1 什么是黑盒监控

我们监控主机的资源用量、容器的运行状态、数据库中间件的运行数据。这些都是支持业务和服务的基础设施,通过白盒能够了解其内部的实际运行状态,通过对监控指标的观察能够预判可能出现的问题,从而对潜在的不确定因素进行优化。

而从完整的监控逻辑的角度,除了大量的应用白盒监控以外,还应该添加适当的黑盒监控。黑盒监控即以用户的身份测试服务的外部可见性,常见的黑盒监控包括HTTP探针、TCP探针等用于检测站点或者服务的可访问性,以及访问效率等。

黑盒监控相较于白盒监控最大的不同在于黑盒监控是以故障为导向当故障发生时,黑盒监控能快速发现故障,而白盒监控则侧重于主动发现或者预测潜在的问题。一个完善的监控目标是要能够从白盒的角度发现潜在问题,能够在黑盒的角度快速发现已经发生的问题。

2 介绍

Blackbox Exporter是Prometheus社区提供的官方黑盒监控解决方案,其允许用户通过:HTTP、HTTPS、DNS、TCP以及ICMP的方式对网络进行探测。

应用场景

  • HTTP 测试

定义 Request Header 信息     判断 Http status Http Respones Header Http Body 内容

  • TCP 测试

业务组件端口状态监听      应用层协议定义与监听

  • ICMP 测试

主机探活机制

  • POST 测试

接口联通性

  • SSL 证书过期时间

运行Blackbox Exporter时,需要用户提供探针的配置信息,这些配置信息可能是一些自定义的HTTP头信息,也可能是探测时需要的一些TSL配置,也可能是探针本身的验证行为。在Blackbox Exporter每一个探针配置称为一个module,并且以YAML配置文件的形式提供给Blackbox Exporter。每一个module主要包含以下配置内容,包括探针类型(prober)、验证访问超时时间(timeout)、以及当前探针的具体配置项:

  # 探针类型:http、 tcp、 dns、 icmp.prober: <prober_string># 超时时间[ timeout: <duration> ]# 探针的详细配置,最多只能配置其中的一个[ http: <http_probe> ][ tcp: <tcp_probe> ][ dns: <dns_probe> ][ icmp: <icmp_probe> ]

下面是一个简化的探针配置文件blockbox.yml,包含两个HTTP探针配置项:

modules:http_2xx:prober: httphttp:method: GEThttp_post_2xx:prober: httphttp:method: POST

3 安装

3.1 Docker

采用docker
方式部署

docker run -it --name blackbox_exporter -v /data/config/blackbox/:/config -p 9115:9115 -d prom/blackbox-exporter --config.file=/config/blackbox.yml

3.2 配置文件

modules:http_2xx:prober: httphttp_post_2xx:prober: httphttp:method: POSThttp_4xx:prober: httptcp_connect:prober: tcppop3s_banner:prober: tcptcp:query_response:- expect: "^+OK"tls: truetls_config:insecure_skip_verify: falsessh_banner:prober: tcptcp:query_response:- expect: "^SSH-2.0-"irc_banner:prober: tcptcp:query_response:- send: "NICK prober"- send: "USER prober prober prober :prober"- expect: "PING :([^ ]+)"send: "PONG ${1}"- expect: "^:[^ ]+ 001"icmp:prober: icmp

3.3 访问监控数据

容器启动成功后,就可以通过访问http://127.0.0.1:9115/probe?module=http_2xx&target=baidu.com对baidu.com进行探测。这里通过在URL中提供module参数指定了当前使用的探针,target参数指定探测目标,探针的探测结果通过Metrics的形式返回:

