The disk space is not released after files are deleted.

After the file is deleted, the disk space will not be released and an alarm will be triggered. the disk space will soon be full. $ Df-hwww.2cto.com file system capacity used available % mount point/dev/sda215G937M13G7 % // dev/sda1_1_105g344g24 %/u02

Commonly used commands

I usually use some common commands to add to favorites. 1. I use Xshell client to upload local files/download files. it seems like this is common. Www.2cto. com2, scpfileNanme10.XX. XX. XX:/home/username copy the uploaded file to the specified

Common nginx commands

Common nginx commands 1. view the nginx process 1ps-ef | grepnginx description: The nginx process consists of the main process and working process. Www.2cto. com2 and nginx1nginx startup results show the main thread and worker thread of nginx. the

Differences between memory buffer and cache in Linux operating system & free parameter description

Differences between memory buffer and cache in Linux operating systems & free parameter description we start with the Free command. Compared with top, the www.2cto. comfree Command provides a more concise view of system memory usage: $

How to add an uncompiled installation module to nginx after successful installation

How to add an uncompiled and installed nginx module that has been installed successfully to nginx? now you need to add an uncompiled and installed module www.2cto.com. example: install the third-party ngx_cache_purge module (used to clear the cache

How to upgrade from Ubuntu12.10 to Ubuntu13.04

How to upgrade from Ubuntu12.10 to Ubuntu13.04 currently 13.04 is still in beta or alpha testing, which means it is not completely stable and may contain errors and problems. You can try upgrading on the testing machine, instead of a production

In linux, the username and password are missing during SVN migration. hostkeyverificationfailed

In linux, the username and password are forgotten during SVN migration. hostkeyverificationfailed1. both the working machine and the notebook are linux. I usually have some money in my purse, and empty hands like work card keys go to work...

Root Password loss solution

Root Password loss solution GRUB: on the boot loader menu, type [e] to enter the editing mode. You will face a list of pilot projects. Find the following output line: kernel/vmlinuz-2.4.18-0.4roroot/dev/hda2 press the arrow key until this line is

Linux storage experiment 2: RAID operations

Linux storage experiment 2: RAID operating Linux storage experiment 1: creating a file system on a hard disk... Linux storage experiment 2: RAID operations Linux storage experiment 1: creating a file system http://www.2cto.com/ OS

Arm-linux-ld command

Arm-linux-ld command-T option is an important option in the ld command. it can be used to directly specify the code segment, data segment, doctoral student, www.2cto.com segment. for complex connections, you can write a script specifically to tell

Configure dual-host SSH trust in Linux

Configure dual-host SSH trust in Linux 1. implementation principle using a method called & quot; public/private key & quot; authentication for ssh login. & Quot; public/private key & quot; a simple explanation of the authentication method is: First,

Column mode of vim commands

Vim command-column mode vim command, column mode is very useful when operating multi-line comments www.2cto. com1. move the cursor to the beginning or end of the row to be commented out. ctrl + v enter the visualblock Mode 3. move the cursor to the

System memory statistics after memory file system is used

After the memory file system is used, the system memory statistical method [problem description] in Linux, memory can be divided into a part of space for use as a disk, called Ramdisk. This part of the memory space has the high-speed read/write www.2

[User management] sets PasswordAging

[User management] set PasswordAging ① method 1 www.2cto.com [plain] [root @ Rocky ~] # Cat/etc/login. defs # Passwordagingcontrols: # PASS_MAX_DAYSMaximumnumberofdaysa... [user management] set Password Aging ① method 1 www.2cto.com [plain] [root @

Vim skill collection

Vim Tips collection recently I like to look at vim's stuff. I collected some tips on the Internet and posted them to facilitate future search: Remove duplicates: www.2cto.com Method 1: sort: g/^ \(. \ + \) $ \ n \ 1/d Method 2: sortu delete some

About linux low-end memory

About linux low-end memory a problem was found in the server program a few days ago. When a cache function is enabled for some files on a disk (save some common results directly to the disk to avoid repeated computation ), the LowFree memory in the

Set up an rsync server in Linux

Rsync is a file synchronization and transmission tool in Unix systems. Rsync uses the rsync algorithm to quickly synchronize files between a client and a remote file server. Somefeaturesofrsyncincludersync includes the following. Rsync uses the

Simple nfs configuration

Simple nfs configuration for the nfs service, the only thing that needs to be configured is the nfs core. the nfs configuration is completed by configuring the/etc/exports file, the core task of nfs is to log on and manage permissions. Therefore,

Create a Windows 7 installation USB flash drive in linux

In linux, I made a Windows 7 installation USB flash drive. Recently, I helped a relative and a child buy a K29, which is known as a magic machine. its version (no system or optical drive ), I plan to use a USB flash drive for installation (in fact,

The redhat9 kernel cannot be shut down after replacement.

apm

After the redhat9 kernel is replaced, it cannot be shut down to solve the problem. elder brother is a little dish, and master is drifting over ...... Background as this is not powerful, it takes more than an hour to compile linux2.6 (although it is

Total Pages: 2732 1 .... 2698 2699 2700 2701 2702 .... 2732 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.