Java 做的大型网站用什么服务器软件?Tomcat、weblogic tomcat 区别还是其它...

来自子话题:
补充 &a data-hash=&4eba8afbcea300& href=&///people/4eba8afbcea300& class=&member_mention& data-editable=&true& data-title=&@飞焰& data-tip=&p$b$4eba8afbcea300&&@飞焰&/a& 的答案。方法是在内网设备安装SoftEther VPN Sever,这个软件支持&a href=&///?target=https%3A//zh.wikipedia.org/wiki/%25E5%258B%%BDNS& class=& wrap external& target=&_blank& rel=&nofollow noreferrer&&动态DNS&i class=&icon-external&&&/i&&/a&和&a href=&///?target=https%3A//zh.wikipedia.org/wiki/NAT%25E7%25A9%25BF%25E9%F& class=& wrap external& target=&_blank& rel=&nofollow noreferrer&&NAT穿透&i class=&icon-external&&&/i&&/a&,因此不需要端口映射就可以搭建VPN服务器。然后在客户端安装SoftEther VPN Client即可访问,也可以不安装,直接通过L2TP/IPSec或者OpenVPN协议连接。&br&搭完了,要点&br&&ol&&li&服务器端安装SoftEther VPN Server&/li&&li&创建新的VPN Server连接设置&br&&img src=&/9b8bb24eb4e668ee4d0fd_b.png& data-rawwidth=&777& data-rawheight=&568& class=&origin_image zh-lightbox-thumb& width=&777& data-original=&/9b8bb24eb4e668ee4d0fd_r.png&&要点:主机名必须为localhost&/li&&li&一路下一步,首先是创建虚拟HUB&br&这一步需要记住&i&&虚拟HUB名&&/i&&/li&&li&开启DDNS和VPN Azure&br&VPN Azure就是前面提到的NAT穿透工具,开启此项功能的前提是开启DDNS。&br&记住&i&&主机名&.&a href=&///?target=http%3A//vpnazure.net& class=& external& target=&_blank& rel=&nofollow noreferrer&&&span class=&invisible&&http://&/span&&span class=&visible&&vpnazure.net&/span&&span class=&invisible&&&/span&&i class=&icon-external&&&/i&&/a&&/i& 和&i&&端口号&&/i&&br&&img src=&/3bce35a13ed517e95cc265_b.png& data-rawwidth=&735& data-rawheight=&676& class=&origin_image zh-lightbox-thumb& width=&735& data-original=&/3bce35a13ed517e95cc265_r.png&&&/li&&li&[管理虚拟HUB] -& [管理用户] 添加用户,认证方式选择自己认为最方便的&/li&&li&客户端安装SoftEther VPN Client&/li&&li&配置客户端,新建连接,填入主机名、端口号、虚拟HUB名、用户认证信息&img src=&/ceafaff0fdb7b_b.png& data-rawwidth=&805& data-rawheight=&688& class=&origin_image zh-lightbox-thumb& width=&805& data-original=&/ceafaff0fdb7b_r.png&&&/li&&li&大功告成&br&&img src=&/21f9b995bdd2dee97cc4_b.png& data-rawwidth=&392& data-rawheight=&154& class=&content_image& width=&392&&&br&&/li&&/ol&注:服务器端[本地网桥设置]中的物理网卡一定要能访问互联网……我作服务器的笔记本无线网卡居然不能桥接,努力一个小时都没有解决,只好插网线了┑( ̄Д  ̄)┍&br&&br&附原版完整教程,单纯粘贴,点一个赞翻译一节。&br&&blockquote&&a href=&///?target=http%3A//www.softether.org/4-docs/2-howto/1.VPN_for_On-premise/2.Remote_Access_VPN_to_LAN& class=& wrap external& target=&_blank& rel=&nofollow noreferrer&&Remote Access to LAN&i class=&icon-external&&&/i&&/a&&br&Employees need to connect to the company LAN from outside or home? Remote Access VPN realizes virtual network cable from a Client PC to the LAN from anywhere and anytime.&br&&img src=&/84eaefbea120b17eac93_b.jpg& data-rawwidth=&439& data-rawheight=&550& class=&origin_image zh-lightbox-thumb& width=&439& data-original=&/84eaefbea120b17eac93_r.jpg&&&br&&b&Principles&/b&&p&&a href=&///?target=http%3A//www.softether.org/4-docs/2-howto/1.VPN_for_On-premise/1.Ad-hoc_VPN& class=& wrap external& target=&_blank& rel=&nofollow noreferrer&&The ad-hoc network&i class=&icon-external&&&/i&&/a& allows communications only for just VPN-established member PCs. However if your company has a lot of computers on the corporate network, it is not practical to install VPN Clients on all PCs on your company. This is the reason why Remote Access VPN is necessary for middle and large-scale corporate network.&/p&&p&Remote Access VPN is an extended topology of the ad-hoc network. The difference between ad-hoc VPN and remote-access VPN is similar to Wi-Fi Ad-hoc mode and Wi-Fi Infrastructure mode. With Wi-Fi Ad-hoc mode, every computers must connected to the single Wi-Fi segment. Unlike this, Wi-Fi Infrastructure mode allows communicating computers on both Wi-Fi segment and Physical Ethernet segment.&/p&&p&In order to build-up a Remote Access VPN you can use &a href=&///?target=http%3A//www.softether.org/4-docs/1-manual/3._SoftEther_VPN_Server_Manual/3.6_Local_Bridges& class=& wrap external& target=&_blank& rel=&nofollow noreferrer&&Local Bridge function&i class=&icon-external&&&/i&&/a& in order to connect between Virtual Private Network segment and physical Ethernet network segment. After that, any remote computers which are connected to the Virtual Hub via VPN will be treated as a part of the existing physical Ethernet segment.