[root@VM-10-48-centos blackbox]# curl -s "http://119.91.110.226:9115/probe?module=http_2xx&target=www.baidu.com"
# HELP probe_dns_lookup_time_seconds Returns the time taken for probe dns lookup in seconds
# TYPE probe_dns_lookup_time_seconds gauge
probe_dns_lookup_time_seconds 0.001789553
# HELP probe_duration_seconds Returns how long the probe took to complete in seconds
# TYPE probe_duration_seconds gauge
probe_duration_seconds 0.020884147
# HELP probe_failed_due_to_regex Indicates if probe failed due to regex
# TYPE probe_failed_due_to_regex gauge
probe_failed_due_to_regex 0
# HELP probe_http_content_length Length of http content response
# TYPE probe_http_content_length gauge
probe_http_content_length -1
# HELP probe_http_duration_seconds Duration of http request by phase, summed over all redirects
# TYPE probe_http_duration_seconds gauge
probe_http_duration_seconds{phase="connect"} 0.002984163
probe_http_duration_seconds{phase="processing"} 0.005368911
probe_http_duration_seconds{phase="resolve"} 0.001789553
probe_http_duration_seconds{phase="tls"} 0
probe_http_duration_seconds{phase="transfer"} 0.010486688
# HELP probe_http_redirects The number of redirects
# TYPE probe_http_redirects gauge
probe_http_redirects 0
# HELP probe_http_ssl Indicates if SSL was used for the final redirect
# TYPE probe_http_ssl gauge
probe_http_ssl 0
# HELP probe_http_status_code Response HTTP status code
# TYPE probe_http_status_code gauge
probe_http_status_code 200
# HELP probe_http_uncompressed_body_length Length of uncompressed response body
# TYPE probe_http_uncompressed_body_length gauge
probe_http_uncompressed_body_length 299300
# HELP probe_http_version Returns the version of HTTP of the probe response
# TYPE probe_http_version gauge
probe_http_version 1.1
# HELP probe_ip_addr_hash Specifies the hash of IP address. It's useful to detect if the IP address changes.
# TYPE probe_ip_addr_hash gauge
probe_ip_addr_hash 2.882632397e+09
# HELP probe_ip_protocol Specifies whether probe ip protocol is IP4 or IP6
# TYPE probe_ip_protocol gauge
probe_ip_protocol 4
# HELP probe_success Displays whether or not the probe was a success
# TYPE probe_success gauge
probe_success 1

从返回的样本中,用户可以获取站点的DNS解析耗时、站点响应时间、HTTP响应状态码等等和站点访问质量相关的监控指标,从而帮助管理员主动的发现故障和问题。

4 与Prometheus集成

接下来,只需要在Prometheus下配置对Blockbox Exporter实例的采集任务即可。最直观的配置方式:

- job_name: baidu_http2xx_probeparams:module:- http_2xxtarget:- baidu.commetrics_path: /probestatic_configs:- targets:- 127.0.0.1:9115
- job_name: prometheus_http2xx_probeparams:module:- http_2xxtarget:- prometheus.iometrics_path: /probestatic_configs:- targets:- 127.0.0.1:9115

这里分别配置了名为baidu_http2x_probe和prometheus_http2xx_probe的采集任务,并且通过params指定使用的探针(module)以及探测目标(target)。

那问题就来了,假如我们有N个目标站点且都需要M种探测方式,那么Prometheus中将包含N * M个采集任务,从配置管理的角度来说显然是不可接受的,这里我们也可以采用Relabling的方式对这些配置进行简化,配置方式如下:

scrape_configs:- job_name: 'blackbox'metrics_path: /probeparams:module: [http_2xx]static_configs:- targets:- http://prometheus.io    # Target to probe with http.- https://prometheus.io   # Target to probe with https.- http://example.com:8080 # Target to probe with http on port 8080.relabel_configs:- source_labels: [__address__]target_label: __param_target- source_labels: [__param_target]target_label: instance- target_label: __address__replacement: 127.0.0.1:9115

这里针对每一个探针服务(如http_2xx)定义一个采集任务,并且直接将任务的采集目标定义为我们需要探测的站点。在采集样本数据之前通过relabel_configs对采集任务进行动态设置。

  • 第1步,根据Target实例的地址,写入__param_target
    标签中。__param_<name>
    形式的标签表示,在采集任务时会在请求目标地址中添加<name>
    参数,等同于params的设置;

  • 第2步,获取__param_target的值,并覆写到instance标签中;

  • 第3步,覆写Target实例的__address__
    标签值为BlockBox Exporter实例的访问地址。

通过以上3个relabel步骤,即可大大简化Prometheus任务配置的复杂度

5 HTTP探针

HTTP探针是进行黑盒监控时最常用的探针之一,通过HTTP探针能够网站或者HTTP服务建立有效的监控,包括其本身的可用性,以及用户体验相关的如响应时间等等。除了能够在服务出现异常的时候及时报警,还能帮助系统管理员分析和优化网站体验。

在上一小节讲过,Blockbox Exporter中所有的探针均是以Module的信息进行配置。如下所示,配置了一个最简单的HTTP探针:

modules:http_2xx_example:prober: httphttp:

通过prober配置项指定探针类型。配置项http用于自定义探针的探测方式,这里有没对http配置项添加任何配置,表示完全使用HTTP探针的默认配置,该探针将使用HTTP GET的方式对目标服务进行探测,并且验证返回状态码是否为2XX,是则表示验证成功,否则失败。

