Using the -ldflags
parameter can help set variable values at compile time.
Using the example provided here:
- Running
make build
will create abuild
executable. Running it will result in:
$> ./build
no version (Mon YYYY)
$>
Using the -ldflags
parameter can help set variable values at compile time.
Using the example provided here:
make build
will create a build
executable. Running it will result in:$> ./build
no version (Mon YYYY)
$>
Just documenting docs, articles, and discussion related to gRPC and load balancing.
https://github.com/grpc/grpc/blob/master/doc/load-balancing.md
Seems gRPC prefers thin client-side load balancing where a client gets a list of connected clients and a load balancing policy from a "load balancer" and then performs client-side load balancing based on the information. However, this could be useful for traditional load banaling approaches in clound deployments.
https://groups.google.com/forum/#!topic/grpc-io/8s7UHY_Q1po
gRPC "works" in AWS. That is, you can run gRPC services on EC2 nodes and have them connect to other nodes, and everything is fine. If you are using AWS for easy access to hardware then all is fine. What doesn't work is ELB (aka CLB), and ALBs. Neither of these support HTTP/2 (h2c) in a way that gRPC needs.
# Advanced config for NGINX | |
server_tokens off; | |
add_header X-XSS-Protection "1; mode=block"; | |
add_header X-Content-Type-Options nosniff; | |
# Redirect all HTTP traffic to HTTPS | |
server { | |
listen 80; | |
server_name www.domain.com domain.com; | |
return 301 https://$host$request_uri; |
import gql from 'graphql-tag' | |
import { Mutation } from 'react-apollo' | |
export const UPLOAD_FILE = gql` | |
mutation uploadFile($file: Upload!) { | |
uploadFile(file: $file) { | |
filename | |
} | |
} | |
`; |
var crypto = require('crypto') | |
, fs = require('fs') | |
// Algorithm depends on availability of OpenSSL on platform | |
// Another algorithms: 'sha1', 'md5', 'sha256', 'sha512' ... | |
var algorithm = 'sha1' | |
, shasum = crypto.createHash(algorithm) | |
// Updating shasum with file content | |
var filename = __dirname + "/anything.txt" |
#!/bin/bash | |
# Cloud-config for CoreOS IPXE deployment on Vultr | |
################################################## | |
# This cloud-config bootstraps CoreOS on /dev/vda and provisions: | |
# - private ip-address on eth1 | |
# - etcd on private network | |
# - fleet on private network | |
# - basic firewall (docker compatible) | |
# - SSHd security hardening | |
################################################## |
#!/bin/bash | |
SERVER_IP=<MY_SERVER_IP> | |
# copy cloud-config.yml to the server | |
scp cloud-config.yml core@$SERVER_IP:~/ | |
# validate cloud-config file | |
ssh core@$SERVER_IP "coreos-cloudinit -validate --from-file ~/cloud-config.yml" | |
if [[ $? == "0" ]]; then |
.module-cache |