&/p&&br&&b&Step 1. Set up SoftEther VPN Server&/b&&p&You can &a href=&///?target=http%3A//www.softether.org/4-docs/1-manual/7._Installing_SoftEther_VPN_Server& class=& wrap external& target=&_blank& rel=&nofollow noreferrer&&set up SoftEther VPN Server&i class=&icon-external&&&/i&&/a& on a computer in your corporate network. It is recommended to set up VPN Server on a computer which has two network adapters where one is connected to the corporate network and another is connected to global Internet segment. However if you cannot prepare such an ideal server, you can try SoftEther VPN Server on a PC which has only one network adapter to the private network. Because SoftEther VPN Server has &strong&&a href=&///?target=http%3A//www.softether.org/4-docs/2-howto/6.VPN_Server_Behind_NAT_or_Firewall/1.Dynamic_DNS_and_NAT_Traversal& class=& wrap external& target=&_blank& rel=&nofollow noreferrer&&Dynamic DNS&i class=&icon-external&&&/i&&/a&&/strong& and &strong&&a href=&///?target=http%3A//www.softether.org/4-docs/2-howto/6.VPN_Server_Behind_NAT_or_Firewall/1.Dynamic_DNS_and_NAT_Traversal& class=& wrap external& target=&_blank& rel=&nofollow noreferrer&&NAT-Traversal&i class=&icon-external&&&/i&&/a&&/strong&function, you can reach to such a private PC from the Internet.&/p&&p&Installation is very easy by using Installer and Initial Setup Wizard based GUI.&/p&&img src=&/8beafd13de8da_b.jpg& data-rawwidth=&802& data-rawheight=&589& class=&origin_image zh-lightbox-thumb& width=&802& data-original=&/8beafd13de8da_r.jpg&&&br&&b&Step 2. Define Local Bridge between Virtual Hub and Physical Network Adapter&/b&&br&In order to allow remote accesses from client PCs to the corporate network, you must define &a href=&///?target=http%3A//www.softether.org/4-docs/1-manual/3._SoftEther_VPN_Server_Manual/3.6_Local_Bridges& class=& wrap external& target=&_blank& rel=&nofollow noreferrer&&a local bridge&i class=&icon-external&&&/i&&/a& between the Virtual Hub and the physical network adapter on the corporate network. Making a local bridge is done easily by Initial Configuration Wizard or you can add it manually after the initial setup.&br&&img src=&/39608fbd44dcb9ff8f33a_b.jpg& data-rawwidth=&658& data-rawheight=&609& class=&origin_image zh-lightbox-thumb& width=&658& data-original=&/39608fbd44dcb9ff8f33a_r.jpg&&&br&&b&Step 3. Create Users&/b&&br&On the VPN Server &a href=&///?target=http%3A//www.softether.org/4-docs/1-manual/2._SoftEther_VPN_Essential_Architecture/2.2_User_Authentication& class=& wrap external& target=&_blank& rel=&nofollow noreferrer&&you can add several user objects&i class=&icon-external&&&/i&&/a& on the Virtual Hub. Each user object has a password. After that, distribute pairs of username and password to each member of the VPN.&br&&img src=&/bb0ce20766_b.jpg& data-rawwidth=&811& data-rawheight=&461& class=&origin_image zh-lightbox-thumb& width=&811& data-original=&/bb0ce20766_r.jpg&&&br&&b&Step 4. Set up VPN Client on Each Member's PC&/b&&br&On each member's PC &a href=&///?target=http%3A//www.softether.org/4-docs/1-manual/8._Installing_SoftEther_VPN_Client& class=& wrap external& target=&_blank& rel=&nofollow noreferrer&&install SoftEther VPN Client&i class=&icon-external&&&/i&&/a&. Enter the server address, username and password for each PC.&br&If a member of the VPN is Mac OS X, iPhone or Android, &a href=&///?target=http%3A//www.softether.org/4-docs/2-howto/9.L2TPIPsec_Setup_Guide_for_SoftEther_VPN_Server& class=& wrap external& target=&_blank& rel=&nofollow noreferrer&&set up L2TP/IPsec VPN client&i class=&icon-external&&&/i&&/a& on each PC instead of SoftEther VPN. Another solution is to use OpenVPN Client on Mac OS X, iPhone or Android to connect to SoftEther VPN Server.&br&&img src=&/9b652e2e42dc1d5fad13889e51acff4f_b.jpg& data-rawwidth=&907& data-rawheight=&640& class=&origin_image zh-lightbox-thumb& width=&907& data-original=&/9b652e2e42dc1d5fad13889e51acff4f_r.jpg&&&br&&b&Step 5. Now Remote Access VPN is Ready to Use&/b&&br&Now each member PC can connect a VPN to the corporate network. After a VPN connection is established the client PC is regarded as a part of the destination network. Then a PC can use remotely any applications for LAN-oriented, for example groupware, SAP, SQL client and enterprise systems.&br&&img src=&/9f3ad5c0a54f2b5c754af_b.jpg& data-rawwidth=&375& data-rawheight=&550& class=&content_image& width=&375&&&/blockquote&
的答案。方法是在内网设备安装SoftEther VPN Sever,这个软件支持和,因此不需要端口映射就可以搭建VPN服务器。然后在客户端安装SoftEther VPN Client即可访问,也可以不安装,直接通过L2TP/IPSec或者OpenVPN协议连接。搭完了,要…
来自子话题:
很显然这是一个CAP问题。&br&&br&只能用一次,这是C。&br&验证必然有结果,这是A。&br&任何一台机器都能验证,即使他们之间不能通信,这是P。&br&&br&&br&结论,CAP不可能。&br&&br&和第三方储存根本没有关系,你的需求是要求CAP同时成立,而实际操作中,必然会放弃P,随便找台服务器来存就好了,大不了搞个热备。
很显然这是一个CAP问题。只能用一次,这是C。验证必然有结果,这是A。任何一台机器都能验证,即使他们之间不能通信,这是P。结论,CAP不可能。和第三方储存根本没有关系,你的需求是要求CAP同时成立,而实际操作中,必然会放弃P,随便找台服务器来存就好了…
来自子话题:
所以说为什么保险行业不发达很多事情就干不起来。原则上这都是要让保险公司来付账单。
所以说为什么保险行业不发达很多事情就干不起来。原则上这都是要让保险公司来付账单。
来自子话题:
谢邀(但是为什么有这么多曾经人人网的工程师回答这个问题?)&br&首先,大公司跟这事没关系,公司大不一定网站压力就大。&br&例如流量大的新闻网站,静态化就解决了未来100年的问题。&br&其次,压力大了也不一定在Java这一层做优化。比如这个百度的地址,它实际上是一个apache的module只是叫php,接近C1M级别的应用。&br&&img src=&/2a7f0a644f1b0fc99c632b60e3c81f17_b.jpg& data-rawwidth=&559& data-rawheight=&56& class=&origin_image zh-lightbox-thumb& width=&559& data-original=&/2a7f0a644f1b0fc99c632b60e3c81f17_r.jpg&&&br&所以要站的更高一些,先明确有哪些问题,再选择合适的技术。&br&&br&我现在的公司和上一家公司,都是用Java的。&br&集群都是(四位数)台的规模。&br&都是用C++写过一遍发现太麻烦了,才改用Java的。&br&用Java之后都自己发明了自己的框架。&br&&br&======== 以上是答案 以下是吐槽 正经人可以翻页了 ========&br&工程师都喜欢造轮子,我也写过。但是我现在的观点是能凑合用尽量凑合用。&br&1 绝大部分人开始写框架时候,还没用会其他开源框架。&br&因为无知所以无畏,这件事还要老板买单,是不可理喻的。只有(我不能说名字)这种有钱任性的公司能坚持。&br&2 写了也没有实质改进,还没精力维护。&br&开源框架虽然不是特别好,但是在平衡的选择上还是有意义的。自己开发的框架选择了一个平衡,必定失去另外一个平衡。&br&例如很早很早以前,校内网用过Hibernate,后来还是改成裸写SQL了。我觉得这个选择就是对的。一个框架用着方便,执行时必定有一些限制。既要做XX又要立XX的事情客观上是不存在的。&br&3 技术无优劣。&br&能简单高效完成任务就是正确的,这也是大公司喜欢自己写框架的原因,人,真的便宜。
谢邀(但是为什么有这么多曾经人人网的工程师回答这个问题?)首先,大公司跟这事没关系,公司大不一定网站压力就大。例如流量大的新闻网站,静态化就解决了未来100年的问题。其次,压力大了也不一定在Java这一层做优化。比如这个百度的地址,它实际上是一…
来自子话题:
我之前为日本旅游做了一些关于国际漫游费用的攻略,也搜集整理了一些国外上网的方法,拿出来跟你分享下。&br&以日本旅游为例,国内三大运营商国际漫游都是按照流量计费的:&br&&img src=&/ad409970faaccd_b.jpg& data-rawwidth=&818& data-rawheight=&412& class=&origin_image zh-lightbox-thumb& width=&818& data-original=&/ad409970faaccd_r.jpg&&&img src=&/25dad0c629d6aa0d18e699_b.jpg& data-rawwidth=&939& data-rawheight=&473& class=&origin_image zh-lightbox-thumb& width=&939& data-original=&/25dad0c629d6aa0d18e699_r.jpg&&&img src=&/25e8d3613d50dae60d135ee_b.jpg& data-rawwidth=&696& data-rawheight=&179& class=&origin_image zh-lightbox-thumb& width=&696& data-original=&/25e8d3613d50dae60d135ee_r.jpg&&&br&我平时的用网习惯大概是:必浏览每日头条新闻、随时可能会发自拍、微信/微博这类社交软件需要随时在线,每天大概需要40M-60M流量,去日本旅游10天,即使选择开通最便宜的中国移动国际漫游,也需要300多元。&br&当时看到这个费用的时候,还是感觉开通国际漫游小贵一些,可是又不想做断网族,所以后来就去咨询了一些去过日本旅游的朋友,整理出了一些其他的方式。&br&1)【蹭免费WiFi】&br&&img src=&/88b0ed5f7691f848ffd3_b.jpg& data-rawwidth=&732& data-rawheight=&299& class=&origin_image zh-lightbox-thumb& width=&732& data-original=&/88b0ed5f7691f848ffd3_r.jpg&&&br&在日本的除4花、5花酒店外,还有些公共场所也可以提供免费wifi上网;但是大部分都有时长要求,或者需要提供一些身份证件才能使用。如果不想花钱,可以选择蹭各地免费wifi的方式解决上网问题,当然,且不论信号是不是很好,对于这种不能随时随地上网的情况,我个人还是不太接受;&br&2)【租出国随身WiFi产品】&br&&img src=&/a88b332df29bb895febd584_b.jpg& data-rawwidth=&296& data-rawheight=&184& class=&content_image& width=&296&&&br&其实,现在市面上已经有很多种出国随身WiFi产品了,尤其是在自由行人群里,这类产品已经算是旅游必带装备了。现在提及的比较多的环球漫游,就是专门租赁出国随身wifi设备的。他们是跟各个国家顶级运营商合作的,通过wifi设备你可以享受当地最优质网络,而且不限制上网时长及流量。我后来去日本租的就是环球漫游的随身WiFi,产品很小巧,直接可以装进兜里,随时随地都可以上网。我当时是全家4个人一起使用,全程4G网络,网速很好,信号也很稳定,而且我当时租的时候正好赶上环球漫游的egg做活动,费用是一天18块钱。&br&3)【购买国内运营商推出的目的地上网卡】&br&&img src=&/f0cec3df94b08ce634aaa60ad6f1632e_b.jpg& data-rawwidth=&298& data-rawheight=&171& class=&content_image& width=&298&&&br&去日本比较有代表性的是购买日本的樱花卡,是一张3G上网卡,可以在联通网上营业厅购买。在日本有NTT docomo(日本最大的网络运营商),AU(日本第二大网络运营商),Softbank(日本第三大网络运营商,比起前两家,主要输在了信号和通话质量上)等几家运营商,樱花卡只能在日本使用Softbank网络,其他网络不能用,并且一次性使用,不可充值。你的手机只要是支持联通3G(WCDMA)的移动电话就可以使用。费用大概是1G流量的话200块钱左右。&br&4)【购买目的地运营商的手机及手机卡】&br&日本的手机制式跟中国的不同,如果要用当地的手机卡,就要先购买一部当地的手机。但是在日本购买手机是有一定条件的:①必须具有在日本滞留三个月以上的签证;②必须有外国人登陆证到三大运营商的任何一家签署合同,同时购买手机;③日本的手机通许体系完全不同于任何国家,因此只能通过三大运营商购买手机和服务;④虽然有预付卡手机,但现在只限于Softbank一家,而且手机种类只有两种非智能手机,只限于打电话和收发短信,所购预付卡为5000日元,必须在三个月内用完。如果你是短期去日本旅游的话,强烈建议你不要选择这种方式。
我之前为日本旅游做了一些关于国际漫游费用的攻略,也搜集整理了一些国外上网的方法,拿出来跟你分享下。以日本旅游为例,国内三大运营商国际漫游都是按照流量计费的:我平时的用网习惯大概是:必浏览每日头条新闻、随时可能会发自拍、微信/微博这类社交软…
来自子话题:
讲个刚刚经历的事呀,也许能给你些灵感。&br&隔壁老王是个勤俭持家的人,不舍得花钱装宽带,上网从来只有蹭。有一天,他发现我家的Wi-Fi密码简单且常年不换,大体猜想女孩子嘛,小白而已。于是,他如愿蹭上了我家的Wi-Fi,虽说我也常觉得有时网速卡的过分,也只埋怨了老旧的路由器和中国电信。如此一来,竟然也相安无事一两年。&br&直到上周五,在用airplay投屏时居然发现了除了我的设备外,还有出现了一个“书房”。要知道airplay只支持局域网内的设备,而且多用于网络盒子、智能电视、apple tv,这可是海量的流量!老王真心想把我刚刚升级到30m的流量用到极致呀!小白是个酷爱网络盒子和在线视频的人,想到心爱的美剧会更卡,一下子觉的愤怒起来。赶紧查了无线路由的在线设备清单,却只有我的几台设备,每个Mac地址都无误。感谢度娘,她总能提供及时的信息,原来这世上有蹭网卡,蹭网软件,伪装mac,还有许多许多我看不懂的名词。无论懂没懂,最后总算能确认我被蹭网了,还是个使用专用设备或拥有专用技术的人。&br&既然知道了,就要准备把他踢出去了。鉴于他修改了mac地址,在局域网内隐藏了ip,用arp -a是很难直接把他找出来的。首先要排查他盗用了哪一台设备的mac,我将自己的每一个设备逐一关闭wifi后,观察Wi-Fi在线设备的清单变化。几台设备试下来都不是。再继续在网上搜索“如何蹭网”,发现伪装成网关也是一个办法。接下来,就遭遇到奇迹般的一刻。我登录了电信猫,电信猫的内网设备信息里有我所有的设备和两台路由器(电信、无线),且IP地址与无线路由的网段时不一致的。我并不明白,电信猫里应该只有两个设备,一个是用有线的主机、一个是无线路由。但同一设备几个IP地址还是蛮奇怪的。我决定重启电信猫,重启后登录管理界面,但几秒钟后就被踢下来了,显示有一用户在登录,主机的以太网原有IP被占用。等了240秒后重新登录电信猫,改了电信猫的密码(电信太坏,不能直接改用户名),重启,发现还需等240秒,他的设备居然能自动更新密码)。关闭无线猫,重启电信猫,顺利登录,此时内网设备信息里只有主机的mac地址,没有电信猫的mac.我终于明白了他是如何实现蹭网的了。首先他知道我的无线路由的密码,也能猜想的到电信猫的登录名和密码(第一大败笔,我以为没有无线功能的猫密码改不改无所谓的),然后,使用中继站之类的无线路由设备,将起Mac地址伪装成电信猫的mac地址,这样我即便登录了电信猫,看到了内网设备里有电信猫的地址大概也不会觉得奇怪。小白嘛。&br&在决定踢老王出网时,我就决定先不打草惊蛇。即使换了小米路由器,2.4G段的用户名和密码都没有改,也压抑了直接推送视频到他的电视或盒子的冲动。在知道来龙去脉后就很简单了,重新修改无线路由和电信猫的登录密码、wifi密码,没隐藏广播(我觉得那样自己使用不方便)。但这也不能避免下次被蹭,且看小米路由的反蹭网功能是不是很及时。关于防蹭网,除了及时更新密码,过段时间登录一次电信猫,竟无一劳永逸之法。&br&现在想想,也有一点老王还算厚道,没有直接改我电信猫的登录密码,虽说可以通过重启解决,毕竟很麻烦,也许还要找电信工程师上门。
讲个刚刚经历的事呀,也许能给你些灵感。隔壁老王是个勤俭持家的人,不舍得花钱装宽带,上网从来只有蹭。有一天,他发现我家的Wi-Fi密码简单且常年不换,大体猜想女孩子嘛,小白而已。于是,他如愿蹭上了我家的Wi-Fi,虽说我也常觉得有时网速卡的过分,也只…
来自子话题:
