn-expandabletext:reactnative Long text folding component

"Open source" rn-expandabletext:reactnative Long text folding component

技术 8 months ago (09-19) Views: 97 Comments: 0

Introduced Mobile development often encounters this situation: we need to do a folding function for the text that is too long, so the react Native,rn-expandabletext is a component that solves the problem, and it is used in the same way as the native text component. But when your content exceeds the specified number of lines, it will help you to automatically fold the content.Click Expand to display all content. Project Address: Https://github.com/geekeren/RN-ExpandableText Install Expandabletext Usage Demos Properties Prop Description Default NumberOfLines The max number of lines the content is, the content exceed this value, the Expandview would show. 5 Expandview A callback function to return Expand-view, you can customize the Expand-view. When it ' s null, Expand-view'll disappear Unexpandview A callback function to return Unexpand-view. Usage the same as Expandview Onexpand A callback when the content expands - Oncollapse A callback when the content collapses - Follow Me Follow me on Wechat

登录

Forget password?

您也可以使用第三方帐号快捷登录

切换登录

注册

TW