跳到主要內容

Install K8S on VM and spring boot integration.

Installation Environment Vmware Workstation pro  It is recommended to use the  snapshot  to store the state of each installation stage to avoid installation failures and causing the installation to start from scratch. Ubuntu 22.04 windows 11 Hardware settings  create 3 VM: 4 cores and 4G memory and 100G capacity Before installing K8s (All use the root user) set host: 192.168.47.135 master 192.168.47.131 node1 192.168.47.132 node2 set root ssh connection: sudo su - echo "PermitRootLogin yes" >> /etc/ssh/sshd_config systemctl restart sshd sudo passwd ssh-keygen for i in {master,node1,node2}; do  ssh-copy-id root@$i; done set Ipvs and conf  create conf file: for i in {master,node1,node2}; do ssh root@$i 'cat << EOF > /etc/modules-load.d/containerd.conf overlay br_netfilter EOF'; done execute conf: for i in {master,node1,node2}; do ssh root@$i 'modprobe overlay;modprobe br_netfilter;'; done create 99-kubernetes-cri.conf file: for i in {maste...

Proxy

Proxy in design pattern

The proxy pattern is a software design pattern, as a wrapper or agent object that is being called by the client to access the real serving object behind the scene.

There are two advantages:

  • Provides access control for real objects.
  • Provides additional functionality when accessing real objects.

And there are two types of proxy:
  • Static proxy: proxies are created manually. Java example on GitHub.
  • Dynamic proxy: proxies are created by JDK Proxy or CGLib Proxy with reflection.

JDK proxy

Before the proxy object is created, it must implement the invoke method of the InvocationHandler, which is invasive to the target object.
JDK Dynamic proxy can only proxy by the interface (so your target class needs to implement an interface, which is then also implemented by the proxy class)

CGLib proxy

The proxy object is created by implementing the intercept method of MethodInterceptor, and the target object does not need to implement this method but implements it through subclasses to reduce code invasion.

It is a byte instrumentation library used in many Java frameworks such as Hibernate or Spring. The bytecode instrumentation allows manipulating or creating classes after the compilation phase of a program.


reference:

https://en.wikipedia.org/wiki/Proxy_pattern

https://stackoverflow.com/questions/10664182/what-is-the-difference-between-jdk-dynamic-proxy-and-cglib

https://www.cnblogs.com/carpenterlee/p/8241042.html

https://www.baeldung.com/cglib

留言

這個網誌中的熱門文章

Install K8S on VM and spring boot integration.

Installation Environment Vmware Workstation pro  It is recommended to use the  snapshot  to store the state of each installation stage to avoid installation failures and causing the installation to start from scratch. Ubuntu 22.04 windows 11 Hardware settings  create 3 VM: 4 cores and 4G memory and 100G capacity Before installing K8s (All use the root user) set host: 192.168.47.135 master 192.168.47.131 node1 192.168.47.132 node2 set root ssh connection: sudo su - echo "PermitRootLogin yes" >> /etc/ssh/sshd_config systemctl restart sshd sudo passwd ssh-keygen for i in {master,node1,node2}; do  ssh-copy-id root@$i; done set Ipvs and conf  create conf file: for i in {master,node1,node2}; do ssh root@$i 'cat << EOF > /etc/modules-load.d/containerd.conf overlay br_netfilter EOF'; done execute conf: for i in {master,node1,node2}; do ssh root@$i 'modprobe overlay;modprobe br_netfilter;'; done create 99-kubernetes-cri.conf file: for i in {maste...

Mongo DB

Table of contents [ hide ] Mongo DB An open-source NoSQL file database. Due to the use of JSON document data storage structure, MongoDB has three advantages: flexibility, easy expansion, and high performance. Compared with traditional relational databases, users do not need to define the data structure in advance when using MongoDB to store data, and can freely add the Key/Value of the data. Basic concept SQL vs MongoDB Database vs Database Table vs Collection Row vs Document Column vs Field Index vs Index Primary key vs _id View vs View Table Joins vs $lookup Query Syntax Example SQL vs MongoDB a = 1 vs {a: 1} a<> 1 vs {a: {$ne: 1}} a > 1 vs {a: {$gt: 1}} a >= 1 vs {a: {$gte: 1}} a < 1 vs {a: {$lt: 1}} a <= 1 vs {a: {$lte: 1}} Aggregation  Pipeline Stages Description: Mongo DB vs SQL Filter criteria: $match vs where Projection: $project vs as Left outer join: $lookup vs left outer join Sort: $sort vs order by Group: $group vs group by Pagination: $skip/$limi...

OS basic

Table of contents [ hide ] OS architecture The operating system architecture consists of three parts, user mode, kernel mode, and hardware. User mode is for the application to execute the user's program. Kernel mode is to control all the I/O devices and system stability. Storage device hierarchy System call The system call is a kind of software interrupt, including six categories. Process control. File management. Device management. Information maintenance. Communication. Protection. System calls use three methods to pass parameters. Registers. The table in memory. Push onto the stack. A view of operating system services reference: https://www.amazon.com/-/zh_TW/Operating-System-Concepts-Abraham-Silberschatz/dp/1119800366/ref=sr_1_1?keywords=Operating-System-Concepts&qid=1669538704&s=books&sr=1-1