@(服务监控)[logstash|Elasticsearch|kibana]
Logstash:用于收集、处理、传输日志数据。
Redis:用于实时标识和传输日志数据。
Elasticsearch:用于实时查询和解析数据。
Kibana:用于数据可视化。
/* | |
* Copyright (C) 2014 The Android Open Source Project | |
* | |
* Licensed under the Apache License, Version 2.0 (the "License"); | |
* you may not use this file except in compliance with the License. | |
* You may obtain a copy of the License at | |
* | |
* http://www.apache.org/licenses/LICENSE-2.0 | |
* | |
* Unless required by applicable law or agreed to in writing, software |
package com.ecloud.ssldemo; | |
import android.content.Context; | |
import android.util.Log; | |
import com.squareup.okhttp.OkHttpClient; | |
import org.apache.http.client.ClientProtocolException; | |
import org.apache.http.client.HttpClient; | |
import org.apache.http.conn.scheme.Scheme; |
This is a simple launchd config that will start your default
docker-machine on startup. You can customize the machine that is started by updating lines 11 and 16 with the correct machine name.
com.docker.machine.default.plist
below to ~/Library/LaunchAgents/com.docker.machine.default.plist
.launchctl load ~/Library/LaunchAgents/com.docker.machine.default.plist
// NOTE: this adds a filename and line number to winston's output | |
// Example output: 'info (routes/index.js:34) GET 200 /index' | |
var winston = require('winston') | |
var path = require('path') | |
var PROJECT_ROOT = path.join(__dirname, '..') | |
var logger = new winston.logger({ ... }) | |
// this allows winston to handle output from express' morgan middleware |
#!/bin/sh | |
## | |
## Bash install script for mongo 3.2 for Ubuntu 15.04, because of | |
## the replacement of upstart with systemd | |
## | |
## - AUTHOR: Alexandru Budurovici <https://w0rldart.com> | |
## - VERSION: 1.0 | |
## |
Putting cryptographic primitives together is a lot like putting a jigsaw puzzle together, where all the pieces are cut exactly the same way, but there is only one correct solution. Thankfully, there are some projects out there that are working hard to make sure developers are getting it right.
The following advice comes from years of research from leading security researchers, developers, and cryptographers. This Gist was [forked from Thomas Ptacek's Gist][1] to be more readable. Additions have been added from