Kernel Source Directory1, Arch: recorded x86 focus on2. Init: Start_kernel in MAIN.C under directory is the starting point of the boot kernel3. IPC: Directory of inter-process communicationExperimentOpen the shell with a virtual machine in the lab
You can do the following two steps:1. First step: Create an empty folder: Mkdir/tmp/blank2, the second step: Execute the following command: rsync--delete-before-d/tmp/blank//home/stormnode/store/html/new/Linux quickly deletes a large number of small
Installation and configuration of Maven under Linux:I am using apache-maven-3.3.9-bin.tar.gz------install MAVEN on the premise that JDK installation is successful: java-version Test--JDK Installation Reference my article "JDK Installation and
LInux USB Architecture
you can see that a USB system requires 4 drivers: USB device driver (mainly written in this section) , USB Host Controller driver , Gadget Drive , UDC Drive .
There are 4 main features of USB:
Reference: http://wp.fungo.me/linux/what-the-hell-is-hostname.htmlHostname is the machine name, a variable in the kernel, can be temporarily modified or permanently modified/etc/hosts The local DNS system, query the domain name will be first in this
grep, which finds the meaning of a string, is to match a qualifying string in a file.1. Command format:...2. Common options:"Grep-c"Statistics Match to' String 'The number of rows for the content. (c is the meaning of count)"Grep-i"ignores case
Tar commandCan be used to compress packaged single files, multiple files, a single directory, multiple directories.Linux Packaging Command _tarThe tar command can be used to compress a packaged single file, multiple files, a single directory, and
Ways to avoid zombie processes on the server side:1 ) by ignoring SIGCHLD signal to resolve zombie processesSignal (SIGCHLD, sig_ign)
2 ) by Wait method to resolve the zombie processSignal (SIGCHLD, HANDLE_SIGCHLD);Wait (NULL)
1 , two servers each configuration two network cardsStore:Eth0:192.168.1.20/24Eth1:192.168.2.20/24Node:Eth0:192.168.1.10/24Eth1:192.168.2.10/242 , Storage server configuration Targert# vim/etc/tgt/targets.confBacking-store/dev/sdb1Initiator-address 1
1. View file instructions: Cat tail head tac,more, lessCat, such as CAT/ETC/PASSWD, is more commonly used by people.And when looking at log, because it is often the most recent content that needs attention, the instruction that is often used is
1.DenyHosts IntroductionDenyHosts is a program written in the Python language that parses the sshd log file (/var/log/secure) and logs the IP to the/etc/hosts.deny file when a duplicate attack is found, thus achieving the function of the auto-screen
There are many Linux distributions, which are divided into desktop system domain and server domain according to usage domain. The following are briefly described below:1.Red hat and fedora:redhat The earliest release of the personal version of Linux,
Original source: http://www.cnblogs.com/wangtongphp/p/3784597.html1. Checkout files to a local directorySVN checkout Path (path is a directory on the server)Example: SVN checkout Svn://192.168.1.1/pro/domainShorthand: SVN Co2. Add a new file to the
Accident Description:Monday to the company, login mail server intermittent Xu, can not always connect. Check this machine everything is OK, this time the room call said our server bandwidth anomaly, as follows:650) this.width=650; "src=" Http://s2.51
The Three Musketeers of text processing under LinuxThe first sword grep, Egrep, Fgrep: Text Search tool; Search operations on given text based on "pattern";The second Sword Sed:stream editor, stream editor, line editing tools, text editing
In this week's course, Meng teacher mainly explained how the operating system is working, I wrote this blog according to their own understanding, please the small partners to correct.I. Summary of knowledge points1. Three Magic WeaponStorage program
Chen Chaojan Original works reproduced please specify the source "Linux kernel Analysis" MOOC course http://mooc.study.163.com/course/USTC-1000029000First, using the virtual machine of the experimental building, observe the relationship between the
NGINX configuration file details, nginx configuration file
# Running userUser www-data;# Start the process. Generally, it is set to be equal to the number of CPUsWorker_processes 1;# Global error logs and PID filesError_log/var/log/nginx/error.
Hadoop + Zookeeper)
I. Overview
1.1 single point of failure in Hadoop1.0
NameNode in Hadoop is like a human heart. It is very important and never stops working. In the hadoop1 era, there is only one NameNode. If the NameNode data is lost or cannot
High throughput of Kafka
As the most popular open-source message system, kafka is widely used in data buffering, asynchronous communication, collection logs, and system decoupling. Compared with other common message systems such as RocketMQ, Kafka
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service