5.1 自定义HTTP请求

HTTP服务通常会以不同的形式对外展现,有些可能就是一些简单的网页,而有些则可能是一些基于REST的API服务。对于不同类型的HTTP的探测需要管理员能够对HTTP探针的行为进行更多的自定义设置,包括:HTTP请求方法、HTTP头信息、请求参数等。对于某些启用了安全认证的服务还需要能够对HTTP探测设置相应的Auth支持。对于HTTPS类型的服务还需要能够对证书进行自定义设置。

如下所示,这里通过method定义了探测时使用的请求方法,对于一些需要请求参数的服务,还可以通过headers定义相关的请求头信息,使用body定义请求内容:

http_post_2xx:prober: httptimeout: 5shttp:method: POSTheaders:Content-Type: application/jsonbody: '{}'

如果HTTP服务启用了安全认证,Blockbox Exporter内置了对basic_auth的支持,可以直接设置相关的认证信息即可:

http_basic_auth_example:prober: httptimeout: 5shttp:method: POSTheaders:Host: "login.example.com"basic_auth:username: "username"password: "mysecret"

对于使用了Bear Token的服务也可以通过bearer_token配置项直接指定令牌字符串,或者通过bearer_token_file指定令牌文件。

对于一些启用了HTTPS的服务,但是需要自定义证书的服务,可以通过tls_config指定相关的证书信息:

 http_custom_ca_example:prober: httphttp:method: GETtls_config:ca_file: "/certs/my_cert.crt"

5.2 自定义探针行为

在默认情况下HTTP探针只会对HTTP返回状态码进行校验,如果状态码为2XX(200 <= StatusCode < 300)则表示探测成功,并且探针返回的指标probe_success值为1。

如果用户需要指定HTTP返回状态码,或者对HTTP版本有特殊要求,如下所示,可以使用valid_http_versions和valid_status_codes进行定义:

  http_2xx_example:prober: httptimeout: 5shttp:valid_http_versions: ["HTTP/1.1", "HTTP/2"]valid_status_codes: []

默认情况下,Blockbox返回的样本数据中也会包含指标probe_http_ssl,用于表明当前探针是否使用了SSL:

# HELP probe_http_ssl Indicates if SSL was used for the final redirect
# TYPE probe_http_ssl gauge
probe_http_ssl 0

而如果用户对于HTTP服务是否启用SSL有强制的标准。则可以使用fail_if_ssl和fail_if_not_ssl进行配置。fail_if_ssl为true时,表示如果站点启用了SSL则探针失败,反之成功。fail_if_not_ssl刚好相反。

fail_if_ssl Ssl No ssl
True probe_http_ssl = 0 probe_http_ssl = 1
False probe_http_ssl = 1 probe_http_ssl = 0
fail_if_not_ssl Ssl No ssl
True probe_http_ssl = 1 probe_http_ssl = 0
False probe_http_ssl = 0 probe_http_ssl = 1
  http_2xx_example:prober: httptimeout: 5shttp:valid_status_codes: []method: GETno_follow_redirects: falsefail_if_ssl: falsefail_if_not_ssl: false

除了基于HTTP状态码,HTTP协议版本以及是否启用SSL作为控制探针探测行为成功与否的标准以外,还可以匹配HTTP服务的响应内容。使用fail_if_matches_regexp和fail_if_not_matches_regexp用户可以定义一组正则表达式,用于验证HTTP返回内容是否符合或者不符合正则表达式的内容。

  http_2xx_example:prober: httptimeout: 5shttp:method: GETfail_if_matches_regexp:- "Could not connect to database"fail_if_not_matches_regexp:- "Download the latest version here"

最后需要提醒的时,默认情况下HTTP探针会走IPV6的协议。在大多数情况下,可以使用preferred_ip_protocol=ip4强制通过IPV4的方式进行探测。在Bloackbox响应的监控样本中,也会通过指标probe_ip_protocol,表明当前的协议使用情况:

# HELP probe_ip_protocol Specifies whether probe ip protocol is IP4 or IP6
# TYPE probe_ip_protocol gauge
probe_ip_protocol 6

