This article is based on multiple posts on the Internet, but it is not original. The only thing that is gratifying is the implementation on the local machine. Because it failed several times after all. It is also quite difficult for me to learn many
Nfsen
Before I begin, let me remind you of the excellent documentation of nfdump and nfsen on the following pages:
Http://nfdump.sourceforge.net/
Http://nfsen.sourceforge.net/
The only reason I 've compiled this step-by-step guide is because I
[1] It is necessary to query the Linux Kernel# Uname-R2.6.28-11-generic
# Ls/usr/src/Linux-headers-2.6.28-11 linux-headers-2.6.28-11-generic
It can be seen that the kernel version is consistent with the kernel header file version, both 2.6.28-11.
Normally if you have a cable modem or DSL, you get your home PC's IP address dynamically assigned from your service provider. if you install a home cable/DSL router between your modem and home network, your PC will most likely get its IP address at
I found that I could not write files to the USB flash drive/SD card today. I carefully checked that the USB flash drive is read-only. I tried to solve this problem using n methods:
1. chmod U + x/Media/usbdisk
The prompt "read-only file system"
Idoutils is an addon of icinga used to save data to the database. In this article, I try to use MySQL server, and MySQL server has been installed on another machine.
The sever of icinga has been installed before.
1. First install the program
Author: Liu Zhiyong Guo conghui
Logs should also be noted by users. Do not underestimate the importance of log files for network security. Because log files can record various daily events of the system in detail, you can check the causes of errors
One collectdserver: IP: 192.168.91.134; one collectdclient: IP: 192.168.91.133.
First, perform a local experiment on collectdserver:
1. Install MYSQL: APT-Get install mysql-server mysql-client.
2. collectD requires a user to connect to MySQL and
Build the Linux kernel source code tree and load the hello Module
Build the Linux kernel source code tree and load the hello Module
Before loading the module, the book said that we should first establish the kernel source code tree. So, how should
Ubuntu10.04 bind9 configuration Master/Slave zone data transfer problem, ubuntu10.04bind9
When configuring dns master-slave zone data transfer on ubuntu10.04 today, the slave server cannot learn the configuration of the master server. When
The file read-only solution for USB flash drives in linux
I often use a USB flash drive to transmit files in ubuntu. Recently I don't know why, the USB flash drive can be used normally in windows, but the file becomes read-only in linux, unable to
Why is the server so slow? CPU, RAM, and disk I/O resources are exhausted, and ram is used up
Machine running is slow because it consumes too many system-specific resources. The main resources of the system include CPU, RAM, disk I/O, and network.
Linux kernel source code tree build and load the hello module, linuxhello
Before loading the module, the book said that we should first establish the kernel source code tree. So, how should we establish the kernel source code tree?
First, you must
Kibana + Logstash + Elasticsearch log query system, kibanalostash
The purpose of this platform is to facilitate log query During O & M and R & D. Kibana is a free web shell. Logstash integrates various log collection plug-ins and is also an
Linux logger and linux logger
Logger is used to write logs to the system. It provides a shell command interface to the syslog system module.
Logger syntax Logger [options] [messages]
** Options: **-d, -- udp uses the datagram (UDP) instead of the
Ubuntu solves the problem that oom-killer will kill some processes when the cache becomes larger. ubuntu-killer
Recently I encountered a problem where the out of memory of the operating system caused the oom-killer system to directly kill the
Environment: ubuntu12.04
I. Install software
Apt-get install sendmail
Apt-get install sendmail-cf (This software has been installed in the previous step)
Apt-get install mailutils
Check whether the installation is successful: Enter ps aux | grep
Sort out some common commands for Linux to view system logs.
Organize common commands for viewing system logs in Linux
Last
-A displays the host name or IP address from which to log on to the system in the last line.
-D specifies the record
How to configure Nagios Remote Plugin Executor (NRPE) in Linux (1)
Nagios is one of the most powerful tools for network management. Nagios can monitor the accessibility of remote hosts and the status of running services. But what if we want to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.