· ☕ 6 分钟

Negotiation

HTTP 1.1 plain text Upgrade header

https://http2-explained.haxx.se/en/part5#5.1.-http2-for-existing-uri-schemes

As mentioned already, the existing URI schemes cannot be modified, so http2 must use the existing ones. Since they are used for HTTP 1.x today, we obviously need a way to upgrade the protocol to http2, or otherwise ask the server to use http2 instead of older protocols.

HTTP 1.1 has a defined way to do this, namely the Upgrade: header, which allows the server to send back a response using the new protocol when getting such a request over the old protocol, at the cost of an additional round-trip.


· ☕ 1 分钟

Ubuntu 包溯源

文件来自什么样包 - finding the package a file belongs

1
2
labile@worknode1:/etc/apt/sources.list.d$ dpkg -S /usr/bin/crictl
cri-tools: /usr/bin/crictl

包来自什么源 - How do I find out which repository a package comes from

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
apt-cache policy cri-tools

cri-tools:
  Installed: 1.19.0-00
  Candidate: 1.19.0-00
  Version table:
 *** 1.19.0-00 500
        500 https://apt.kubernetes.io kubernetes-xenial/main amd64 Packages
        100 /var/lib/dpkg/status
     1.13.0-01 500
        500 https://apt.kubernetes.io kubernetes-xenial/main amd64 Packages

· ☕ 1 分钟

Cycles per instruction (CPI) :

As we know, all the requests are served by CPU in the form of instruction sets. A single request can translated in to 100’s of instruction sets. Cycles spent per instruction is an important parameter which helps understand where CPU is spending its clock cycles. This metrics can also be expressed in the inverse form, i.e, Instructions per Cycle (IPC).

It is important to note that CPI value signifies the efficiency of instruction processing , but not of the instructions themselves.


· ☕ 1 分钟

https://easyperf.net/blog/2019/02/09/Top-Down-performance-analysis-methodology

In this post I show more formal way to do performance analysis. It’s called Top-down Microarchitecture Analysis Method (TMAM) (Intel® 64 and IA-32 Architectures Optimization Reference Manual, Appendix B.1). In this metodology we try to detect what was stalling our execution starting from the high-level components (like Front End, Back End, Retiring, Branch predictor) and narrowing down the source of performance inefficiencies.

It’s an iterative process with 2 steps:


· ☕ 2 分钟

https://redis.io/topics/acl

ACL

The Redis ACL, short for Access Control List, is the feature that allows certain connections to be limited in terms of the commands that can be executed and the keys that can be accessed. The way it works is that, after connecting, a client is required to authenticate providing a username and a valid password: if the authentication stage succeeded, the connection is associated with a given user and the limits the user has. Redis can be configured so that new connections are already authenticated with a “default” user (this is the default configuration), so configuring the default user has, as a side effect, the ability to provide only a specific subset of functionalities to connections that are not explicitly authenticated.


· ☕ 10 分钟

https://redis.io/topics/cluster-spec

Implemented subset

Redis Cluster implements a concept called hash tags that can be used in order to force certain keys to be stored in the same hash slot. However during manual resharding, multi-key operations may become unavailable for some time while single key operations are always available.

Clients and Servers roles in the Redis Cluster protocol

In Redis Cluster nodes are responsible for holding the data, and taking the state of the cluster, including mapping keys to the right nodes. Cluster nodes are also able to auto-discover other nodes, detect non-working nodes, and promote replica nodes to master when needed in order to continue to operate when a failure occurs.


· ☕ 1 分钟
  • 微服务各种流控技术
    *

  • 分布式一致性技术

    • 数据一致性协议
  • Java

    • 网络 Netty
    • Thread Pool
  • DB
    *