1. 十几行代码内就能用很多动态语言写个能响应http的服务器了。很久没写C++不过至少在我写它的时候还做不到哇。&br&2. 我还记得几年前自己被丢到X京某项目抓一个内存泄漏的惨状阿。&br&3. 多少次帮人调内存操作的bug,一块覆盖了另一块阿什么的,每次调试都觉得好苦逼阿。&br&4. 项目要招C++人士阿,我会跟你说打了无数电话最后面来的也还是不满意么,我会跟你说老后悔还不如招个长相甜美的妹子来提高效率么?现在好多学校已经不教C++了有木有阿!&br&5. 动态改行为而不重新部署不用脚本语言用动态连接会很蛋疼阿&br&&br&如果不是性能上必要的考虑,为什么一定要C++阿?要安全一点严肃一点就用Java阿,要潦草一点娱乐一点用脚本语言。&br&&br&另外,&br&已经被反驳过的一些观点:&br&----c++编译时的数据类型检查可以发现很多问题,而脚本语言把一些问题隐瞒了,导致bug数增加,为了保证质量增加的单元测试/测试时间反而延长了&br&类型检查单元测试什么的&br&我原本也很不喜欢么弱类型的语言,但是后来做了几个赶时间的项目就习惯了。看你服务器需要多强壮了,我如果只是写个内部用的monitor server,垮了就重启,甚至CGI都不用重启,类型检查单元测试什么的不是太浮云了么。&br&&br&脚本语言处理字符串很方便&br&----有强大的库时c++处理字符串也很强大&br&这个我也承认。。不过C++多加一个第三方库的安装部署成本也是杠杠的多多了。。尤其还要跨平台的话。。&br&&br&脚本语言不需要分配释放内存&br&----写服务器时c++基本上也不需要分配释放内存。我们团队10万行代码里面手动分配释放内存的地方不到10处。绝大多数地方用局部变量、库来处理。&br&。。。看什么样的server了。。有一个泄漏就忙死你。&br&&br&脚本语言的库很多,c++开源库不够用&br&----为c++提供一个强大稳定的库确实很费人力和时间,但不幸的是公司前几年已经做好了这件事情&br&恩,我只看到前半句。。&br&&br&脚本语言不需要编译&br&----只要不改基础库,c++ make一下不过几秒种;基础库无论用脚本还是c++都不能随便改,改了就要大规模测试其兼容性。&br&make一下很方便但是还是有很多垮平台的东西要自己整阿。。那些又不会凭空解决。每次看到一大堆按照平台条件编译的代码我就觉得很蛋疼阿。&br&&br&脚本语言实现逻辑更简单&br&----不认同这一点,用c++写一个if-else和脚本写本质上来说没太大区别,其它逻辑结构也一样。&br&恩。。如果能把template/macro用到雌雄莫辨的地步,C++写东西有时候比别的语言简单很多。。但是这样维护其来很混蛋阿有木有。。&br&至于C++ lamda什么的刚加进来我还没用过不作评价。。不过C++演进和加feature的速度难道不坑爹么??
1. 十几行代码内就能用很多动态语言写个能响应http的服务器了。很久没写C++不过至少在我写它的时候还做不到哇。2. 我还记得几年前自己被丢到X京某项目抓一个内存泄漏的惨状阿。3. 多少次帮人调内存操作的bug,一块覆盖了另一块阿什么的,每次调试都觉得好苦…
来自子话题:
1.首先要自己实现一个网络库,或者选择已经开源的网络库。比如:muduo、libevent、boost的asio等。&br&2.实现核心功能:连接管理,消息管理,定时器,事件机制,Lua脚本引擎,程序模块管理。&br&3.实现完2中的功能后就可以用这些搭建分布式的程序了。可以着手实现网关, DB服务器,以及游戏逻辑服务器等等。
1.首先要自己实现一个网络库,或者选择已经开源的网络库。比如:muduo、libevent、boost的asio等。2.实现核心功能:连接管理,消息管理,定时器,事件机制,Lua脚本引擎,程序模块管理。3.实现完2中的功能后就可以用这些搭建分布式的程序了。可以着手实现网…
来自子话题:
来黑TP的。一年前TP质量还是可以的。不过最近我连买2个TP,都坏了,时不时断网,网速过慢。火大
来黑TP的。一年前TP质量还是可以的。不过最近我连买2个TP,都坏了,时不时断网,网速过慢。火大
来自子话题:
徐小平投的又一个烂项目。
徐小平投的又一个烂项目。
来自子话题:
1、全球共13台根域名服务器,编号从A到M&br&2、每一台根域名服务器,都有大量的镜像服务器,所以说13组域名服务器更合适一些&br&3、根域名服务器的大致地点是可以确定的,但是这个地点远远不能具体到可以接近的精确度,具体可以参考 &a href=&///?target=http%3A//en.wikipedia.org/wiki/Root_name_server& class=& wrap external& target=&_blank& rel=&nofollow noreferrer&&wikipedia.org 的页面&i class=&icon-external&&&/i&&/a&
1、全球共13台根域名服务器,编号从A到M2、每一台根域名服务器,都有大量的镜像服务器,所以说13组域名服务器更合适一些3、根域名服务器的大致地点是可以确定的,但是这个地点远远不能具体到可以接近的精确度,具体可以参考
来自子话题:
closure只是用来封装callback的语法糖罢了,对解决反人类的异步回调并没有太多帮助。&br&&br&真正解决这个问题的是,是异步操作同步化,就是说,实际上是异步的操作,然而使用者可以用同步的方式写代码,因为底层封装了这些异步操作的细节。&br&&br&你可以看看Erlang就是这样的。
closure只是用来封装callback的语法糖罢了,对解决反人类的异步回调并没有太多帮助。真正解决这个问题的是,是异步操作同步化,就是说,实际上是异步的操作,然而使用者可以用同步的方式写代码,因为底层封装了这些异步操作的细节。你可以看看Erlang就是这…
来自子话题:
叮当app,不用开发就搞定。 嗯,最好别让你们客户知道,否则你们就没生意了。
叮当app,不用开发就搞定。 嗯,最好别让你们客户知道,否则你们就没生意了。
来自子话题:
现在真正成熟的能将一个集群的计算机以虚拟化的方式来提供CPU时间片, 内存, 硬盘空间的 云计算服务 仅仅只有 goole和 amazon 而已。。。(facebook我不是很清楚,因为我接触facebook开源的东西还是06年的,不过我觉得有很大可能facebook内部也是基于云平台的)&br&&br&这里说的 虚拟化方式提供 CPU时间片, 内存, 硬盘空间指的是,所有的这些资源, 都可能是由不同集群来提供的,而且是抽象集群式的提供这些资源。 至少以我所知, amazon和google的平台系统比 HDFS(这个其实不适合存储很多小文件), Hadoop(仅仅是分布计算), zookeeper, Hive(不太了解)这些分散的开源的云计算组件好很多&br&&br&至于国内,有一句话叫,&b&国外一开源,国内就自主, 大多是基于Hadoop 之类的改的。。。&/b&
现在真正成熟的能将一个集群的计算机以虚拟化的方式来提供CPU时间片, 内存, 硬盘空间的 云计算服务 仅仅只有 goole和 amazon 而已。。。(facebook我不是很清楚,因为我接触facebook开源的东西还是06年的,不过我觉得有很大可能facebook内部也是基于云平…
来自子话题:
关于Linux学习方面的建议: &ol&&li&先看一遍王垠的《完全用Linux工作》。Linux入门阶段是很苦逼的。身边没有人会、需要放弃已有的习惯。看一遍这个文章垫着&/li&&li&安装Linux。任何发行版,随便折腾。当然最好是单系统。如果不行,就虚拟机。&/li&&li&把coreutils, findutils, shellutils, fileutils, textutils每个命令的manpage都看一遍。直接上手执行,不要光看不练&/li&&li&把bash的manpage看一遍。bash脚本是基本功&/li&&li&学习至少1门脚本语言。python、perl、php都是很好的选择&/li&&/ol&关于系统运维方面的建议:&ol&&li& 做完以上几条&/li&&li&看HTTP协议的基础知识 &br&&/li&&li&看apache、nginx的changelog,多翻他们的文档,以及bug tracker&br&&/li&&li&学习你负责维护的web脚本语言。这个可以慢慢积累&/li&&li&学习系统状态监控,玩玩collectd、snmp之类的东西 &br&&/li&&/ol&&b&&i&P.S. 以上回复纯属瞎掰,请勿全信 :-)&/i&&/b&
关于Linux学习方面的建议: 先看一遍王垠的《完全用Linux工作》。Linux入门阶段是很苦逼的。身边没有人会、需要放弃已有的习惯。看一遍这个文章垫着安装Linux。任何发行版,随便折腾。当然最好是单系统。如果不行,就虚拟机。把coreutils, findutils, shell…
来自子话题:
&img data-rawheight=&1270& data-rawwidth=&1314& src=&/93a6b2acc89b46fc4d7722_b.jpg& class=&origin_image zh-lightbox-thumb& width=&1314& data-original=&/93a6b2acc89b46fc4d7722_r.jpg&&&img data-rawheight=&1248& data-rawwidth=&1584& src=&/b3ae181db09fc93df035cc_b.jpg& class=&origin_image zh-lightbox-thumb& width=&1584& data-original=&/b3ae181db09fc93df035cc_r.jpg&&&img data-rawheight=&1184& data-rawwidth=&1352& src=&/deccdd3c7f9a_b.jpg& class=&origin_image zh-lightbox-thumb& width=&1352& data-original=&/deccdd3c7f9a_r.jpg&&&img data-rawheight=&1234& data-rawwidth=&1504& src=&/1aac29f5f731c59ca029eaf_b.jpg& class=&origin_image zh-lightbox-thumb& width=&1504& data-original=&/1aac29f5f731c59ca029eaf_r.jpg&&&img data-rawheight=&1150& data-rawwidth=&1278& src=&/64a58050acaba6f6fb9e_b.jpg& class=&origin_image zh-lightbox-thumb& width=&1278& data-original=&/64a58050acaba6f6fb9e_r.jpg&&
来自子话题:
