Linux (11) _ Apache server, linux _ apache
Check whether apache is installed.
Rpm-qa | grep httpd
Install yum install httpd
Service httpd start
Test Apache server
Note: Firewall Configuration
This is the default firewall policy. It should be accessible from the browser, but it is blocked. The access is nor
Cross-file transfer between linux servers, linux server filesScp command
1. Local> Remote Server
Scp-r/home/name/Hi root@192.168.0.1:/home/name
/Home/name/hello is the source directory, test2 is the target directory, root@192.168.0.1 is the remote server user name and IP
The command window, enter "Services.msc", enter the input method into Chinese character input, hit "rsync", press ENTER to search, left click to select Automatic, restart can2, to this step after the Windows Rsync Server even start to complete!4. The Linux client installs the Rsync tool and executes the following commands to synchronize,1, RSYNC-VZRTOPG--progress--password-file=/etc/rsyncd.secrets--port=28
In the server running, use FREE-M to view the server memory, often found free value is very small, some students will be very nervous, always want to take some measures, make free value looks higher, in the mind is a bit more cool. In fact, personally feel that this is a picture of the fast, there is no substantive use.
First, the public release memory method1. First use Free-m to view remaining memory
In some large companies often appear such a situation: the company or some institutions of internal business System Application server and data are made of multi-machine cluster deployment and basically are Linux system, and are internal network, not with the external network communication. This often happens when I send a task later than the time it was received by the other task. This often makes us heada
Why Linux log servers are installed:
As we all know, Linux is a perfect log system operating system. When the system administrator is running the maintenance server, it is unavoidable to view the log file, when the server is wrong, the error is not to view the system log. When administrators manage a network with more
/dhcpd.confThe first time you modify the configuration file tip let me refer to/usr/share/doc/dhcp*/dhcpd.conf.sample, copy a template to overwrite the original configuration file with CP/usr/share/doc/dhcp*/ dhcpd.conf.sample/etc/dhcp/dhcpd.conf Ddns-update-style none;Ignore client-updates;Subnet 192.168.10.0 netmask 255.255.255.0 {//DHCP assignment to 10 segmentsoption routers 192.168.10.1; 10 Gateway for network segmentoption Subnet-mask 255.255.255.0;//Subnet Mask#option domain-name "linux.c
First, what is the SCP?
The SCP is a secure copy shorthand for remote copy of files under Linux, and a similar command has CP, but the CP is only copied on the local computer, not across servers, and the SCP transmission is encrypted. may have a slight impact on speed.
Second, what is the use of SCP?
1, we need to get a file on the remote server, the remote server
*/etc/inetd.conf File
As we all know, as a server, the more open the service port, the more difficult to guarantee the security stability of the system. So servers that provide specific services should be as open as possible to the ports that provide the service, and the services unrelated to the server will be shut down, for example, a machine that is a WWW and FTP ser
Today, someone told me that the memory on the Linux server is not fast enough, 128G of memory, will be used up immediately. I was startled, the application on this server is now very small, ah, how the utilization will be very high. First use Zabbix to see the next, memory remaining space is still very big, there is 117G of spare ah. Then log on to the
Server heat dissipation and Linux temperature detection, linux TemperatureWhen the server is placed in poor cooling conditions, this will lead to premature damage to the hard drive, and other components of the server will soon fail. When a modern
When files on one server are updated, other servers also need to be updated, and when they are updated
It should be updated only on new or modified files, otherwise it will cause network bandwidth and waste of time. Rsync is able to have
Excellent software that keeps files and directories consistent.
Rsync,remote Synchronize
As implies know it is a remote synchronization function of the software, it synchronized files at the same time, you can keep th
configuration of FTP server2. Learn to configure the FTP service for local users in Linux systemsPractical training equipment and environment1. A server equipped with a Redhat Linux9 system, a PC equipped with Windows Professional.2. RedHat Linux9 installation CD.3. Two machines TCP/IP is set in the same subnet. and ensure LAN connectivity.Training ContentInstalling an FTP serverConfiguring a virtual FTP s
Linux Server death case analysis, linux Case Analysis
Symptom:
When running a specified script on a linux server, there will be countless identical processes, which will not be killed, and the system will be in an endless loop, login fails. You can only manually press the po
Configure Telnet to connect to a Linux serverTelnet allows access to a Linux server from the Windows platform, with the same effect as an SSH client, except that it is more secure with SSH connections.
Check if the Telnet service is installed on the Linux system Rpm-qa|grep telnet, return empty, indicate no in
with your Apache port.
PORT[80] After the carriage return appears like port[29902], this is your administrator login server's port number, must remember that the following to use.
Next, give a list of the parameters you set above:
Previous Prompts:[f]: Enter F to confirm the above parameter setting, start the installation immediately, enter P reset.
Installation complete.
3, start the server
Enter the bin folder of the installation directory
#cd Bin
You can use the uptime, top, and W commands to view.Take the uptime command as an example:[Email protected]:~17:31:26 up 7:27, 2 users, load average:0.09, 0.06, 0.10The three values in load average represent the average number of processes in the process queue in the last 1 minutes, 5 minutes, and 15 minutes, respectively.These three values are generally not larger than the number of system logical CPUs. For example, my own computer logical CPU value is 1, so the three value longer than 1 for
In general, there are two strategies for implementing Linux firewall functionality. One is to completely prohibit all input, output and forwarding packets, and then gradually open each service function according to the user's specific needs. This approach is characterized by a high degree of security, but must take into account all the service features required by the user, without any omission, requiring the system administrator to be aware of what s
Domain Binding
Tomcat Service binding Domain name method
ECS Linux system domain binding host after ping test does not take effect
Nginx ways to bind multiple domain names
ECS Linux can not resolve the binding domain name in the hosts of the troubleshooting method
Server login
ECS Linux failed to check methods
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.