6 Grafana配置

6.1 explore查看数据

6.2 配置Dashboard

此模板为9965号模板,数据源选择Prometheus 模板下载地址 https://grafana.com/grafana/dashboards/9965

此模板需要安装饼状图插件 下载地址 https://grafana.com/grafana/plugins/grafana-piechart-panel

grafana-cli plugins install grafana-piechart-panel

7 helm

采用helm
方式部署

[Kubernetes] helm repo add prometheus-community https://prometheus-community.github.io/helm-charts
[Kubernetes] helm repo update
[Kubernetes] helm pull prometheus-community/prometheus-blackbox-exporter
[Kubernetes] tar zxf prometheus-blackbox-exporter-4.14.0.tgz
[Kubernetes] cd prometheus-blackbox-exporter
[prometheus-blackbox-exporter] ls
Chart.yaml  README.md   ci          templates   values.yaml

7.1 修改配置

# cat values.yaml
restartPolicy: Alwayskind: DeploymentpodDisruptionBudget: {}# maxUnavailable: 0## Additional blackbox-exporter container environment variables
## For instance to add a http_proxy
##
## extraEnv:
##   HTTP_PROXY: "http://superproxy.com:3128"
##   NO_PROXY: "localhost,127.0.0.1"
extraEnv: {}extraVolumes: []# - name: secret-blackbox-oauth-htpasswd#   secret:#     defaultMode: 420#     secretName: blackbox-oauth-htpasswd# - name: storage-volume#   persistentVolumeClaim:#     claimName: example## Additional volumes that will be attached to the blackbox-exporter container
extraVolumeMounts:# - name: ca-certs#   mountPath: /etc/ssl/certs/ca-certificates.crtextraContainers: []# - name: oAuth2-proxy#   args:#     - -https-address=:9116#     - -upstream=http://localhost:9115#     - -skip-auth-regex=^/metrics#     - -openshift-delegate-urls={"/":{"group":"monitoring.coreos.com","resource":"prometheuses","verb":"get"}}#   image: openshift/oauth-proxy:v1.1.0#   ports:#       - containerPort: 9116#         name: proxy#   resources:#       limits:#         memory: 16Mi#       requests:#         memory: 4Mi#         cpu: 20m#   volumeMounts:#     - mountPath: /etc/prometheus/secrets/blackbox-tls#       name: secret-blackbox-tls## Enable pod security policy
pspEnabled: truehostNetwork: falsestrategy:rollingUpdate:maxSurge: 1maxUnavailable: 0type: RollingUpdateimage:repository: prom/blackbox-exportertag: v0.19.0pullPolicy: IfNotPresent## Optionally specify an array of imagePullSecrets.## Secrets must be manually created in the namespace.## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/### pullSecrets:#   - myRegistrKeySecretName## User to run blackbox-exporter container as
runAsUser: 1000
readOnlyRootFilesystem: true
runAsNonRoot: truelivenessProbe:httpGet:path: /healthport: httpreadinessProbe:httpGet:path: /healthport: httpnodeSelector: {}
tolerations: []
affinity: {}# if the configuration is managed as secret outside the chart, using SealedSecret for example,
# provide the name of the secret here. If secretConfig is set to true, configExistingSecretName will be ignored
# in favor of the config value.
configExistingSecretName: ""
# Store the configuration as a `Secret` instead of a `ConfigMap`, useful in case it contains sensitive data
secretConfig: false
config:modules:http_2xx:prober: httptimeout: 5shttp:valid_http_versions: ["HTTP/1.1", "HTTP/2.0"]no_follow_redirects: falsepreferred_ip_protocol: "ip4"http_4xx:prober: httptimeout: 5shttp:valid_status_codes: [200, 201, 202, 300, 301, 302, 303, 400, 401, 402, 403, 404]valid_http_versions: ["HTTP/1.1", "HTTP/2.0"]no_follow_redirects: falsepreferred_ip_protocol: "ip4"tcp_connect:prober: tcptimeout: 5stcp:preferred_ip_protocol: "ip4"# Set custom config path, other than default /config/blackbox.yaml. If let empty, path will be "/config/blackbox.yaml"
# configPath: "/foo/bar"extraConfigmapMounts: []# - name: certs-configmap#   mountPath: /etc/secrets/ssl/#   subPath: certificates.crt # (optional)#   configMap: certs-configmap#   readOnly: true#   defaultMode: 420## Additional secret mounts
# Defines additional mounts with secrets. Secrets must be manually created in the namespace.
extraSecretMounts: []# - name: secret-files#   mountPath: /etc/secrets#   secretName: blackbox-secret-files#   readOnly: true#   defaultMode: 420allowIcmp: falseresources: {}# limits:#   memory: 300Mi# requests:#   memory: 50MipriorityClassName: ""service:annotations: {}labels: {}type: ClusterIPport: 9115# Only changes container port. Application port can be changed with extraArgs (--web.listen-address=:9115)
# https://github.com/prometheus/blackbox_exporter/blob/998037b5b40c1de5fee348ffdea8820509d85171/main.go#L55
containerPort: 9115serviceAccount:# Specifies whether a ServiceAccount should be createdcreate: true# The name of the ServiceAccount to use.# If not set and create is true, a name is generated using the fullname templatename:annotations: {}## An Ingress resource can provide name-based virtual hosting and TLS
## termination among other things for CouchDB deployments which are accessed
## from outside the Kubernetes cluster.
## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/
ingress:enabled: falsehosts: []# - chart-example.localpath: '/'annotations: {}# kubernetes.io/ingress.class: nginx# kubernetes.io/tls-acme: "true"tls: []# Secrets must be manually created in the namespace.# - secretName: chart-example-tls#   hosts:#     - chart-example.localpodAnnotations: {}# Hostaliases allow to add additional DNS entries to be injected directly into pods.
# This will take precedence over your implemented DNS solution
hostAliases: []
#  - ip: 192.168.1.1
#    hostNames:
#      - test.example.com
#      - another.example.netpod:labels: {}extraArgs: []
#  --history.limit=1000replicas: 1serviceMonitor:## If true, a ServiceMonitor CRD is created for a prometheus operator## https://github.com/coreos/prometheus-operator##enabled: true# Default values that will be used for all ServiceMonitors created by `targets`defaults:additionalMetricsRelabels:pod: prometheus-blackbox-exporterlabels: {}interval: 20sscrapeTimeout: 5smodule: http_2xx## scheme: HTTP scheme to use for scraping. Can be used with `tlsConfig` for example if using istio mTLS.scheme: http## tlsConfig: TLS configuration to use when scraping the endpoint. For example if using istio mTLS.## Of type: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#tlsconfigtlsConfig: {}bearerTokenFile:targets:- name: bokeurl: https://www.cloudcared.cnlabels: {}interval: 60sscrapeTimeout: 60smodule: http_2xxadditionalMetricsRelabels: {}- name: baiduurl: https://www.baidu.comlabels: {}interval: 60sscrapeTimeout: 60smodule: http_2xxadditionalMetricsRelabels: {}- name: tencenturl: https://www.tencent.comlabels: {}interval: 60sscrapeTimeout: 60smodule: http_2xxadditionalMetricsRelabels: {}- name: icmp-114url: 114.114.114.114labels: {}interval: 60sscrapeTimeout: 60smodule: tcp_connectadditionalMetricsRelabels: {}
## Custom PrometheusRules to be defined
## ref: https://github.com/coreos/prometheus-operator#customresourcedefinitions
prometheusRule:enabled: falseadditionalLabels: {}namespace: ""rules: []## Network policy for chart
networkPolicy:# Enable network policy and allow access from anywhereenabled: false# Limit access only from monitoring namespace# Before setting this value to true, you must add the name=monitoring label to the monitoring namespace# Network Policy uses label filteringallowMonitoringNamespace: false## dnsPolicy and dnsConfig for Deployments and Daemonsets if you want non-default settings.
## These will be passed directly to the PodSpec of same.
dnsPolicy:
dnsConfig:

