当前位置:网站首页>Varnish foundation overview 4
Varnish foundation overview 4
2022-06-30 01:26:00 【franket】
Basic configuration and startup
modify /etc/varnish/default.vcl
[[email protected] varnish]# vim /etc/varnish/default.vcl
[[email protected] varnish]# grep -v "#" /etc/varnish/default.vcl
vcl 4.0;
backend default {
.host = "www.boohee.com";
.port = "80";
}
sub vcl_recv {
}
sub vcl_backend_response {
}
sub vcl_deliver {
}
[[email protected] varnish]# Reload VCL
[[email protected] varnish]# /etc/init.d/varnish reload
Loading vcl from /etc/varnish/default.vcl
Current running config name is reload_2015-08-19T22:45:05
Using new config name reload_2015-08-19T22:46:38
VCL compiled.
VCL 'reload_2015-08-19T22:46:38' now active
available 0 boot
available 0 reload_2015-08-19T22:43:00
available 0 reload_2015-08-19T22:43:13
available 0 reload_2015-08-19T22:45:05
active 0 reload_2015-08-19T22:46:38
Done
[[email protected] varnish]# 边栏推荐
- [535. encryption and decryption of tinyurl]
- 眼底出血术后需注意事项//每天必看
- Machine learning notes: time series decomposition STL
- 【论文写作】英文论文写作指南
- js返回内容被unicode编码
- Embedded exit (review and release)
- Mysql 监控6
- Sentinel source code analysis Part 6 - sentinel adapter module Chapter 4 zuul2 gateway
- Vl6180x distance and light sensor hands-on experience
- 3-6sql injection website instance step 5: break through the background to obtain web administrator permissions
猜你喜欢

cookie加密8

Sentinel source code analysis Part 7 - sentinel adapter module - Summary

cookie加密8

Stimulsoft Reports报告工具,Stimulsoft创建和构建报告

Is the numpy index the same as the image index?

【机器学习Q&A】余弦相似度、余弦距离、欧式距离以及机器学习中距离的含义

JS content confusion, return content encryption

Kubernetes core object overview details

城市规划馆在设计制作上需要注意什么

R language linear regression model fitting diagnosis outliers analysis of domestic gas consumption and calorie examples with self-test questions
随机推荐
3-6sql injection website instance step 5: break through the background to obtain web administrator permissions
post请求出现WebKitFormBoundaryk的解决办法
TP-LINK configure WiFi authentication method for wireless Internet SMS
C language selection, loop overview
OpenCV和Image之间的转换(亲测有效)
c语言选择,循环概述
Understand the module function of MES management system
The first unlucky person watching eth 2.0
Newton method (optimization of two variable functions)
Cookie encryption 8
Tetris game based on STM32F103
Chiffrement des cookies 8
C语言 说反话
Sentinel source code analysis Part 6 - sentinel adapter module Chapter 4 zuul2 gateway
Quick pow: how to quickly find power
Interface Association of postman
“乘风破浪”的芒果超媒,能上岸吗?
[recommendation system] concise principle and code implementation of user based collaborative filtering
Reading is the cheapest noble
快手伸手“供给侧”,找到直播电商的“源头活水”?