Efficient Data Synchronization Methods and efficiency tests-20150105, -- 20150105
Sometimes it takes a long time to back up or synchronize large directories with many files (such as several GB or dozens of GB database directories and log Directories,
Use scp, ssh, etc. without entering a password, scpsshYou do not need to enter a password when using scp or ssh.Echo scp-r root@132.12.22.35:/www/applog/backlog> exp2.shEcho scp-r/home/oracle root@10.10.252.5:/www/back/backdmp> exp2.shScp-r root@132.
Background: The SSH service needs to be enabled for the newly installed BT5-R3 System (192.168.100.141.
1. Run the command: service ssh start on 192.168.100.141, and the service is enabled.
Run the SSH command: ssh root@192.168.100.141 with the
Create docker image and sshddocker With sshd service
Reference: https://docs.docker.com/examples/running_ssh_service/
1. Create an empty directory to store Dockerfile
Mkdir-p/home/thm/docker/test/new_image
Vim Dockerfile
The content of Dockerfile
The 25 SSH commands that must be remembered are free versions of the SSH connection tool. Telnet, rlogin and ftp users may not realize that their passwords transmitted over the Internet are unencrypted, but SSH is encrypted. OpenSSH encrypts all
> Transfer
> OpenSSH is a free version of the SSH connection tool. Telnet, rlogin and FTP users may not realize that their passwords transmitted over the Internet are unencrypted, but SSH is encrypted. OpenSSH encrypts all communications (including
Editor's Guide: Any system administrator or webmaster is familiar with SSH. This great technology (51cto system channel just expressed thanks to it on Thanksgiving Day) this frees us from having to go to the server room to manage servers, or worry
Example:A is a local host (that is, a machine used to control other hosts );B is the remote host (that is, the server of the controlled machine), if the IP address is 192.168.60.110;Both system A and system B are Linux
Run the following command on:
Methods for automatic SSH logon 1. Automatic ssh/SCP Method =
A is a local host (that is, a machine used to control other hosts );
B is the remote host (that is, the server of the controlled machine), if the IP address is 192.168.60.110;
Both
The previous article shared the Nginx + TOMCAT reverse Agent Load Balancing cluster Deployment Guide, the feeling is quite practical, but the general cluster deployment is based on a large number of visits, some enterprises may not use, similar to
First, the realization principle
SSH logon is done using a method known as "Public key" authentication. A simple explanation for the "public Key" authentication method is:
First create a pair of public private keys on the client (public key file: ~
First, the realization principle
SSH logon is done using a method known as "Public key" authentication. A simple explanation for the "public Key" authentication method is:
First create a pair of public private keys on the client (public key file: ~
1. Automatic Ssh/scp method
A is a local host (that is, a machine used to control other hosts);b is a remote host (that is, a controlled machine server), if IP is 192.168.60.110;Both A and B systems are Linux.
To run a command on a:# ssh-keygen-t
Example:A is a local host (that is, a machine used to control other hosts);b is a remote host (that is, a controlled machine server), if IP is 192.168.60.110;Both A and B systems are Linux.
To run a command on a:# ssh-keygen-t RSA (three
1. List all directory usage and sort by size.
Copy Code code as follows:
Ls|xargs Du-h|sort-rn
#不递归下级目录使用du-sh
2. View the file exclusion with the # switch and blank line, suitable for viewing the configuration file.
Copy
Reprint Address: http://blog.csdn.net/netzsm/archive/2007/09/13/1783055.aspx
1. Automatic Ssh/scp method = =
A is a local host (that is, a machine used to control other hosts);b is a remote host (that is, a controlled machine server), if IP is 192.16
This article will cover another high-availability implementation of MySQL, namely MHA (Masterhigh avaliable). Master HA. is an open source high-availability program that provides MySQL's master-slave architecture with the ability to automatically
Configure two-way password-free authentication for SSH in LinuxI. Implementation Principle
Use a public/private key authentication method for ssh login. The following is a simple explanation of the "Public/Private Key" authentication method:First,
I tried the first method. Note that the remote host. Ssh/authorized_keys needs to be generated through the ssh-keygen gesture. The previous steps were successful, but the configuration was still not successful after the instance was
1. Use rsync + ssh software for regular file backup and Incremental backup, but not for real-time backup, so the effect is not very good.Server A (ip: 2.2.2.135 ):[Root @ CentOS ~] # Ifconfig eth0 -- View IP addressesEth0 Link encap: Ethernet HWaddr
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.