7.2 部署到集群

[prometheus-blackbox-exporter] helm install -n monitoring blackbox-exporter-1 .
NAME: blackbox-exporter-1
LAST DEPLOYED: Thu Jun 10 11:51:44 2021
NAMESPACE: monitoring
STATUS: deployed
REVISION: 1
TEST SUITE: None
NOTES:
See https://github.com/prometheus/blackbox_exporter/ for how to configure Prometheus and the Blackbox Exporter.
[prometheus-blackbox-exporter] kubectl get all -n monitoring
NAME                                                                  READY   STATUS    RESTARTS   AGE
pod/blackbox-exporter-1-prometheus-blackbox-exporter-84f894b89wpdtc   1/1     Running   0          7sNAME                                                       TYPE        CLUSTER-IP       EXTERNAL-IP   PORT(S)    AGE
service/blackbox-exporter-1-prometheus-blackbox-exporter   ClusterIP   10.255.254.215   <none>        9115/TCP   9sNAME                                                               READY   UP-TO-DATE   AVAILABLE   AGE
deployment.apps/blackbox-exporter-1-prometheus-blackbox-exporter   1/1     1            1           8sNAME                                                                          DESIRED   CURRENT   READY   AGE
replicaset.apps/blackbox-exporter-1-prometheus-blackbox-exporter-84f894b894   1         1         1       8s

Prometheus黑盒监测之blackbox_exporter相关推荐

  1. Prometheus 监控服务端口、网站状态等(黑盒监测)

    1.blackbox_exporter介绍 blackbox_exporter是Prometheus 官方提供的 exporter 之一,可以提供 http.dns.tcp.icmp 的监控数据采集. ...

