Read about operations management for dummies, The latest news, videos, and discussion topics about operations management for dummies from alibabacloud.com
Using domain-based virtual host configuration is a popular way to configure multiple domain names on the same IP and access through 80 ports.(1) Configure 192.168.1.215 This address on the fifth interface of the NIC Eth0:(2) Configure the/etc/hosts file, the 192.168.1.215 corresponding domain name is as follows:Do a ping test to ensure that the IP is on-pass:(3) Establish a virtual host to store the root directory of the Web page, and create the index.html file of the homepage file(4) Modify the
configuration file and restart the Apache server(i) using the APACHECTL-T command to test if the configuration file is correct, restart the Apache server with the apachectl restart command:(ii) test the opening of a virtual host using the Curl command:The display cannot be connected. It is only then remembered that the firewall does not open 8080,8081,8082 these ports, open:Vim/etc/sysconfig/iptablesRestart Iptables:Then connect the porttest:8080 with the Curl command, resulting in a series of
Copying files, directories1. Use CP (copy) command to copy files or directoriesCP source file (folder) destination file (folder)Common parameters:-R recursively replicates entire directory tree (for copying folders)-V Show More information2. Use the MV (move meaning) command to move files or foldersMV File destination DirectoryIf you specify a filename, you can rename the file (in the same directory)3. Use RM command to delete files or directoriesCommon parameters-I. Interactive-R recursive dele
-----provide ad\exchange\lync\sharepoint\crm\sc\o365 and other Microsoft product implementation and outsourcing, qq:185426445. Phone 18666943750Requirements: Sometimes we need to compare the CSV file report automatically acquired daily by the PowerShell program to determine what happens every day, as follows: We compare the column "Computer name" of the automatically generated CSV file before and after two days.The script is as follows:Diff-referenceobject (import-csv \ c \ Statistics Computer a
Rpm-qi
Querying for information about a specified package
Rpm-ql
Query the list of all files generated by the specified package installation
Rpm-v
Verifies whether the current file has been changed
4. Package Check:1, local key address:/ETC/PKI/RPM-GPG[Email protected] yum.repos.d]# ll/etc/pki/rpm-gpg/-rw-r--r--.1 root root 1706 October rpm-gpg-key-centos-6-rw-r--r--.1 root root 1730 October rpm-gpg-key-centos-debug-6-rw-r--r--.1
stores the file type, permissions, nodes occupied by the link, file owner, File Group, file size, last modified time, last accessed time , and so on.Tree
Role
View the directory tree.
Options
-A: Displays all files, including hidden files.-D: Displays only non-hidden directory files.Ls:list
Role
Lists the specified directory files and properties.
Options
-A: Displays all files that contain hidden directories that begin with the.-A: Display
(5) Unzip the file for gzip package backup[Email protected] desktop]$ TAR-ZXVF yy.tar.gzyy/Yy/fee.txtyy/y/Yy/d.txt(6) Use the Bzip2 tool to package yy as a y1y.tar.gz[Email protected] desktop]$ TAR-JCVF y1y.tar.gz yyyy/Yy/fee.txtyy/y/Yy/d.txt(7) After packaging yy directly decompression, do not produce intermediate filesTar-cvf-yy | TAR-XVF-4.dd (except for replication, the biggest use is backup)dd if= input file of = Output file bs= (block size, default 512 bytes) Count=bs number(1) Backing up
no W write rights for the user, and the file's parent folder does not have a w write right for that user.you want to save the file for a folder. To disable certain user actions, set the appropriate permissions on the file's corresponding folder. folder is not read for this user Read , write Write , Run execute permissions. this way the user does not have any permissions on the folder's files . Use of ② folder for permissionsREAD: Can see the file information inside the folder Write : Do y
write to the file, forcibly write to save also can not. The reason is that the file does not have W write rights for the user and the parent directory for the file does not have w write rights for that user.to save a file in a directory, when certain user actions are disabled, the appropriate permissions are set for the directory corresponding to the file. directory is not read for this user Read , write Write , Execution execute permissions. This allows the user to have no operational permis
() # Process CPU time information, including user, system two CPU Time #a.cpu_affinity () # Get process CPU affinity, if you set the process CPU affinity, the CPU number as the parameter can be #a.memory_percent () # Process Memory Utilization #a.memory_info () # Process Memory rss, VMS Information #a.io_counters () # Process IO information, including read and write IO number and bytes #a.connections () # Returns the Namedutples list of sockets for open processes, including FD, family, laddr, a
drop primary keyCreate a normal indexalter table student add index index_dept(dept(8))Create an index based on the first n characters of a columncreate index index_dept on student(dept(8))To create a federated index from multiple columnscreate index ind_name_dept on student(name,dept);Create an index based on the first n characters of multiple columnscreate index ind_name_dept on student(name(8),dept(10));Delete Normal indexAlter table student drop index index_deptdrop index ind_name_dept on st
peopleA.sbit only valid for directoryB. The performer needs to have W, x permissions on the directory, that is, permission to write.C. When a user creates a file or directory under that directory, only himself and Root have the right to delete (their own) files, and in the same vein, they cannot delete others ' files.Set suid, SGID, Sbitcorresponding 4 2 1 respectivelyExample: Ls-l file "permissions to view Files"chmod 4755 Test//Join has SUID permissionchmod 6755 Test//Permissions with Suid/sg
Tags: Technology remove pre admin action png up and down Linux user Admin user BSPView Current User ContextID -ZView logged-in users and their corresponding SELinux usersLogin -LChange the correspondence between user and SELinuxSemanage login-a option can be changed,-S is used to specify SELinux userExample:First, look at the context under the Likaiming userID -ZExecute the following command to change the SELinux user likaiming Loginlogin -a-s Staff_u likaimingKill User LikaimingPkill-kill-u lik
A MariaDB MariaDB is a compatible open source version of MySQL.
Simple use of two MARIADB 1. Installing the MARIADB
Yum insatll mariadb Mariadb-server
Systemctl Start mariadb
Systemctl Enable MARIADB
2. Firewall turned on
Firewall-cmd--permanent--add-service=mysql
Firewall-cmd--reload
3. Initialization of the database (execution after installation is complete)
Mysql_secure_installation Database Initialization Command Step 1th: Set the root user password. 2nd Step: Delete the anonymous account.
3
Linuxcommon file system Operations management directives are as follows1.CommandMkfs:Create a new file system for a partition, which is the advanced format partitioncommand format: MKFS [-v] [-t fstype] [fs-options] filesys [blocks]Common Options explained:[-T Fstype] : Specifies the type of file system to create , default is ext2Mkfs-t ext3 =mkfs.ext3 = mke2fs-jMkfs-t ext2 =mkfs.ext2 = mke2fsMkfs-t VFAT =m
recognition and management, Start with a soft link to/etc/rc.d/init.d/ , and then add the #chkconfig at the beginning of the startup script : Run-level start order shutdown order,# Description: Content customization, also perform #chkconfig--add service name. Example:#ln-S/usr/local/apache2/bin/apachectl/etc/rc.d/init.d/ (can be identified and managed by service commands#vi/etc/rc.d/init.d/apachectl#chkconfig: 35 86 76#description: Source Package Apa
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.