1. Description of the problemI received the Eagle Network monitoring in the morning, the disk utilization of an application machine reached 100%, the use of DF and Du commands to view the occupied disk space does not reach the allocated logical
I. Network BRIDGE Experiment1. Test environment to build virtual machines for the networkStart for NAT mode650) this.width=650; "src=" Https://s5.51cto.com/wyfs02/M01/9E/35/wKiom1mMeYnDplQ6AABl7UgEl6g179.png "style=" float : none; "title="
First, install the OPENJDKJava has 2 jdk, one is Oracle's JDK, and the other is OpenJDK.OpenJDK is used here as the Java development environment.Install with Yum sourceYum Install java-1.8.0-openjdk-devel #java的编译环境yum install JAVA-1.8.0-OPENJDK
1. Check kernel conditionsCheck whether the current kernel supports quota and the current kernel profile is in/bootIf the current kernel does not support quota, you will need to recompile the kernel to compile quota supports into the core:File
1.2 NIC configuration fileDEVICE Nic Name (first block eth0, second block eth1 ...). And so onHWADDR Network card MAC addressUUID Unique identifier, disk identity-------Blkid (view)Onboot Restart the network card or server after the control card is
Original: https://linux.cn/article-3144-1.html--------------------------------------------------------------------------------------------------------------- ---------------------------Try the IP command under Linux, Ifconfig is out of dateLinux's
1, describe the network bridge, hub, two-layer switch, layer three switch, router functions, usage scenarios and differences.1) Hub:Hub is a device that connects multiple Ethernet twisted-pair or fiber-optic assemblies to the same piece of physical
The crontab command is used to set the instructions that are executed periodically. The command reads the instruction from a standard input device and stores it in a "crontab" file for later reading and executionYou can open the edit file by Crontab-
Script Requirements :1. Write a script createuser.sh, the execution syntax of the script must be:createuser.sh-u username-m password, options and parameters can support multiple spaces, but can not be reversed in order. When the correct option or
linux drwxr-xr-x the first bit represents the file type. D is the directory file, L is the link file,-is the normal file, p is the pipe 第2-4位 represents the owner of this file owns the permissions, R is read, W is write, X is executed. 第5-7位
One. Partition encryption1. Create encryptionCryptsetup LUKSFORMAT/DEV/VDB2This would overwrite data on/dev/vdb2 irrevocably.Is you sure? (Type uppercase Yes): Yes # #确定加密Enter Passphrase: # #密码大于8位, and can't be too simpleVerify Passphrase: # #确认密码6
Linux has this powerful permission to operate. We can simply classify Linux rights management:The permissions themselves are : Read read , write wRite , run executePermissions for Target: file, folder folderPermissions for users: master user,
Computer FundamentalsLinux HistoryFile management (viewing, processing)Directory ManagementLHSTimestamp, time, shutdownPhilosophical thoughtFile namingBasic features of BashCommand line expansionCommand completionPath completionGlobShortcut
1. The modification time is 2016-11-01 12:06:26;650) this.width=650; "src=" Https://s4.51cto.com/wyfs02/M00/9D/8E/wKiom1mBzeWDxKtrAAAgSxeYaqI719.png "title=" Screenshot from 2017-08-02 21-02-24.png "alt=" Wkiom1mbzewdxktraaagsxeyaqi719.png "/>2.
This file/etc/sysconfig/i18n, is to set the system default language place, for my system, now its content is as follows: lang= "en_US" supported= "En_us:en" sysfont= " Latarcyrheb-sun16 "sysfontacm=" iso01 "If you want the default language of the
Linux memory leakage detectionIn actual projects, the most difficult problem is memory leakage. Of course, there are panic and so on. Memory leakage is divided into two parts: user space and kernel space. we will analyze these two levels
Common commands in Linux and Common commands in linux
Including date and time, viewing hard disk information, shutdown and restart, output and view, archiving and compression, and searching.Date and Time
The operation here is equivalent to
Let's take a look at the linux useradd command, linuxuseradd.Create useradd command in linux
Linux create user useradd command http://www.xfcodes.com/linuxcmd/user/24308.htm
1. Relationship between adduser and useradd command Sample Code for copying:
Basic Structure of Linux file system, basic structure of linux File
Linux File System Structure
The following two images show the structure of the Linux File System.
Current working directory
Practice:
File Name
These Rules apply
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service