6月17日晚,央视《消费主张》联合金山毒霸安全工程师播出了《危险的WiFi》节目,已证明这些危险是真实存在的,并详细解读了WiFi上网为什么十分危险形同裸奔。&br&&br&视频链接:&a href=&///?target=http%3A//tv.cn//VIDE7576.shtml& class=& wrap external& target=&_blank& rel=&nofollow noreferrer&&《消费主张》
关注移动互联安全——危险的Wi-Fi_经济频道&i class=&icon-external&&&/i&&/a&&br&&br&&b&从WiFi连接原理看危险:&/b&&br&&br&手机和Pad中都有无线网卡,当你的无线网卡开启时,网卡就会隔段时间广播查找周围有没有可以连接的WiFi热点:张三路由器(WiFi接入点名称)你在不在,我要上网。张三路由器如果在就连接,不在就接着喊下一个已保存的连接点:“李四路由器你在不在,我要上网”。&br&&br&无线网卡这样向周围喊着要上网,黑客装置就能监听到,马上创建一个路由器叫李四,然后回应说:“我是李四我是李四,来我这里上网”。然后,你的手机或Pad就通过这个黑客装置上套了。&br&&img src=&/843a9a374d5deca1c48bac8_b.jpg& data-rawwidth=&912& data-rawheight=&917& class=&origin_image zh-lightbox-thumb& width=&912& data-original=&/843a9a374d5deca1c48bac8_r.jpg&&图1 WiFi自动连接被钓鱼&br&&br&WiFi陷阱如此简单,攻击者具体是怎么做的呢,金山毒霸安全专家描述了几种场景。&br&&br&&b&危险一:WiFi钓鱼陷阱&/b&&br&&br&许多商家为招揽客户,会提供WiFi接入服务,客人发现WiFi热点,一般会找服务员索要连接密码。黑客就提供一个名字与商家类似的免费WiFi接入点,吸引网民接入。比如在王府井附近,用来钓鱼的WiFi名就被命名为WangFujin_Free,很快就能发现逛街累了的人们接了进来。&br&&img src=&/c65444efe5e5f50cc27ed2be6d37b3d8_b.jpg& data-rawwidth=&622& data-rawheight=&391& class=&origin_image zh-lightbox-thumb& width=&622& data-original=&/c65444efe5e5f50cc27ed2be6d37b3d8_r.jpg&&图2 消费主张播出《危险的WiFi》-画面展示连接到免费的WiFi陷阱&br&&br&一旦连接到黑客设定的WiFi热点,你上网的所有数据包,都会经过黑客设备转发,这些信息都可以被嗅探下来分析,一些没有加密的通信就可以直接被查看。&br&&br&于是,你在免费上网,就如同在互联网上裸奔。黑客可以知道你上网买了什么东西,在朋友圈看了什么图片和视频,还可以冒用你的身份去发微博,查看你和朋友聊天的私信。&br&&br&&b&危险二:WiFi接入点被偷梁换柱&/b&&br&&br&攻击者创建一个和正常WiFi名称完全一样的接入点,当网络信号不好时,你的连接可能中断,并瞬间切换到同名的WiFi陷阱中。&br&&br&方法是这样的:&br&你在喝咖啡,另一个人在你附近也在喝咖啡,不过,这个人的目的不是喝咖啡,而是带着一个可以WiFi攻击的小装置。由于咖啡厅的无线路由器信号覆盖不够稳定,你的手机正常连接会掉线,再自动连接到攻击者创建的WiFi热点上,接下来,你的上网过程就形同裸奔了。&br&&img src=&/aa2a9052ceadbf63d5566a_b.jpg& data-rawwidth=&607& data-rawheight=&377& class=&origin_image zh-lightbox-thumb& width=&607& data-original=&/aa2a9052ceadbf63d5566a_r.jpg&&图3 测试表明,伪造同名WiFi热点,手机会连接信号较强的一个&br&&br&&b&危险三:黑客主动攻击&/b&&br&&br&这是最讨厌的,也是最危险的,属于明显带有敌意。黑客可以使用黑客工具,攻击正在提供服务的无线路由器,干扰连接,家用型路由器抗攻击的能力较弱,你的网络连接就这样断线,继而连接到黑客设置的无线接入点。&br&&br&看到这里,你会想,在外面上网也太危险了,还是回家去。然而在家里上网,也可能被攻击,当然这种可能性要小许多。如果采取必要的措施,在家上网基本上比较安全。&br&&br&下面金山毒霸安全专家讲述第四种危险。&br&&br&&b&危险四:攻击家用路由器&/b&&br&&br&这种危险与以上三种不同,攻击者首先会使用各种黑客工具破解家用无线路由器的连接密码,如果破解成功,黑客就成功连接你的家用路由器,和你共享一个局域网,就是人们常说的被蹭网。&br&&br&攻击者并不甘心免费享用你的网络带宽,有些人还会进行下一步,尝试登录你的无线路由器管理后台。&br&&br&由于市面上存在安全隐患的无线路由器相当常见,黑客很可能破解你的家用路由器登录密码。甚至不用破解密码,直接使用黑客工具攻击你的网络,强制让你点击一个利用漏洞攻击路由器的链接,路由器DNS(域名解析服务器)就会被篡改。&br&&img src=&/02aad5e5d7cc25efde6b_b.jpg& data-rawwidth=&626& data-rawheight=&453& class=&origin_image zh-lightbox-thumb& width=&626& data-original=&/02aad5e5d7cc25efde6b_r.jpg&&图4 家用路由器被入侵之后,黑客常用的伎俩是篡改DNS&br&&br&这种往往是图财的黑客,他对你的个人信息可能兴趣不大,攻击你的目的是让你天天上网帮他点广告挣钱。如果他更坏一点,会欺骗你点击钓鱼网站,让你蒙受更大的损失。&br&&br&&b&掉进WiFi陷阱之后的危害&/b&&br&&img src=&/e2bece2ff86fc608d0f044047cec8806_b.jpg& data-rawwidth=&454& data-rawheight=&457& class=&origin_image zh-lightbox-thumb& width=&454& data-original=&/e2bece2ff86fc608d0f044047cec8806_r.jpg&&图5 掉入WiFi钓鱼陷阱的危害&br&&br&&b&危害一:访问钓鱼网站丢失敏感信息&/b&&br&&br&当你访问购物网站时,攻击者弹出用优惠信息做诱饵的钓鱼网站,如果你错误的在钓鱼网站提交自己的登录ID,严重时,将自己网银的关信息提交到网站上,这种情况就极可能产生直接的经济损失。&br&&br&&b&危害二:被偷窥如同裸奔而浑然不觉&/b&&br&&br&当你通过黑客提供的WiFi上网时,你上网的所有痕迹,都会被监听。 除那些被加密的信息,黑客需要下功夫破解之外,明文的访问记录就会被看得清清楚楚。比如你看新闻、看相册、浏览朋友圈、刷微博、逛淘宝等等,都会被另一只眼盯着。&br&&br&&b&危害三:身份被冒用&/b&&br&&br&如果你掉进WiFi陷阱刷微博,黑客可直接劫持你的访问令牌,不需要得到你的帐号密码,直接用你的身份发微博,看你和朋友的私信。类似攻击还可针对其他服务。&br&&br&&b&危害四:强制点击广告&/b&&br&&br&用你的点击来给攻击者赚钱,这种攻击特别多见于家用路由器被入侵,攻击者篡改DNS之后,每天上网会有讨厌的广告,每天你只要上网就给攻击者打工赚钱。每次购物,攻击者都能拿到从店主那里得到佣金分成。当然,羊毛出在羊身上,这笔钱,最终成为购物成本的一部分。&br&&br&&b&公共WiFi还敢用吗?&/b&&br&&br&利用WiFi钓鱼的攻击成本越来越低,一种类似于无线路由器,可外接移动硬盘、3G上网卡的攻击装置几百块就可以在网上买到。&br&&br&政府花重金打造地方信息港,提供免费WiFi服务,商家为吸引顾客,提供免费WiFi服务。在人们越来越熟悉WiFi服务时,攻击者混了进来。公共WiFi还敢用吗?连安全专家都不敢轻易下这个结论。&br&&br&&b&让WiFi能更安全一些&/b&&br&&br&首先要说明,没有100%的安全,只能让可能的安全风险降低一些,让攻击者不那么容易得手。&br&&br&&b&可以有这些办法:&/b&&br&&br&1.在你不需要上网时,请关闭手机或Pad的无线网卡;仅在需要快速上网时,才打开WiFi。&br&&br&2.使用运营商提供的2G、3G、4G数据上网,风险比公共WiFi要小。&br&&br&3.尽量不在公共WiFi使用网银或购物,不在公共WiFi环境下载安装软件。&br&&img src=&/52ea0beff2_b.jpg& data-rawwidth=&421& data-rawheight=&269& class=&origin_image zh-lightbox-thumb& width=&421& data-original=&/52ea0beff2_r.jpg&&图6 公共WiFi陷阱示意图&br&&br&4.安装手机安全软件(如金山手机毒霸),拦截可能的安卓病毒和钓鱼网站攻击。&br&&br&5.使用金山毒霸路由管理大师,防止家用路由器被蹭网,被入侵。&br&&img src=&/dcdef08e0daffc1ebb4c299_b.jpg& data-rawwidth=&463& data-rawheight=&604& class=&origin_image zh-lightbox-thumb& width=&463& data-original=&/dcdef08e0daffc1ebb4c299_r.jpg&&图7 金山毒霸路由管理大师
6月17日晚,央视《消费主张》联合金山毒霸安全工程师播出了《危险的WiFi》节目,已证明这些危险是真实存在的,并详细解读了WiFi上网为什么十分危险形同裸奔。视频链接:从WiFi连接原理看危…
来自子话题:
这个问题老实说没有意义,只有最合适的,没有最好的。&br&&br&而且Nagios和zabbix属于不同的领域,前者是开源软件,后者是商业开源软件。&br&&br&在商业开源领域,zabbix的竞争者是hyperic和zenoss,以及groundworks。下面列出Gartner对这个领域的分析:&br&&b&The Commercial Open-Source Monitoring Landscape&/b&&br&&br&&p&As enterprises have adopted open-source monitoring tools, there is growing market demand by enterprises that were not comfortable relying on community support channels. This created a business opportunity for commercial open-source vendors to enter the market providing support options, which evolved from basic support to advanced support. Some vendors offer multiple tiers of software coupled
