当前位置:网站首页>Five minutes to teach you intranet penetration
Five minutes to teach you intranet penetration
2022-08-11 11:30:00 【Sora33】
Recently, I'm working on a project of my own.Take a monitoring platform of Micrometer+prometheus+grafana.
Let's see the results first

This monitoring platform can help us check the running status of the project.Including JVM heap occupancy, non-heap occupancy, network request frequency, CPU usage, new generation and old generation, etc.It is a very comprehensive monitoring platform.But when building, because my prometheus is deployed on the server.My project runs locally.This is very embarrassing, the server cannot access my local project.Isn't that a big eyeball?So, without saying a word, I penetrated the intranet again.
One. Download ngrok
We need a tool to help us achieve intranet penetration.I use ngrok, it's easy and fast.
ngrok - secure introspectable tunnels to localhostngrok secure introspectable tunnels to localhost webhook development tool and debugging toolhttps://dashboard.ngrok.com/get-started Go directly to the official website above, (remember to register an account) to download the zip and unzip the installation.
After the installation is complete, you will find that none of the above happened, don't worry.Go to the installation directory and open the web console.

Enter the account password we just registered.
Enter the port number for our local project.For example, what I set here is to create the address of http://localhost:8080 directly

Then click on the tunnel list. Now we can use this address to allow the external network to access our local project

Then the intranet penetration is achieved so quickly.If there are more than 5 likes, Micrometer+prometheus+grafana will be published in the next issue to build our own project monitoring platform
边栏推荐
猜你喜欢

How to explain to my girlfriend what is cache penetration, cache breakdown, cache avalanche?

图像识别(八)| 还对全连接层迷迷糊糊?背会一首诗就行了

Latex引用图片 发现 显示的图片标号不对

1元限时秒杀 | 接口抓包分析与Mock实战训练营

Starting from zero configuration vim (11) -- plug-in management

阿里云ssl证书申请,宝塔ssl证书部署

chrome设置为深色模式(包括整个网页)
App Clip 苹果小程序开发须知

Azure IoT & NVIDIA Jetson 开发基础

如何给女朋友解释什么是缓存穿透、缓存击穿、缓存雪崩?
随机推荐
leetcode:373. 查找和最小的 K 对数字
Configuring vim(12) from scratch - theme configuration
关于数据权限的设计
图像识别(八)| 还对全连接层迷迷糊糊?背会一首诗就行了
开发者时薪高达1200美元?一文带你走近Move语言的编程魅力!
十九、一起学习Lua 垃圾回收
ID3v2 Library以便能够设置
巧用自定义函数,文本控件秒变高速缓存
从抖音到火山引擎——看流媒体技术演进和机会
【学习笔记】一般图最大匹配
BAT "exclusive" Internet giant Android senior engineer interview questions: 174 questions allow you to do the interview
宝塔一键部署WordPress(含宝塔添加站点、阿里云安全组配置、阿里云子域名解析)
【2022】【Thesis Notes】Ultra-thin THz deflection based on laser direct writing graphene oxide paper——
数据库导出的csv文件纯数字被转为科学计数法
【翻译】Drafting and Revision: Laplacian Pyramid Network for Fast High-Quality Artistic Style Transfer
七、一起学习Lua 函数
鸿海董事长刘扬伟:市场对智能手机和其他消费电子产品的需求正在放缓
a sequence of consecutive positive numbers with sum s
Bitmap这个“内存刺客”你也要小心
LeetCode 剑指 Offer 35. 复杂链表的复制