Mysql is automatically backed up in centos, And the backup file is transferred to another machine for backup.
1. Create a backup directory and a backup script file.
2. Submit the backup file as follows:
#! /Bin/bashNow = $ (date + "% Y % m % d") #
Rsync is a data-mirroring Backup tool under Unix-like systems, which can be seen from the name of the software--remote syncit has the following characteristics:The entire directory tree and file system can be saved in a mirror.It is easy to keep the
CD///Switch directory,To the root directory/: root CD ~Quickly go back to the current user's home directoryCD-//return to the directory you visited last timeCd.. Return to the top level directorypwd//printing the current directory pathLS//Lists the
Recently, some netizens asked me on the internet how to configure the 3Com Switch. Because of the many questions, I guess this switch is more cost-effective, and there is a 3com 4200 3c17300a, so I will save his configuration code for you!
Usage:
1.
[Introduction]
Linux system security cannot be ignored. However, system reinforcement is not very easy. The author briefly introduces the in-depth security reinforcement for Linux systems.
★Deep security reinforcement for Linux systems
Author:
For system administrators, the focus of their work should be on maintaining the normal operation of the system and providing services normally. A data backup problem is often involved here, as I know, 80% of system administrators do not care too
Author: Cao jianghua
ProFTPD is developed for the weaknesses of Wu-FTP. In addition to improved security, it also has many features that Wu-FTP does not have, and can run in stand-alone and xinetd modes. ProFTP has become the most popular FTP
SecurecrtThis SSH client software has both terminal simulators andFileTransmission function. It is much more convenient than FTP commands, and the server no longer needs to enable the FTP service. Rz, SZ isLinux/Same as UNIXWindowsPerform
Linux Network commandsThis article describes network-related commands. The author assumes that the reader has the basic knowledge of the TCP/IP protocol stack. Only the basic usage and general descriptions of related commands and their output are
Configure password-free SSH on the cluster nodeTo configure SSH without a password, you must first generate an RSA or DSA key on each cluster node, and then copy all the keys generated by all cluster node members to the authorization key file, the
Ubuntu16.04 server configuration ssh password-free login, ubuntu16.04sshThe original document is in English. The link is to write/home/try/in the region-t rsa file /. ssh/server_rsa, do not use the default value, I named server_rsa worried about
Use Xshell to generate a key, without a password to log on to linux, xshelllinux
We usually use the command ssh user @ ip in Xshell to remotely log on to linux. This will prompt us that it is troublesome to enter the password. If we want to log on
Analysis of SSH operations in Linux1. view the SSH status:
Service sshd status
Check whether ssh has been started and some status information
2. Start the SSH service:Systemctl restart sshd. service
Ps: some basic services under fedora are
Using the nagios plug-in to log on to the vro for ping monitoring
Router_check_apn_ping.c
#include #include #include #define OK 0#define WARNING 1#define CRITICAL 2#define UNKNOWN 3#define LEN 1000//#define TCL_CMD "/home/weihu/tcl/"#define
1. What is rsync?
Rsync, remote synchronize is a software that implements remote synchronization. It can keep the permissions, time, soft and hard links, and other additional information of the original file while Synchronizing files. Rsync uses the
Copy codeThe Code is as follows :#! /Usr/bin/CT-f
Set timeout 30
Set host "192.168.1.198"
Spawn ssh $ host
Expect_before "no )? "{
Send "yes \ r "}
Sleep 1
Reset CT "password :"
Send "123456 \ r"
CT "*#"
Send "echo my name is
Ansible learning-ansible
Ansible technologies (Automated O & M tools) are developed based on python.
Installation methods include yum, apt, pip, etc.
For example, pip: pip install ansible
The only requirement of ansible for the client is to have SSH
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.