One of the Flink handler functions: ProcessFunction class

About process functions As shown in the following figure, in general business development, SQL, Table API and DataStream API are commonly used, while the Low-level situation is seldom used. Starting from this chapter, we will familiarize ourselves with process functions through actual combat, and see what capabilities this series of Low-leve ...

Posted on Sun, 24 May 2020 01:19:49 -0700 by asunsha

Flink processing function Practice II: KeyedProcessFunction class

This is the second and last article in the Flink series Flink: ProcessFunction class I learned the simplest ProcessFunction class, KeyedProcessFunction I want to know today, and some features brought by this class; About KeyedProcessFunction By comparing the class diagram, it can be determined that KeyedProcessFunction and ProcessFunction ...

Posted on Sun, 24 May 2020 00:57:29 -0700 by cayman_d

Simple introduction to SpringBoot + Spring Security

This article mainly introduces a simple introduction to SpringBoot + Spring Security Introduction to Spring Security Spring Security is not introduced too much here. For details, please refer to Official documents Let me just talk about the spring security core functions: Certification (who are you) Authorization (what can you do) ...

Posted on Sat, 23 May 2020 22:12:20 -0700 by daucoin

Realization of permission model based on shiro

1. shiro Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, password, and session management. With Shiro's easy to understand API, you can quickly and easily access any application, from the smallest mobile application to the largest network and enterprise application. Authentica ...

Posted on Sat, 23 May 2020 03:24:28 -0700 by lulubell

Function test of ActiveMQ high availability + load balancing cluster

1. Basic function test ActiveMQ is a JMS Provider implementation that fully supports the JMS 1.1 and J2EE 1.4 specifications. The full name of JMS is Java Message Service, that is, Java Message Service. It is mainly used to deliver messages between producers and consumers. Producers are responsible for generating messages while consumers are re ...

Posted on Fri, 22 May 2020 03:07:54 -0700 by naitsir

php date and time functions

System time zone settings for PHP date and time functions In PHP, there are two ways to change the time zone: The first: modify php.ini For the settings in the file, click data; date.timezone =Option, remove the preceding quotation marks, and change to:“ date.timezone =Asia / Shanghai "and restart the Apache server Second: In the a ...

Posted on Thu, 21 May 2020 22:26:51 -0700 by rklapwijk

Beauty of Mybatis source code: 1.2 download Mybatis source code and import it into IDE tool

Download Mybatis source code and import it into IDE tool Download the source code of Mybatis Open the browser and enter the web address https://github.com/mybatis/mybatis-3 You can access Mybatis' warehouse in Github. So far, the latest version of mybatis is 3.5.3-SNAPSHOT, but because the version I used in my previous learning process is 3.5 ...

Posted on Wed, 20 May 2020 23:18:46 -0700 by ninib

Playbook understanding of the Ansible module in python

Playbook In the previous section, we detailed some of the commonly used modules provided by Ansible.You can see that each module in Ansible focuses on a certain aspect of functionality.Although the functions implemented by each module are relatively simple, the more complex functions can be achieved by combining the modules.In Ansible, the fil ...

Posted on Wed, 20 May 2020 15:28:58 -0700 by rheroux

Big data learning (1) Hadoop installation

Cluster architecture The installation of Hadoop is actually the configuration of HDFS and YARN cluster. As can be seen from the following architecture diagram, each data node of HDFS needs to be configured with the location of NameNode. Similarly, every NodeManager in YARN needs to configure the location of ResourceManager. NameNode and Resour ...

Posted on Mon, 18 May 2020 08:25:53 -0700 by EZbb

JAVA JNDI Injection Knowledge Details

Author: Tianrongxin Alpha Laboratory Original Link: https://mp.weixin.qq.com/s/TJTOh0q0OY-j6msP6XSErg 1. Preface JNDI is often encountered when exploiting or exploiting vulnerabilities. This paper describes what is JNDI, how RMI is used in JNDI, how LDAP is used, and how JDK 8u191 is used after. 2. Introduction to JNDI JNDI (The Java Nam ...

Posted on Fri, 15 May 2020 20:41:25 -0700 by rinteractive