these offerings include enhanced tools and support. The commercial open-source vendors positioned themselves as utilizing community development resources, but have since discovered they must fund and control the road map and development. All vendors discussed in this research have strong communities where users collaborate and share plug-ins and other enhancements, while the provider controls the release of software.&/p&&br&&p&Some sample vendors with commercial open-source offerings include GroundWork, Merethis, Nagios, VMware, Zabbix and Zenoss. These vendors are reporting growth driven by the demands of managed service providers, enterprises cutting software costs and simplification of monitoring needs.&/p&&br&&p&All products, aside from VMware's offering, allow for Nagios's community-developed plug-ins to be deployed in the product. Active developers from all these vendors are developing open-source and commercial open-source offerings, creating value for customers as and the community. There is additional dedicated staff for professional services, support, sales, marketing and additional functions.&/p&&br&&b&GroundWork: GroundWork Monitor Enterprise&/b&&br&&br&&p&Based in California and included in the Gartner Magic Quadrant for Event Correlation and Analysis, GroundWork packages many open-source products into a tested bundled release with support offerings. The commercial offering includes features such as better visualization, integration with many ticketing systems, public cloud provider monitoring (Eucalyptus, Amazon Elastic Compute Cloud [Amazon EC2]), multitenancy for managed services providers, Java application monitoring via Java Management Extensions (JMX) and increased reporting capability across these tools. GroundWork has optimized the platform for increased scalability. The product also includes a publicly documented software development kit (SDK) consisting of SOAP/XML Web services that allows the platform to be extended with simple development efforts. The modifications done to existing open-source tools are contributed back to the open-source community, as well as being packaged into a community-supported open-source release called GroundWork Monitor Community Edition.&/p&&br&&b&Nagios: Nagios XI&/b&&br&&br&&p&Minnesota is the headquarters for the commercial offering by the Nagios development team, which is at the core of the company's open-source product. The product adds additional dashboarding, customization, performance graphing and additional features. The commercial offering also includes support for a low yearly fee. Nagios has spawned several commercial open-source solutions, including GroundWork Monitor and Merethis Centreon.&/p&&br&&b&VMware: VMware vFabric Hyperic&/b&&br&&br&&p&Based in California, VMware offers Hyperic, which competes differently than many similar options, the differentiator being the depth monitoring of Java applications, which leverage the open-source Spring Framework. VMware acquired SpringSource in 2009, which had multiple products, including Spring Framework, as well as the Hyperic product offering. The reasoning behind the acquisition was to launch VMware's cloud offering. Hyperic understands and manages the details of Spring-based applications via JMX with greater granularity than other monitoring applications. It has a large number of supported technologies from modern middleware, nonrelational databases, caching layers and testing frameworks. Additionally, Hyperic has close ties with VMware's vSphere platform, yet falls short on its support for packaged enterprise applications. The two offerings include Hyperic Open Source and VMware vFabric Hyperic. The commercial open-source vFabric edition includes support and adds enterprise-class features such as templates, increased manageability and an enhanced alert management system. Hyperic is an agent-based solution, aside from specific technologies that do not support agents (e.g., network devices, VMware vSphere, environmental measurement and monitoring, etc).