the system and the resource consumption of each service such as Apache, MySQL, SSH, FTP, etc.
21. Check the log regularly
Moving logs to a dedicated log server prevents intruders from easily changing local logs. The following are the default log files for common Linux and their usefulness:
/var/log/message– records the system log or the current activity log.
issues. But what if you monitor and collect user behavior information? There are two very useful tools, ' psacct ' and ' acct ', that can be used to monitor the behavior and processes of users in the system. These tools run in the background of the system and keep track of every user's behavior and services such as Apache, MySQL, SSH, FTP, etc. 21. Check the log regularly Moving logs to a dedicated log server
advantages and disadvantagesEdit1, the most core is that there is no reliable support services, no one is responsible for the results; 2, the function is relatively simple, support the complex application load balance ability is poor, such as the algorithm is less; 3, the Open tunnel mode needs to recompile the kernel, 4, the configuration is complex, 5, mainly used in Linux, There is currently no version dedicat
:/usr
5.12.5%, Mount point is:/
6.6.25%, Mount point is:/home
7. Remaining space, Mount point is:/var
Knowledge Point parsing: Linux partitions are different from other operating system partitions, and its partition format commonly has EXT4 and swap two kinds, EXT4 is used to store system files, swap is a Linux swap partition (equivalent to the virtual memory file in Windows). Now we can know that
starts, the default is standalone STANDALONE,HTTPD the server is started by itself and resides in the host to monitor connection requests. The Web server is automatically started in the startup file/etc/rc.d/rc.local/init.d/apache under Linux, which is the recommended setting.
Another way to start the Apache server i
Write in front:When you get a server, don't worry about deploying apps, security is a top priority. If you sort the order, the Linux system can be secured by following several steps. This article is mainly for the enterprise common CentOS system, Ubuntu system slightly different can be Baidu query.1. System User Optimization2. System service Optimization3.SSH Access Policy4. Firewall configuration1. System
Fault one,The first thing that came up this morning was to check out a 64-bit CentOS 5.5 server that was just reinstalled last night, which is four hard drives for two RAID1, one dedicated to the OS, one for data,In the process of installing the system, in order not to lose the data, I touch also touch, the root system today, I use Mount/dev/mapper/ddf1_datap1/data to mount, very smooth mount up, the result
] [-nonrevertible]-PhysDrv[1:5] -A0 -. Delete Global Hot Spares #/opt/megaraid/megacli/megacli64-pdhsp-rmv-physdrv[1:5] -A0 the. Put a physical disk off the line/Online #/opt/megaraid/megacli/megacli64-pdoffline-physdrv [1:4] -a0#/opt/megaraid/megacli/megacli64-pdonline-physdrv [1:4] -A0 -. View Physical Disk rebuild Progress #/opt/megaraid/megacli/megacli64-pdrbld-showprog-physdrv [1:5] -A0 or display in dynamic visual text interface #/opt/megaraid/megacli/megacli64-pdrbld-progdsply-physdrv [1:
the best choice for the database environment (ORACLE rac,mysql, etc.).4) as (expected I/O scheduler)The focus of CFQ and deadline is on satisfying fragmented IO requests. For continuous IO requests, such as sequential reads, no optimizations are made. To meet the random IO and sequential IO mix scenarios, Linux also supports the anticipatory scheduling algorithm. Anticipatory on the basis of deadline, for each read IO set a 6ms waiting time window. I
Tags: Apach equals self Management Directory descriptor Log network communication/etc/Background: In addition to network communication, the server program has a lot of details.Features: The details are template-style, so only need to speak clearly, follow certain norms is goodCategory: 1.1 Run-to-background process, also known as the guard process. The terminal is not controlled and is not accidentally entered by the user.Its parent process is: the in
, to do a certain IP access frequency limit, to avoid being reasonable use of attacks.Third, appendixRecommend a website: zooomeye, Zhong Eye, is a search engine for cyberspace. His crawler is dedicated to scanning the server on the network, for example, he got an IP, began to detect which ports on the IP open, using some methods to obtain important open services information.With him, you can make a simple
Recently the company purchased a batch of servers, so collected some copy machine software to test the server hardware performance. Hardware stability is relatively important, 7x24 hours uninterrupted operation, mainly see three hardware: CPU, memory, hard disk.The following is a collection of some of the tutorials, may have been invalid URLs, but can be based on the software name to find some of the use of tutorials.Professional testing software for
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.