1. the UNIX system password file contains the fields shown in the passwd struct defined in
POSIX defines two functions for getting password file items. After the user login name or user ID is given. The two functions can be used to view related items.
# Include
Struct passwd * getpwuid (uid_t UID );
Struct passwd * getpwnam (const char * Name );
To view the en
Tags: RAC des function Apache SDN socket link character userWhat is the lsof command? You can list information about the files that are opened by the process. The files that are opened can be1. Common files, 2. Directory 3. File of the network file system, 4. Character device file 5. (function) shared Library 6. Pipelines, Named Pipes 7. Symbolic Links8. Bottom s
The following is a description of the 20 log files that are located under the/var/log/directory. Some of these are only available in specific versions, such as Dpkg.log, which can only be seen in Debian-based systems.
/var/log/messages -Includes overall system information, which also contains logs during system sta
ChmodIs a Command Used in UNIX systems to control the user's permissions on files (ChAngeMoDA combination of e-word prefixes) and functions. Only the file owner and the Super User can modify the file or directory permissions. You can use absolute mode to specify the object ACL in symbolic mode.Usage
ChmodUse syntax
$ chmod [options] mode[,mode] file1 [file2 ...]
Use the LS command to
UNIX advanced environment programming (3) Files And Directories, unixdirectories
In the previous two articles, we learned some basic operation functions of IO operations, including open, read, and write.
In this article, we will learn about other features of the file system and the attributes of a file. The functions involved include:
View all attributes of
Tags: style blog io ar color sp file div problemCreate a core file conditionUse Ulimit-c to specify the core file size to enable the creation of the core file, such as: Ulimit-c UnlimitedAnalyze the condition of the core file with GDBThe executable program compiles with the-G parameter, otherwise gdb cannot find the symbol information and cannot locate the problem.For example, in the following two CPP files, Test.cpp will cause crash.Test.cppvoid Test
information to perform a write operation5: Write before dbwn a checkpoints executes.Dbwn the function of this process (write the information of redo log files back to datafiles)Must write redo log first, and then write to the data file.How the online Redo days file works:Use the loop to understand the definition of log
the font configuration . /VAR/LOG/FSCK-File System log/var/log/faillog-Contains user logon failure information. In addition, the error login command is also recorded in this file./var/log/hp//var/log/install//var/log/jokey.log/v
Tags: logrotate rotate log files mongodb logs switchMongoDB Log switch (Rotate log Files) combat1. Under MONGO Shell, execute the logrotate command:Use admin db.runcommand ({logrotate:1})Need to run on Mongos,mongod,config server.Variants of the method:A) run under the
Apache Log scrolling configuration in windows solves the problem of too many log files. By default, apache logs are written into two log files, namely, error. log and access. log, as
Linux Log view-head command usage introduction, linux Log head command
The head command is used to display content starting with a file. By default, the head command displays the first 10 lines of the file.
NAME (NAME) head-output the first part of files part of SYNOPSIS (summary, outline) head [OPTION]... [FILE]... DE
into the database:
Mysqlbinlog--start-date= "2012-10-15 16:30:00"--stop-date= "2012-10-15 17:00:00"
mysql_bin.000001 >d:\1.sql SOURCE D:\1.sql
(2). Specify the start \ End position, from the above view generated binary log we can know the beginning of a log to the end of the position, we can in the process of recovery to specify the response
action is a common situation where cron derives a scheduling process. REPLACE action records the updates to its cron file, which lists the task scheduling to be periodically executed. The RELOAD action occurs shortly after the REPLACE action, which means cron notices that a user's cron file is updated and cron needs to RELOAD it into the memory. This file may find some unusual situations./Var/log/maillogThis log
If you are willing to spend some time on the Linux environment, you should first know where the log files are located and what they contain. Learning about these different log files while your system is working properly can help you find and solve problems in emergencies.The following is a description of the 20
1. Apache Access LogEnter command cat/usr/local/apache2.4/conf/extra/httpd-vhosts.conf, enter, see,The access log for this virtual machine is inside the/logs/111.com-access_log, enter the command ls/usr/local/apache2.4/logs/, you can see the access log file, see,You can use the command Cat/usr/local/apache2.4/logs/111.com-access_log to view the contents, enter, s
the derived process. One cmd action is a common situation where cron derives a scheduling process. Replace action records the updates to its Cron file, which lists the task scheduling to be periodically executed. The reload action occurs shortly after the replace action, which means cron notices that a user's Cron file is updated and cron needs to reload it into the memory. This file may find some unusual situations. /Var/log/maillog this
A log file is a collection of records or files used to record system operation events. The operating system has an operating system log file, and the database system has a database system log file. Today we will introduce the LOG files
Log files of the liunx System
Address: http://tech.ccidnet.com/art/3089/20070601/1098901_1.html
Network Management relies mainly on system logs, which we often call log files, to obtain intrusion traces and your incoming IP addresses,
Or other information. Of course, some network administrators use third-party tools t
The Linux login log is in the following directory:Cd/var/logTo view the login log for an SSH user:Less secureLinux Log Management:1. Introduction to the LogLogs are important for security, and he records a variety of things that happen every day in the system, and you can check the cause of the error or the traces of a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.