1. cron is a daemon that can be used to schedule the execution of repeated tasks based on the combination of time, date, month, and week.Cron assumes that the system continues to run. If the system does not run when a task is scheduled, the task will not be executed.YesTo use the cron service, you must install the vixie-cron RPM package and run the crond service. To determine whether the software package is installed, useRpm-Q vixie-cron command. To determine whether the service is running, run
Basic iptables and Samba configuration example
Basic concepts of iptable
Iptables table chain rules
Iptables packet transmission process
Iptables Command Format
Iptables common OPTIONS
COMMANDS
Description of common PARAMETERS
Use the match extensions extension module
Others
Build a samba Server
Configure the samba server
Add a samba account
Disable SELinux Firewall
C
Oracle11gR2RACService-SideTAF configuration example
Oracle 11gR2 RAC Service-Side TAF configuration example
How To Configure Server Side TransparentApplication Failover [ID 460982.1]
[Oracle @ db1 bin] $./srvctl add service-d orcl-s server_taf-r "orcl1, orcl2"-P BASIC
-- Here, orcl is the database name, And orcl1
Load balancing is our big traffic site to do a thing, let me introduce you to the Nginx server load Balancing configuration method.Let's start with a quick look at what is load balancing, which is interpreted literally to explain the average load sharing of n servers, not because a server is under-loaded and idle on a single server. Then the premise of load balancing is to have more than one server to achieve, that is, more than two units can be.Becau
. cpp to the project.
Add printsupport at the end of line 2 of the Pro file of the project, as shown in figure
Open the interface file, enter the graphical design interface, add a widget area to the main window, right-click the added widget area, and select the "upgrade to" button.
Enter "qcustomplot" for the promotion class name and click "add.
Select qcustomplot in the following interface and click the Upgrade button. The created widget is upgraded to the qcustomplot class.
Now let's run th
Common configuration Summary
Heap settings
-XMS:Initial heap size
-Xmx:Max heap size
-XX: newsize = N:Set the young generation size
-XX: newratio = N:Set the ratio of the young generation to the old generation. For example, if the value is 3, the ratio of the young generation to the old generation is. The young generation accounts for 1/4 of the young generation and the old generation.
-XX: Required vorrati
An example shows how to configure a Huawei switch: Set the user privilege level. A friend asked me to solve the problem about setting the user privilege level in the configuration of the Huawei switch, no detailed answers. The following is a basic solution for configuring Huawei switches on the Internet.
Verify the CGMP configuration on the Catalyst Switch Based
To facilitate the configuration of the web. config file, I wrote a common example of the web. config file, which can be modified as needed.Three shortcut methods for creating a web. config file:1. Use Asp.net website Configuration tool in vs2005 to configure2. Compile the machine. config file in the c: \ windows \ Microsoft. NET \ framework \ v2.0.50727 (. NET Fr
This article mainly introduces the example of a tftp backup configuration file for a digital device using python. For more information, see the following environment: [wind2003 [open Tftp server] + virtualbox: javastn10 server]
Tftp: Open TFTP Server
Ubuntn
Python + pyequalct
Reason for using virtual machine: pybench Ct does not support windows
Note: I originally intended to use secrueCrt scripts. because
PHP calls COM component Configuration take OpenOffice as an example
What is a COM component?
COM architecture, people can develop a variety of functional-specificity components, and then combine them as needed to form a complex application system. COM and language, platform-independent features enable all programmers to fully develop their talents and expertise in writing component modules.
The purpose of
Development of the application will have some may become a value, such as WebService address application of some IDs, etc., has been directly in the application of the code, not forget the point that, then think of the properties can be used configuration file, I put the URL and other variables configured in the configuration file, After that, you can change the configu
Example of a configuration file rereading by the daemon
Repeat apue to gain a deeper understanding of the daemon process, especially the corresponding
Programming rulesAnd
Application scenarios. I have a clearer understanding of the reasons for Fork twice, Log facility usage, and signal processing methods. Generally, when receiving a sighup signal, the daemon re-reads the
RuleEach slot in the APC cache will have a key,key that isapc_cache_key_t structure type, in addition to key-related properties, the key is the generation of H field. The H field determines which position this element falls in the slots array. The generation rules for user caching and system caching are different. User caching generates key through the Apc_cache_make_user_key function. The key string passed in by the user relies on the hash function in the PHP kernel (the hash function used by
Oracle boot, add ABC instance self-starter switch# Vi/etc/oratabOrcl:/u01/app/oracle/product/10.2.0/db_1:yAbc:/u01/app/oracle/product/10.2.0/db_1:y(2) Set boot start# vi/etc/rc.local#!/bin/shSu-oracle-c "Lsnrctl Start"Su-oracle-c "Dbstart"(3) Logging on to the database server manually starting and shutting down the DB instance methodThe method of entering ORCL instance;$ Export ORACLE_SID=ORCL$ sqlplus/nologSql> Conn/as SYSDBASql> startup;Method of entering ABC instance;$ Export ORACLE_SID=ABC$
1. Simple topology diagramLine import------line entrance (my room core switch)------My server terminal assigned IP101.251.65.33 101.251.65.34 || IP route 101.230.0.0 255.255.0.0 nextop 101.251.65.33Dedicated router2. Border Routing 3945 configurationDefine inside ports and zones (My Computer room intranet interface)Define the outside port and region (My computer room outside the network interface, is also the interface of the line access)Access-list 1 Permit 10.1.11.0 0.0.0.255 (allow intranet s
The actual example of a VLAN configuration is very simple, just like the eth-switch routing method through VLAN. First, let's look at a method with high hardware efficiency: Port1 ~ 4 As the access port and the user mode on the hardware, that is, the packets sent from the PC to these ports do not carry VLAN-tag. After the SW hardware receives the packets, based on the internal vlan
Example of LinuxNFS configuration and deployment procedure-Linux Enterprise Application-Linux server application information. For details, refer to the following section. NFS is a good shared storage system, but its performance is not very good under high load.
10.0.0.1-NFS Server
10.0.0.2-NFS Client
On NFS Server:
Shared Directory:/nfspool
NFS running user: nfsnobody
# Mkdir/nfspool
# Vi/etc/exports
/Nf
Code example for php to read the configuration file
/**
* Read the configuration file
* By bbs.it-home.org
*/
If (! Isset ($ config )){
$ ARR = file ("admin. conf ");
Foreach ($ ARR as $ val ){
$ Val = chop ($ val );
If (ereg ('^ [: space:] * #', $ val) | ereg ('^ [[: space:] * $ ', $ val ))
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.