Install or uninstall Nginx under Linux
If you are installed under the Ubuntun Nginx, it is recommended to uninstall the version of the first, too old, 0.7, Uwsgi do not support, but also to play patches, too much trouble, if it is the default
1. Local server setting (Master)
A. Open http://c9t24783.itcs.hpecorp.net:8080 on Master
B. Click Manage Jenkins-> Manage Nodes-> New node _>input node name->ok
C. setting as Below
2. Windows Server R2 setting
A. Open http://c9t24783.itcs.hpecorp.
1. Use Free-g to view memory usage:
2, view the memory consumption of the process:
PS Aux|awk ' {sum+=$6} end {print sum/1024} '
It turns out it took 17G.
3. View memory allocation:
Cat/proc/meminfo
What is that slab?
Slab is a memory
Linux Find files and find files that contain specified content common commandsSource: This site original Linux more than 1,661 people onlookers no comment
Each operating system is made up of thousands of different kinds of files. The system itself
The functions used are primarily to get process IDs, create processes, process exits, process waits, and execute programs.Get process Id:getpid (), Getppid ()Create process: fork (), Vfork ()Process exit: Exit ()Process waiting: Wait ()Execute
RC is the abbreviation for RunLevel control directory.
In most Linux distributions, startup scripts are placed in/ETC/RC.D/INIT.D. These scripts are connected to the/ETC/RC.D/RCN.D directory by the LN command. (Here's n is run level 0-6)init.d/: A
The camera preview is normal, when you click the "Exit button", or when you close the running form, the following compiler output bar pops up with a bunch of warnings, as follows:
GLIBC detected * *
viewing memory and CPUcommand to view memory usage separately: free-mTo view memory and CPU usage commands: TopYou can also install the Htop tool, which is more intuitive,The installation commands are as follows: sudo apt-get install htopAfter
sudo says "Superuser do". It allows authenticated users to run commands as other users. Other users can be ordinary users or superuser. However, most of the time we use it to run commands with elevated privileges. --Pradeep Kumar
Useful text Links
Original: Unknown
Linux Partitioning Concepts
First of all, introduce the concept of partition in Linux, this is the first to learn I have suffered. In Linux, each hard disk device can have up to 4 primary partitions (which contain extended
Failed to enter the desktop after a successful boot entry (wireless loop prompts for a password). May be due to changes in/etc/profile, at this time you can restart the computer in the system selection when the advanced option to enter the interface-
In some programs, we need to execute a function every once in a while. For example, each 2s,5s,10s performs a separate function. If have more than one timer, realize this function is very simple, need to separate timed 2s,5s,10s can. But only one
Groupadd 1. functionThe Groupadd command is used to join the new group to the system.2. FormatGroupadd [-G GID] [-o]] [-R] [-F] GroupName3. Main parameters-G GID: Specifies the group ID number.-O: Allow group ID numbers, not unique.-R: Add group ID
One, what is sleep
What does "sleep" mean for a process? When a process is put into sleep, it is identified as being in a special state and removed from the scheduler's run queue. Until something happens that changes that state, the process will
After installing the sonar, you need to integrate with the Jenkins that the project is in, and the principle of Jenkins and sonar integration is probably this, Jenkins in its plug-in Management center, download the sonar plug-in and configure it
How to use Bluetooth under Linux
Bluetooth is a wireless protocol chosen by many mobile device manufacturers, and it is a short-range wireless transmission technology. It has a number of attractive features, the most important of which is its low
In the Linux environment to send and receive data frames directly from the link layer (MAC), the Libpcap and libnet two dynamic libraries can be used respectively to complete the work of collecting and sending. Although it has been widely used, it
Many of the online SSH-free password use git commands do not take into account the situation of multiple public key keys, here to collect and tidy up the management of multiple SSH public key keys.
The public key and the key are generated first, and
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service