  2. Blackbox_exporter黑盒监测

    一.概述 blackbox_exporter是Prometheus 官方提供的 exporter 之一,可以提供 http.dns.tcp.icmp 的监控数据采集. Blackbox_exporte ...

  3. Prometheus 监控之 Blackbox_exporter黑盒监测 [icmp、tcp、http(get\post)、dns、ssl证书过期时间]

    Blackbox_exporter 主动监测主机与服务状态 Prometheus 官方提供的 exporter 之一,可以提供 http.dns.tcp.icmp 的监控数据采集 官方github: ...

  4. Prometheus监控实战之Blackbox_exporter黑盒监测

    1 Blackbox_exporter应用场景 blackbox_exporter是Prometheus官方提供的exporter之一,可以提供HTTP.HTTPS.DNS.TCP以及ICMP的方式对 ...

  5. blackbox_exporter+grafana+prometheus监控主机存活,端口存活及网站状态

    blackbox_exporter+grafana+prometheus监控主机存活,端口存活及网站状态 安装blackbox_exporter grafana中加入blackbox_exporter ...

  6. Prometheus监控系部署配置过程

    一.前言 Prometheus是由SoundCloud开发的开源监控报警系统和时序列数据库(TSDB),基于Go语言开发,是Google BorgMon监控系统的开源版本.Prometheus在201 ...

  7. Prometheus监控docker容器

    @ Prometheus(普罗米修斯)监控 Prometheus是最初在SoundCloud上构建的开源系统监视和警报工具包 .自2012年成立以来,许多公司和组织都采用了Prometheus,该项目 ...

  8. Prometheus监控(kube-prometheus)

    Prometheus监控实战(kube-prometheus) 部署kube-prometheus监控套件 调试 manifests下用户可以自定义CRD等资源配置 增加prometheus监控K8S ...

  9. Prometheus学习笔记(三)Alertmanager报警模块集成钉钉/企业微信机器人

    文章目录 一.简介 二.安装Alertmanager 三.报警规则 四.通知规则 4.1 钉钉告警 4.2 企业微信告警 一.简介 Alertmanager是Prometheus的一个报警通知组件,需 ...

最新文章

  1. 【微信小程序】java中类和对象的区别
  2. 如何在Dart中合并列表
  3. 使用Nginx+Lua(OpenResty)开发高性能Web应用
  4. 解决若要安装 Microsoft Office 2010,需要MSXML 版本 6.10.1129的问题
  5. 漫画:程序员战力图鉴
  6. 使用过这么多年Hibernate,对底层原理你知多少?
  7. html5直播api,HTML5 VideoAPI,打造自己的Web视频播放器
  8. 提交文件到svn,提示is not under version control
  9. 114.maven+springmvc+spring+mybaties 项目整合
  10. Linux下的经典软件
  11. 《自动控制原理》个人笔记(来自ppt课件)
  12. 企业服务总线 ESB 介绍和用例
  13. 中英文数字混合字符串排序js
  14. android 模拟器 blue,android使用BlueStacks作为模拟器
  15. 【金猿投融展】易观数科——智能用户运营服务商
  16. NUAA无线传感器网络 复习重点整理
  17. 什么是XXE漏洞,XXE漏洞的原理
  18. 命令行启动burp报错:-Xbootclasspath/p is no longer a supported option.解决方法(Mac )
  19. Html+CSS基础知识(一)
  20. UML图有哪些类型?

热门文章

  1. MST1170,摩托车,电动自行车闪光器芯片
  2. 摩托车无钥匙启动系统架构与功能简介
  3. RabbitMQ的简要介绍
  4. 智能化时代,物业管理何去何从?捷径智慧物业管理模式推陈出新
  5. mysql添加索引语句_mysql 添加索引语句
  6. 2020年VR全景加盟的行业趋势
  7. 什么是固态继电器?与机械继电器的区别是什么?
  8. 国内电脑行业数据浅析
  9. @font-face制作Web Icon
  10. Flink实战(二)