寫點東西吧,懒人。

· ☕ 1 分钟
Header case https://datatracker.ietf.org/doc/html/rfc7540#section-8.1.2 8.1.2. HTTP Header Fields HTTP header fields carry information as a series of key-value pairs. For a listing of registered HTTP headers, see the “Message Header Field” registry maintained at <https://www.iana.org/assignments/ message-headers>. Just as in HTTP/1.x, header field names are strings of ASCII characters that are compared in a case-insensitive fashion. However, header field names MUST be converted to lowercase prior to their encoding in HTTP/2. A request or response containing uppercase header field names MUST be treated as malformed (Section 8.

· ☕ 6 分钟
Negotiation HTTP 1.1 plain text Upgrade header https://http2-explained.haxx.se/en/part5#5.1.-http2-for-existing-uri-schemes As mentioned already, the existing URI schemes cannot be modified, so http2 must use the existing ones. Since they are used for HTTP 1.x today, we obviously need a way to upgrade the protocol to http2, or otherwise ask the server to use http2 instead of older protocols. HTTP 1.1 has a defined way to do this, namely the Upgrade: header, which allows the server to send back a response using the new protocol when getting such a request over the old protocol, at the cost of an additional round-trip.

· ☕ 1 分钟
Ubuntu 包溯源 文件来自什么样包 - finding the package a file belongs 1 2 labile@worknode1:/etc/apt/sources.list.d$ dpkg -S /usr/bin/crictl cri-tools: /usr/bin/crictl 包来自什么源 - How do I find out which repository a package comes from 1 2 3 4 5 6 7 8 9 10 11 apt-cache policy cri-tools cri-tools: Installed: 1.19.0-00 Candidate: 1.19.0-00 Version table: *** 1.19.0-00 500 500 https://apt.kubernetes.io kubernetes-xenial/main amd64 Packages 100 /var/lib/dpkg/status 1.13.0-01 500 500 https://apt.kubernetes.io kubernetes-xenial/main amd64 Packages

· ☕ 1 分钟
Ref https://shipilev.net/jvm/anatomy-quarks/2-transparent-huge-pages/ https://kstefanj.github.io/2021/05/19/large-pages-and-java.html

· ☕ 1 分钟
https://kubernetes.io/docs/tasks/manage-hugepages/scheduling-hugepages/

· ☕ 1 分钟
Ref https://thesaitech.wordpress.com/2018/12/28/do-huge-pages-really-lead-to-huge-performance-gains/

· ☕ 1 分钟
https://www.xtivia.com/blog/fixing-jmeter-socket-errors/

· ☕ 1 分钟
Cycles per instruction (CPI) : As we know, all the requests are served by CPU in the form of instruction sets. A single request can translated in to 100’s of instruction sets. Cycles spent per instruction is an important parameter which helps understand where CPU is spending its clock cycles. This metrics can also be expressed in the inverse form, i.e, Instructions per Cycle (IPC). It is important to note that CPI value signifies the efficiency of instruction processing , but not of the instructions themselves.

· ☕ 1 分钟
https://easyperf.net/blog/2019/02/09/Top-Down-performance-analysis-methodology In this post I show more formal way to do performance analysis. It’s called Top-down Microarchitecture Analysis Method (TMAM) (Intel® 64 and IA-32 Architectures Optimization Reference Manual, Appendix B.1). In this metodology we try to detect what was stalling our execution starting from the high-level components (like Front End, Back End, Retiring, Branch predictor) and narrowing down the source of performance inefficiencies. It’s an iterative process with 2 steps:

· ☕ 1 分钟
1 perf stat -d Ref https://www.brendangregg.com/perf.html

· ☕ 2 分钟
https://redis.io/topics/acl ACL The Redis ACL, short for Access Control List, is the feature that allows certain connections to be limited in terms of the commands that can be executed and the keys that can be accessed. The way it works is that, after connecting, a client is required to authenticate providing a username and a valid password: if the authentication stage succeeded, the connection is associated with a given user and the limits the user has.

· ☕ 23 分钟
https://redis.io/topics/cluster-spec Implemented subset Redis Cluster implements a concept called hash tags that can be used in order to force certain keys to be stored in the same hash slot. However during manual resharding, multi-key operations may become unavailable for some time while single key operations are always available. Clients and Servers roles in the Redis Cluster protocol In Redis Cluster nodes are responsible for holding the data, and taking the state of the cluster, including mapping keys to the right nodes.

· ☕ 1 分钟
https://iximiuz.com/en/posts/prometheus-is-not-a-tsdb/ https://www.robustperception.io/blog https://promlabs.com/blog/ https://timber.io/blog/promql-for-humans/ https://github.com/iximiuz/pq https://play0ad.com/