&/p&&br&&b&Merethis: Centreon&/b&&br&&br&&p&Headquartered in Paris, France, Merethis created a Nagios-based monitoring platform that includes open-source and commercial modules. The additional functionality includes a new interface, browser-based configuration and setup, and has advanced alerting rules and integration to many ticketing systems. There have been scalability improvements to the core engine that are released as the open-source product Centreon-Core. The scalability improvements to Nagios are released under the open-source projects Centreon Engine and Centreon Broker. These modifications are backward-compatible with Nagios open-source releases. Commercially released add-ons include additional dashboarding, map-based views and business intelligence reporting. Merethis also offers multiple support levels and professional services to implement and customize the solution for specific customer needs.&/p&&br&&b&Zabbix: Zabbix&/b&&br&&br&&p&Based in Riga, Latvia, Zabbix sells support packages for the software and custom development of additional functionalities or integration. Zabbix is deployed on an existing OS, or as a virtual appliance. The product has a comprehensive set of bundled plug-ins in the packaged release, discovery of elements, an enhanced user interface, dashboard customization and enhanced graphing and charting features. The product is compatible with Nagios, allowing customers to leverage existing plug-ins. There is a wide array of support options, and they may be customized based on customer request.&/p&&br&&b&Zenoss: Service Dynamics&/b&&br&&br&&p&Zenoss is based Maryland and is included in the Gartner 2010 Magic Quadrant for Event Correlation and Analysis. The Zenoss Core offering is released as open-source and is community-supported, while the enterprise offering, Service Dynamics, includes scalability enhancements, performance improvements, premium support and additional features built around the publicly released Core Edition. The subscription is yearly and includes licenses and support. Zenoss is one of the only platforms to incorporate configuration management database-like device properties, which are modeled as the device is discovered. The product also includes service impact, event management and analytics. In the service impact modules, services and dependencies are configured, providing visibility into groups of components used to deliver a service or application. Zenoss is continuing to invest in richer event enrichment and metric analytics, virtualization monitoring and infrastructure as a service (IaaS) monitoring. Additional monitoring for impact analysis and analytics does carry an additional license fee, but provides value in root cause analysis. Zenoss provides integration with many ticketing systems, monitoring of cloud providers (VMware vCloud, Amazon Web Services and Google App Engine), as well as multitenancy required for implementations by managed services providers. Zenoss has a large set of community-developed ZenPacks, in addition to the company-supported packages.&/p&&br&&br&总结一下,在商业开源领域,除了Hyperic HQ之外,其他的都支持Nagios的插件;除了
和Zenoss、Zabbix,其他都是和
Nagios 兼容,也就是说,其实整个monitoring这个领域一共也没有多少东西。&br&&br&按照设计理念,这些软件里面最牛的是
Hyperic HQ ,按照未来的商业走向,未来发展最好的会是
Zenoss 。&br&&br&&p&在纯开源领域,分析如下:&/p&&br&&p&Some of the most common open-source packages include:&/p&&ul&&li&&p&&strong&Big Brother: &/strong&This product was popular before Nagios was released and stabilized. The product was introduced in 1996, and still retains much of its dated user interface and limited feature set. The product is still in use at some enterprises in pockets. Big Brother is not free for commercial use, but the original author created Xymon under an open-source license, which has an active commu however, the dated interface still exists. Quest Software acquired the rights to the commercial Big Brother product in 2001, and renamed the commercial offering Big Brother Professional, which has an improved interface and additional features.&/p&&/li&&li&&p&&strong&MRTG, Cacti, Munin and Ganglia: &/strong&These tools are graphing and polling engines, whose data is stored in a time series database (RRDtool). The core graphing and storage technology is a part of other open-source monitoring products, ranging from Centreon, Ntop, op5, OpenNMS, pfSense, SmokePing, Xymon, Zenoss and others. The polling is agentless (SNMP, WMI), but can leverage many APIs to poll additional hardware and software devices. MRTG, Cacti, Munin and Ganglia are not able to handle events, but there is a road map to correct this limitation in Cacti. Based on threshold settings, events may be dispatched to other event management systems (see &a href=&///?target=http%3A///document/code/Fref%3Dddisp& class=& wrap external& target=&_blank& rel=&nofollow noreferrer&&&The Evolving Role of a Manager of Managers in IT Operations& &i class=&icon-external&&&/i&&/a&), such as Nagios. Notification management is nonexistent in the products, so events must move to an upper-level management solution. MRTG, Cacti, Munin and Ganglia have hundreds of plug-ins available on the Internet, which enable monitoring of other software and hardware devices. MRTG, Cacti and Munin are generic polling engines, while Ganglia is geared toward large grid or large cluster monitoring. MRTG has been largely replaced by Cacti, but MRTG is still in use in many enterprises.