Common Linux commands (version 2)-file search commandsFile SEARCH Command
1. which/usr/bin/which # displays the directory where the system command is located. It is an absolute directory and cannot find files.
Format: which [system command]
E.g. which ls
Appendix-whereis: You can also find the absolute path of the command.
Unlike whereis, which lists the alias records of this command, and whereis displays t
2. Common Linux operation commands (1) and linux operation commands
BASH: It is the GNU Bourne Again Shell, which is the default Shell on the GNU operating system.
Bourne Shell: Shell developed by Bell lab.
Korn Shell: It is the development of the Bourne Shell and is compatible with the Bourne Shell in most aspects.
C Shell: It is SUN Shell's BSD version.
Comman
.② file belongs to group: a user can belong to more than one group, but it can only have one default group . So when a file is created, its owning group can only be the default group that the user belongs to(2) Umask command
Command name
Umask (The user file-creation mask)
Command path
Shell built-in commands
Execute permissions
All Users
Original: chAnge file grouP ownershipCommand location:/bin/chowmExecute Permissions: All UsersFunction Description: Change the owning group of a file or directorySyntax: chown [user] [file or directory]----------------------------------------------------------------------------------Rights Management Command : umaskCommand name: umaskCommand English Original: the user file-creation MaskCommand path: Shell built-in commandsExecute Permissions: All UsersFunction Description: Display, set default
Common Linux commands (2): ipcs/ipcrm commands, ipcsipcrmIpcs
1. Command Format
Ipcs [resource-option] [output-format]Ipcs [resource-option]-I id
2. command functions
Provide information about the IPC Device
3. Usage
Resource options:
Ipcs-m view system shared memory information
Ipcs-q: view system message queue Inform
Linux operating system and common commands 2. Common commands in linux
Date: Time Management
Linux:
Hardware clock: clock, hwclock
Hwclock
-W: Change the hardware clock
-S: Change the system clock
System clock: date
Rtc: real time clock
Ntp: net time protocol
Get Command help:
Internal command:
Help COMMAND:
External command
Common Linux commands (2) -- permission management command 1. Command name: chmod www.2cto.com execution permission: All Users Function Description: Change the file or directory permission Syntax: chmod [{ugo} {+-=}{ rwx}] [file or directory] [mode = 421] [file or directory] chmod user type add or remove permission file or directory pair the owner of file a adds the execution permission [root @ localhost ab
Linux basic commands (2) commands on disk space, linux disk spaceDisk Space commands
Command
Function
Mount
Mount a File System
Umount
Detach a mounted file system
Df
Check the disk space of each hard disk partition and mounted file system
Du
Show file directo
Improve readability of information in kilobytes, MB, GB
-S
Only the sum of each file size is listed
-X
Only compute files that belong to the same file system
2.5 fsck CommandThe function of the fsck command is to check and repair the Linux file system, which is best used when no one or no partition hangs up, in fact, each boot system will do a check to see if there is a bad track or data loss phenomenon. Usage:fsck (-option) partition name
Common Linux commands (2) -- permission management command 1. command name: chmodwww.2cto.com execution permission: all users function description: change the file or directory permission syntax: chmod [{ugo} {+-} {rwx}] [file or directory] [mod... common Linux commands (2) -- permission management command 1. command n
Permission management command:
1. chmod [changethe permissions mode of a file]:/bin/chmod
Syntax: chmod [{ugo} {+-=}{ rwx}] [file or directory name] // intuitive
E.g. chmodu + wx filename
Chmodo-x filename
Chmodg = rwx filename
Or: chmod [mode = 421] [file or directory] // recommended
Number of the permission pair:
R-4
W-2
X-1
E. g. rwxr-xr -- 754
Rw-r-x -- x 651.
752rwxr-x-w-
Chmod777 dir1 // set the directory dir1 to have all permissions for all use
End_log_pos 528992 event: The Id:thread of the thread on which the server executes this event when the query event occurs The time stamp of the _id=29 statement and the difference between writing it to the binary file: exec_time=0 error code: Error_code=0 Event Content: Gtid:global Transaction ID, mysql5.6 with MARIADB10 version exclusive properties: GTID
Use mysqlbinlog mariadb-bin.000001 > file.sql commands to redirect to a SQL file, and t
One, log type:
MySQL has several different log files that can help you find out what's going on inside Mysqld:
The type of information that the log file is logged into the fileThe error log records issues that occur when you start, run, or stop.query log records establishe
}: grouping, A and B are used as a unit of use,|: Alternatively, only one can be selected;...: Similar content can appear more than one;Man's brief use mechanism:Flip Screen:SPACEBAR: Turn a screen at the end of the file;B: Turn the file to the first screen;Enter: Flip a line to the end of the file;K: Flip a line to the file header;Ctrl+d: Half-screen to the tail of the file;Ctrl+u: Turn half screen to file header;Text Search:/keyword: Search the tail of the file;Keyword: Search the file header;
default, both head and tail display 10 rows of content. The following is a comprehensive example:
Root @ localhost lpi103-2] # dmesg | tail-N15 | head-N 6 # first from the last 15 lines to the end, then take the first 6 lines tg3. 0: eth0: link is up at 100 Mbps, full duplextg3. 0: eth0: flow control is on for Tx and on for rxtg3. 0: eth0: link is downg3. 0: eth0: link is up at 100 Mbps, full duplextg3. 0: eth0: Flow Control is off for Tx and off for
-planting door batch processing. The two batch processing and post-door program (windrv32.exe.pdf, And the batch xec.exe should be placed in a unified directory. Batch Processing contentStill scalable. For example, adding the log clearing + DDOS function and adding users regularly can enable automatic propagation (worm ). I will not describe it here. If you are interested, you can study it on your own.
2. H
Oracle Data Guard from the macroscopic point of view, mainly provides the following two services:
1) Log transmission: The main library transmits the generated redo log to the standby library;
2 log application: The redo log, which is transferred from the main library, is
1. One of the most basic examples of using the logging framework to write a log is basically three steps
Introduction of Loggerg Class and Logger factory class
Statement Logger
Record log
Let's look at an example1. Introduction of the SLF4J interface Logger and Loggerfactoryimport Org.slf4j.logger;import Org.slf4j.loggerfactory;public class UserService { //
recovery process is the fastest in all policies, relative, its backup process is the slowest of all strategies, in addition, A pure full backup cannot purge the things log (using a full or bulk recovery model with a point-in-time recovery feature), which can be used as a supplementthe truncate_only clause executes a thing log backup, emptying only and not backing up the thing
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.