Set up a zookeeper cluster, use three Linux, build three nodes of the cluster, here to record. on Linux you can use the wget+ url + version number, There is a space between the wget and the URL, You can Download the appropriate software version
Install 3 machines as zookeeper cluster, 3 machine IP is 192.168.174.7,192.168.174.8,192.168.174.9 respectively. Zookeeper is written by Java, so install the JDK environment before installing zookeeper.
Create zookeeper installation directories
1. Download access to Linux tools SECURCRT Link: https://pan.baidu.com/s/1zTwzmnzUmnwbKUCNHCLN1g Password: kpyg2. Download the required JDK solr tomcat link: https://pan.baidu.com/s/1j32EHEh2peCntzLWBP54Ww Password: mg4a3. Use SECURCRT to enter
Linux User ManagementCourse Outline? User Management Profile? User Management commands? User Group Management commands? Bulk Add Users? User authorizationConfiguration file? User Information file:/etc/passwd? Password file:/etc/shadow? User group
The read command is a very important bash command for entering text from the keyboard or table and interacting with the user, which can read the values of multiple variables at once, and the variables and input values need to be separated by spaces.
Iptables is the simple introduction of Linux firewall and the use of iptables effective location such as:Among them, the network firewall can also use a iptables-enabled Linux host instead; Facilities such as routers or hubs are omitted from the
Basic preparation--command tamper-proof and command loggingMany hackers invade the operating system, will do two common operations unset history and replace the command file (or the corresponding link library file), for these two points to do a
Workaround:sudo chattr-i fileIn the Perform chmod operation:sudo chmod a+x filechattr command to change file propertiesGrammar:Chattr (option)8 modes:A: Let the file or directory for additional purposes only; B: Do not update the last access time of
1, first download the Linux and Windows installation softwareHttps://www.ej-technologies.com/download/jprofiler/files2. Upload the jprofiler_linux_8_0_7.tar.gz to the linux/opt directory for decompression3, configure catalina.sh in the Tomcat bin
CAT//(CONCATENATE) start from the first line-N List Line numbersReverse operation of TAC//catNL//view and List line numbers-b Specifies how the line number is specified-B A is equivalent to cat-n empty line also listed travel number-B t default
^h ^ When Linux uses the backspace bar? workaroundExecuting scripts under Linux does not pay attention to the ^h when the wrong content needs to be deleted^h is not the H key meaning, is backspace. The main thing is that when your terminal backspace
Cd
Ls
Pwd
Clear
chmod
Chown
Chattr
Useradd
Userdel
Groupadd
Vi/vim
Cat
More
Less
Mv
Cp
Rm
RmDir
Touch
Ifconfig
IP addr
Ping
Route
Echo
Wc
Expr
Bc
ln
Head
Tail
W.H.O.
Hostname
Top
Df
The installation of the source code is generally composed of 3 steps: Configuration (Configure), compile (make), installation (make install), the specific installation method is generally the author will give the document, here is the main
readlink 显示文件的类型Syntax format: readlink "option" readlink [options] [file]Attention:
Readlink command and subsequent options, there must be at least one space between each elementOption Description:
parameter Options
Ways to add dynamic link library paths under LinuxJanuary 20, 2017 10:08:17Hits: 5596Linux Shared library Path configurationA typical scenario where a shared library file cannot be found under Linux is that a soft package (such as Libnet,mysql) has
One, view disk space situation DFThe DF command is used to view hard disk space usage, as well as to see the type of hard disk partition or the usage of inode nodes.The common parameters of the DF command are as follows:-a
Linux System Architecture:Linux kernel Architecture:With 7 modes of operation, the x86 also achieves 4 levels of RING0-RING3,RING0 at the highest level,So the Linux user code runs under RING3, the kernel runs in RING0, so the system itself
A document distribution systemRequirement background for large companies, there must be a site or configuration file updates from time to time, and the use of the machine is certainly a lot of units, less than a few, more than dozens of or even
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service