&/p&&/li&&li&&p&&strong&Nagios: &/strong&The most popular of the open-source monitoring solutions, Nagios, has been successful in its penetration into IT operations organizations of any size. Due to its widespread usage, it has spawned many enhanced commercial and open-source software packages, such as Centreon, GroundWork Monitor, Icinga, Nagios XI, op5 and Zabbix. The product was released in 1999, and due to its age, the open-source offering has a dated user interface, scalability issues due to much of it written in interpreted languages, and poorly optimized contributed plug-ins. The software can monitor agentlessly via SNMP and WMI, or can leverage agent technology. There are nearly 2,000 downloadable plug- most written in Perl and Python. There is a lack of robust event management or notification management, and there are plug-ins developed to provide additional options for both use cases.&/p&&/li&&li&&p&&strong&Ntop: &/strong&This product takes a different ap it uses a packet capture engine or collects flow data via NetFlow or Internet Protocol Flow Information Export (IPFIX). When operating in packet capture mode, it's typically connected to a span or mirror port on the network. The product builds profiles of the systems on the network. It does not provide any alerting capabilities, but is used for diagnostics and debugging.&/p&&/li&&li&&p&&strong&OpenNMS: &/strong&The OpenNMS project is an open-source network-monitoring platform with capabilities around basic event management, polling network devices for configuration and performance data, and processing syslog log streams. Agentless polling and data collection is supported by using SNMP, HTTP, WMI, DNS and JDBC. The product scales well and provides good basic network monitoring capabilities, including discovery, event management and polling.&/p&&/li&&li&&p&&strong&Wireshark: &/strong&This open-source packet capture and protocol analysis tool was previously called Ethereal, it is cross-platform and leverages the pcap capture library. It's intended for troubleshooting network behavior and understanding network-borne security issues. Data is captured from a network interface, or captured remotely and analyzed with the tool. Over 1,000 protocols can be decoded and analyzed. There is an active community, adding to the extensive feature list that includes tools for telephony analysis, such as voice over IP (VoIP), flow graphing and statistical analysis.&/p&&br&&p&在现在这个时间,基础组件监控领域是一个比较乱的领域,可以参见&a href=&///?target=http%3A//dataloop.io& class=& external& target=&_blank& rel=&nofollow noreferrer&&&span class=&invisible&&http://&/span&&span class=&visible&&dataloop.io&/span&&span class=&invisible&&&/span&&i class=&icon-external&&&/i&&/a&进行的调查:&/p&&p&&a href=&///?target=http%3A//blog.dataloop.io//what-we-learnt-talking-to-60-companies-about-monitoring/& class=& wrap external& target=&_blank& rel=&nofollow noreferrer&&What we learnt talking to 60 companies about monitoring&i class=&icon-external&&&/i&&/a&&/p&&/li&&/ul&
这个问题老实说没有意义,只有最合适的,没有最好的。而且Nagios和zabbix属于不同的领域,前者是开源软件,后者是商业开源软件。在商业开源领域,zabbix的竞争者是hyperic和zenoss,以及groundworks。下面列出Gartner对这个领域的分析:The Commercial Open-…
来自子话题:
泻药。&br&&br&服务器硬件一个4core cpu 绝对是够了, 最低4G内存(linux)也能跑得动的,建议16G内存,两个以上的100M网卡,硬盘注意一下看我后面分析。 这种情况一般1U搞定了,为了以后扩容可以考虑2U。 这个自己询价吧。 &br&&br&软件你可以选择windows也可以选择linux,个人推荐 centos + nginx , &br&&br&你可以采用 http + flv 的播放方案,这个很适用于 PC 终端,假如你要 ipad 手机 PC通吃,可以考虑 http live streaming 方案(更推荐)
或者 http + mp4 方案。 其实以前快播没有倒的时候,用快播、百度方案比较节省带宽,在山寨视频站相当的流行。&br&1. 360P 的视频码率不会超过一兆,其实500-700K已经不错了,因为发流速度比片源码率高,我们算1Mbps好了.&br&2. 在线100人观看, 那么需要的带宽就是 100Mbps, &b&你需要一个百兆独享带宽接入&/b& (这里假设你没有盗链别人),假如是想联通电信通吃,选择双线还是架设两台服务器就看你具体情况了。 你的服务器至少要两个100M网卡。 &br&3. &b&必须做防盗链&/b&,否则你的100Mbps带宽根本撑不住,你的网站名气越大,盗链的人越多。 防盗链防下载对于服务器性能影响很小,特别是现在的服务器性能肯定够了。&br&4. 硬盘和文件系统,优化的好的话,一个7200转磁盘就足够提供 100Mbps 吞吐了,但是我们假设优化的一般,但是 30-40 Mbps 还是达得到的, 再考虑raid冗余,你raid5 就搞4块硬盘吧,记得上线前测试一下性能,因为不同的raid5性能测试起来可能差不少。不差钱可以考虑SAS硬盘。&br&5. 硬盘容量问题,你可以采用2T-4T的硬盘,你有4盘做raid5,从你的更新频率看,12T怎么也应该够了吧。&br&&br&从你的描述看你应该还需要一个视频CMS系统。我搞这个已经过了快10年了,估计现在出来很多新的不错的视频 CMS 了,这里不做推荐。&br&&br&假如还需要知道什么,欢迎咨询。
泻药。服务器硬件一个4core cpu 绝对是够了, 最低4G内存(linux)也能跑得动的,建议16G内存,两个以上的100M网卡,硬盘注意一下看我后面分析。 这种情况一般1U搞定了,为了以后扩容可以考虑2U。 这个自己询价吧。 软件你可以选择windows也可以选择linux,个…
来自子话题:
我比较关心你怎么过的ccie~你们说是吗
我比较关心你怎么过的ccie~你们说是吗
已有帐号?
无法登录?
社交帐号登录}

我要回帖

更多关于 java启动tomcat服务器 的文章

更多推荐

版权声明:文章内容来源于网络,版权归原作者所有,如有侵权请点击这里与我们联系,我们将及时删除。

点击添加站长微信