SpringCould microservice protection and authorization rules 03 – Isolation and degradation (FeignClient integrates Sentinel, thread isolation, circuit breaker degradation, custom exception results, rule persistence, and push mode implementation)

Directory 3. Isolation and downgrade 3.1.FeignClient integrates Sentinel 3.1.1. Modify the configuration and enable the sentinel function 3.1.2. Write failure downgrade logic 3.1.3. Summary 3.2. Thread isolation (bulkhead mode) 3.2.1. How to implement thread isolation 3.2.2. Sentinel thread isolation 1) Configure isolation rules 2) Jmeter test 3.2.3. Summary 3.3. Circuit breaker downgrade 3.3.1. Slow call […]

SpringCould microservice protection 02 – three flow control modes (direct, association, link) and four flow control effects (fast fail, Worm up, queue waiting, hotspot parameter current limiting) (Sentinel component advanced option selection + Jmeter pressure test demonstration)

Directory 2. Flow control 2.1.Cluster point link 2.1.Quick Start 2.1.1.Example 2.1.2. Exercise: 2.2.Flow control mode 2.2.1. Association mode 2.2.2.Link mode 1) Add a method to query products 2) When querying an order, query the product 3) Add an order and check the product 4) Add resource tags to the query products 5) Add flow control […]

Web security and protection (XSS, CSRF, SQL injection)

XSS attack principle Xss (cross-site scripting) attacks refer to attackers inserting malicious html tags or javascript code into web pages. For example: ①The attacker places a seemingly safe link in the forum, deceives the user into clicking on it, and then steals the user’s private information in the cookie; ② Or the attacker adds a […]

RSTP, MSTP spanning tree protocol edge port, BPDU protection configuration

RSTP experiment: Experimental steps: 1. Configure vlan and interface type on the switch so that PC1 can ping pc2. 2. Modify the switch priority [SW1]stp priority 4096 3. Modify the switch spanning tree mode to RSTP[SW1]stp mode rstp 4. Configure the e/0/0/3 interface as an edge interface and observe the convergence speed. [SW1-Ethernet0/0/3]stp edged-port enable […]

ASP.NET Core Data Protection – Protect your application data

Data protection is an important feature in ASP.NET Core that provides a simple yet powerful way to protect sensitive data in your application, such as user credentials, tokens, and other sensitive information. In this article, we explore how to use ASP.NET Core data protection and provide corresponding source code examples. Import the required namespace First, […]

Microservice protection-Sentinel

First introduction to Sentinel Avalanche problems and solutions Avalanche Problem In microservices, the calling relationships between services are complex, and one microservice often depends on multiple other microservices. As shown in the figure, if service provider I fails, part of the current application’s business will also be blocked because it depends on service I. At […]

Level protection – Linux command list

Level protection – Linux command list 1. Basic commands uname -m displays the machine’s processor architecture uname -r displays the kernel version in use dmidecode -q displays hardware system components (SMBIOS / DMI) hdparm -i /dev/hda List the architectural characteristics of a disk hdparm -tT /dev/sda performs a test read of operating system information on […]

08. Sentinel flow control and interface protection

Spring Cloud microservices series of articles, click above to collect↑ 1. Introduction Sentinel is a traffic control and protection tool for distributed systems developed by Alibaba. It provides real-time monitoring, circuit breakers, current limiting and system protection functions, allowing services to maintain stability and reliability in the face of high concurrency and large traffic. For […]

The most comprehensive .NET/C# software protection & commercial licensing to date

Foreword First of all, there is no 100% protection measure for managed code generated by .NET/C#, because their program execution will eventually reach the binary/assembly level. The binary/assembly level can perform disassembly and reverse reconstruction of the instruction set (Risc-v/Arm64/x64/Loongarch64). Therefore, for the managed code generated by .NET/C#, all we can do is provide limited […]