Step 1: Create an SH batch command file# vim/etc/batch_ssh/install_redis.shStep 2: To the current user, be able to execute SH script permissions# chmod install_redis.sh 777Step 3: Write the command to be executed in bulk, read to wait for the front-end user input, and sleep to indicate the wait time in seconds.echo ' \ n begin to install plugin \ n '; yum install Cpp-y;echo ' \ n Yum finish install plugin \
Wrote a script to stop MongoDB, the code snippet is as follows:1#!/bin/Bash2 3 # Stop MONGO4Echo"Stop MongoDB ..."5Mongo_pid= ' Ps-ef | grep Mongod | Grep-v grep | Awk'{print $}'`6 if[[A${mongo_pid} = = A"' ]]7 Then8Echo"MongoDB is not running ..."9 ElseTenKill-2${mongo_pid} OneSleep5 A ifPs-ef | Grep-v grep | grep-Q Mongod - Then -Echo"MongoDB Stop failed" the Else -Echo"MongoDB Stop Successful" - fi -FiThe execution method isSH stop.shPerform normally on CentOS and execute on Ubuntu
Originally this year, Chiang has plans to learn the contents of Linux script, so in a variety of books in the previous activities to buy a lot of books, but most of the plastic cover has not been demolished. Today, the company has no business, so try to toss back the script, although there are some references on the Web documents, but at any time also need to explore their own side and modify to more convenient for our general purpose of the script.
Many of our friends play Linux scri
First of all, let's look at the problem description, the following figure is my run-time error screenshot:
Solving method
Analyze the reason, maybe because I have a problem with my platform migration, we have permission to convert.
1 conversion under Windows:
Use tools such as UltraEdit or editplus to convert scripts to code and then execute them in Linux. The conversion method is as follows (UltraEdit): File-->conversions-->dos->unix.
2) method
Use VIM to open the
==========rpm============
1 Install Alien and Fakeroot first:
sudo apt-get install alien Fakeroot
2 convert rpm files to Deb
Fakeroot Alien xxx.rpm
3 Installing Deb
sudo dpkg-i xxx.deb
=========tar.gz===============
tar.gz installation, this thing online more is, just this evening, I learned, send up for everyone referenceTo install the tar file, unzip it first.Terminal input: sudo tar-zxvf compressed file name. tar.gz/tmp (False assumption to the/tmp directory),Then after th
Informix database with two commands: Load and unload
We can according to facilitate the preparation of SH program data import and export, the following two sections of the SH program in Redhat Linux as 4 test pass, should be suitable for most unix,linux operating system, put under $informix_home$/bin, You can use Informix when you log on, and remember chmod +x load and chmod +x unload
##!/bin/ksh;If [$#-n
Fvx538/fvs338V2.0 how to deploy remote access to the enterprise VPN using Xauth Technology
1. Tutorial Purpose2. Understand Xauth applications3. experiment environment4. Experiment operations. Select the appropriate RADIUS service4.2.fvx538 firewall Xauth configuration...4.2.1. Set the Xauth mode of the VPN firewall...4.2.2. Configure the VPN to prevent fire and
single industry to a network service platform in multiple industries
As shown in figure 1, the original IP private network in industry a is transformed and upgraded to become a network service platform, providing network services for multiple industries at the same time. There are similar demands in Politics and Law networks and e-government affairs networks. How to provide a logically isolated, secure, and reliable virtual IP private network for various industries has become a technical proble
With the gradual popularization of the network, more and more enterprises begin to establish their own branches in multiple places. However, because many internal applications of enterprises involve business privacy, therefore, how to make the branch structure securely and smoothly use these applications becomes a topic of concern to every enterprise network administrator. Generally, we can use VPN security devices to implement remote user or branch a
Many of my friends will not install vpn in CENTOS, because it is a dizzy task for cainiao to install VPN, especially openvpn. However, installing pptp is a little simpler, there are a lot of tutorials on installing pptp on the Chinese site, but they are complicated. I found a one-click installation solution for pptv vpn on a foreign website. I would like to share
is normal.
2. log on to SSH using the Administrator account password and enter the following command
wget http://soft.kwx.gd/vpn/pptpd.sh
3. the above steps are to download the installation script. After the download is complete, execute the following directly:
sh pptpd.sh
4. Installation Complete
After the installation is complete, you must note that the last line of the character is your
1.L2TP the second-tier tunneling protocol is a way to access certificates. You need to install a certificate Server in the VPN server intranet, and then have the VPN server trust the certification authority, and then publish the Certificate Server and download the certificate. VPN clients need access need to download the installation certificate before they can c
How to Improve VPN security
As we all know, VPN (Virtual Private Network) uses tunnels to transmit data between two networks on the wide area network. Because its data is transmitted on the Wide Area Network, although the tunnel technology can provide certain security protection. For example, when data is transmitted in a VPN tunnel, data packets are encrypted
# Create File Touch test.desktop# write the following in Test.desktop[Desktop entry]version=1.0Type=applicationterminal=trueExec =/root/aa. SH Name=Testicon=/root/test.png# Modify Test.desktop permissions to 775 (sudo chmod 775 test.desktop)The above steps set up a/root/aa.sh shortcut, and the icon of the shortcut will be turned into icon image.Ubuntu 14.04 makes an sh file similar to a shortcut that you ca
A little try to calculate the global illumination as a superior application of PRT. Completely self-realization, using sg/sh, h-basis fundamental to the GI light field of frequency-domain compression, there is 3D texture, for 2-hop indirect illumination real-time display. A lot of pits, especially in the HDR environment using different low-frequency baseband truncation approximation, there will be a considerable number of problems, fortunately all the
Feel that the program is not a problem, after compiling the build a.out, copy to the Development Board execution, prompting-sh:./a.out:not found.Online search for problems, probably for 2 reasonsOne is that there is a possibility that there is no C library under/lib or a dynamic library without glibc or UCLIBC.The second is the C library on your board and compile the Hello link with the C library is not the same, the difference is too bigWorkaround: C
as 0, 1, or 2. # Command 2> 1 |...: the error of command is redirected to standard output. Errors and standard output are both transmitted to the next command through the pipeline. # $ CAT test. sh> Test 2> 1 put the file test. SH Content is appended to the file test # The Last One indicates that the current shell is running in the background, similar to nohup # If you do not add use the console to cal
Really pit father, on the following SH, unexpectedly also wrote for a long time!if ' /usr/xx/bin/tomcat ' ] then"Rstall are not allowed in the currentdir: ' pwd '! " return fi. /bin/rstmst.sh, .... /tomcat-bb/bin/rstns.shIf the syntax is really troublesome, the Linux if syntax is really served!If followed by [], instead of () Rub!There must be a line break between if and then! ———— where is it written?? How am I supposed to get that?Re
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.