Directory 3. Isolation and downgrade 3.1.FeignClient integrates Sentinel 3.1.1. Modify the configuration and enable the sentinel function 3.1.2. Write failure downgrade logic 3.1.3. Summary 3.2. Thread isolation (bulkhead mode) 3.2.1. How to implement thread isolation 3.2.2. Sentinel thread isolation 1) Configure isolation rules 2) Jmeter test 3.2.3. Summary 3.3. Circuit breaker downgrade 3.3.1. Slow call […]
Tag: protection
SpringCould microservice protection 02 – three flow control modes (direct, association, link) and four flow control effects (fast fail, Worm up, queue waiting, hotspot parameter current limiting) (Sentinel component advanced option selection + Jmeter pressure test demonstration)
Directory 2. Flow control 2.1.Cluster point link 2.1.Quick Start 2.1.1.Example 2.1.2. Exercise: 2.2.Flow control mode 2.2.1. Association mode 2.2.2.Link mode 1) Add a method to query products 2) When querying an order, query the product 3) Add an order and check the product 4) Add resource tags to the query products 5) Add flow control […]
Web security and protection (XSS, CSRF, SQL injection)
XSS attack principle Xss (cross-site scripting) attacks refer to attackers inserting malicious html tags or javascript code into web pages. For example: ①The attacker places a seemingly safe link in the forum, deceives the user into clicking on it, and then steals the user’s private information in the cookie; ② Or the attacker adds a […]
RSTP, MSTP spanning tree protocol edge port, BPDU protection configuration
RSTP experiment: Experimental steps: 1. Configure vlan and interface type on the switch so that PC1 can ping pc2. 2. Modify the switch priority [SW1]stp priority 4096 3. Modify the switch spanning tree mode to RSTP[SW1]stp mode rstp 4. Configure the e/0/0/3 interface as an edge interface and observe the convergence speed. [SW1-Ethernet0/0/3]stp edged-port enable […]
ASP.NET Core Data Protection – Protect your application data
Data protection is an important feature in ASP.NET Core that provides a simple yet powerful way to protect sensitive data in your application, such as user credentials, tokens, and other sensitive information. In this article, we explore how to use ASP.NET Core data protection and provide corresponding source code examples. Import the required namespace First, […]
Microservice protection-authorization rules/rule persistence
Authorization rules Basic rules Authorization rules can control the source of the caller, and there are two methods: whitelist and blacklist. Whitelist: Callers whose origin is in the whitelist are allowed to access Blacklist: Callers whose origin is in the blacklist are not allowed to access Click Authorization on the left menu to see the […]
Microservice protection-Sentinel
First introduction to Sentinel Avalanche problems and solutions Avalanche Problem In microservices, the calling relationships between services are complex, and one microservice often depends on multiple other microservices. As shown in the figure, if service provider I fails, part of the current application’s business will also be blocked because it depends on service I. At […]
Level protection – Linux command list
Level protection – Linux command list 1. Basic commands uname -m displays the machine’s processor architecture uname -r displays the kernel version in use dmidecode -q displays hardware system components (SMBIOS / DMI) hdparm -i /dev/hda List the architectural characteristics of a disk hdparm -tT /dev/sda performs a test read of operating system information on […]
08. Sentinel flow control and interface protection
Spring Cloud microservices series of articles, click above to collect↑ 1. Introduction Sentinel is a traffic control and protection tool for distributed systems developed by Alibaba. It provides real-time monitoring, circuit breakers, current limiting and system protection functions, allowing services to maintain stability and reliability in the face of high concurrency and large traffic. For […]
The most comprehensive .NET/C# software protection & commercial licensing to date
Foreword First of all, there is no 100% protection measure for managed code generated by .NET/C#, because their program execution will eventually reach the binary/assembly level. The binary/assembly level can perform disassembly and reverse reconstruction of the instruction set (Risc-v/Arm64/x64/Loongarch64). Therefore, for the managed code generated by .NET/C#, all we can do is provide limited […]