Assume that an external user wants to access the application corresponding to app1 in the home data center through the link https://app1.example.com, what is the specific access process? You can see the following flowchart (assuming that the home broadband has a public IPv4 address and an I…
In the previous article, we introduced how to deploy reverse proxy for home broadband in different situations. In the next article, we will introduce the working principle and configuration points of reverse proxy. For reverse proxy to work properly, two problems need to be solved: binding application to domain name and passing parameters...
After the deployment of hardware, software, and applications is completed in the home data center, the applications need to be released to the outside world. Unlike traditional home broadband applications, the application release of the home data center involves many applications, which is far from being as simple as mapping a few ports on the router (assuming there is a public network address)...
Preface As our internal applications become more and more complex, a problem that must be solved is how to control the running health of all applications in real time and receive alarms as soon as problems occur in the applications. To solve this problem, we need to build our own real-time health monitoring system for applications.
When we talked about the choice of home data center software environment, we mentioned LNMP (LAMP). Although we mainly use Docker to deploy home data center applications later, LNMP (LAMP) is still the choice of many production environments. Manual...
Preface After the home data center is built, how to manage and operate numerous devices and applications becomes a challenge. Generally speaking, in terms of specific management methods, there are CLI (such as SSH, because SSH is the mainstream CLI management method, so SSH will be used instead of CLI later) and W…
In the previous article, we discussed the hardware selection for building a home data center. In this article, we will mainly discuss the software environment selection. Deployment method selection Currently, we have two mainstream ways to deploy applications: LNMP (LAMP) or docker. 1. Use LNMP (L…
The first step of building a new data center is to choose the construction method: cloud or self-built? For us, we don’t need to worry about this, we just build it ourselves; the second step is not to worry about strong and weak electricity and wiring, because home data centers are all built, and we can use whatever we have (I envy the local tycoons who have the money to buy new houses and can build them from scratch)…
Unprivileged LXC What are Unprivileged Linux Containers (LXC)? Unprivileged containers are considered more secure and confidential than privileged containers. When an unprivileged container is running, the root UID of the container is mapped to a non-root UID on the host system. This makes it impossible for an attacker to break into the container even if…
Preface Actually, writing an article to talk about multi-dial is not very meaningful. The main premise is that the home broadband supports multi-dial, which is purely a matter of fate. It just happens that my home data center has taken full advantage of multi-dial. After all, there are still many netizens whose home broadband can support multi-dial,…