2013 Horse Brother Linux full video tutorial, HD non-encrypted

Source: Internet
Author: User
Tags mysql query variable scope varnish haproxy

2013 Horse Brother Linux full video tutorial, HD not encrypted, transfer. Non-sincerity do not disturb!

Contact Person: Lovelinux qq:3109523055

Course Catalogue:
First, Linux System Foundation and System Management
1, operating system history, System architecture Platform overview; Linux origin, philosophy, history and distribution;
2. Linux basic knowledge, basic commands, access to use Help and file system organization structure, etc.
3, Linux users, groups and permissions of the foundation and related high-level topics, detailed explanation of Useradd/userdel/chmod/chown/usermod/chage/umask and other related orders;
4, Bash Foundation and configuration, standard I/O, Pipeline and Shell Programming Foundation;
5, the concept of text processing tools, the use of simple text editor Nano, VIM Editor Introduction, Advanced and common skills;
7, Linux system Process Management Basic principles and related management tools such as PS, Pkill, top, htop, etc., the use of Linux, job control;
8, the implementation of Linux task plan, explain the use of at, Cron and Anacron;
9. Document Search Tool find command Foundation and advanced application;
10, the TCP/IP network Foundation, the TCP finite state machine state transformation principle, the Linux network attribute configuration and the network client tool detailed;
11, Linux system software package configuration and management, the use of RPM and Yum command and the production of Yum Library detailed;
12, common disk interface types and related device characteristics, Linux Disk Management, Linux file System Foundation, advanced and senior management, file system related management tools use detailed;
13, the system initializes the detailed process refinement, the core foundation and the core customization (core customization, compilation and installation), the comparison shows the difference between the RHEL5 and RHEL6 system start-up process;
14, X11, SSH, VNC, cups system services, putty, SECURECRT or Xmanager and other SSH client applications;
15, File extension attributes and the application of ACLs;
16, RAID level and related concepts in detail, Linux under the implementation of soft raid and the use of related command-line tools, hardware RAID fundamentals and configuration points;
17, LVM2 basic concept and its realization principle, the use of LVM2 related command line tools;
18, Linux log System, the use of common log management tools;
19, the use of SELinux related concepts, principles and related tools (such as setenforce, etc.);
20, Rhel system Kickstart files, automated installation and deployment of the installation disk customization;
21, Linux common system and network trouble-shooting (troubleshooting);
22, Rhel or CentOS system is streamlined, to achieve from zero-based on-demand reorganization of size, function and other customizable Linux version, in order to achieve a micro-view of the Linux composition and operation of the principle.


Second, Shell programming introduction and advanced (interspersed with a large number of systems to achieve automation management for the purpose of scripting cases)
1, Bash basic and work environment customization, detailed explanation of profile, PROFILE.D, BASHRC,. Bash_profile and. BASHRC and other configuration files function;
2. Bash script structure and operation; bash variables (local variables, local variables, environment variables, positional parameter variables and special variables) and their expressions;
3, Condition test (integer test, string test and file test), if and case selection branch;
4, for, while, until cycle and use continue and break to control the cycle mechanism;
5, using functions in bash, and using functions to implement bash libraries;
6, Script control: Capture the signal in the script and complete the custom processing;
7, script execution result output: The use of printf command and the use of color in the script;
8. Bash Script Runtime configuration: Use options in scripts;
9. Bash data processing: use arrays in scripts;
10, Bash script debugging and debug function implementation;
11, Window Programming: Dialog Text dialog Box command and Shell programming application;
12, basic regular expression, extended regular expression and grep command explaining;
13. Sed command and awk command explaining;
Note: The content in this section will not be presented as a separate section, but throughout the course, where the basic part is mainly explained in the first part of the previous section, and the Advanced section and a large number of applications will appear irregularly in the later part of the content.


Third, the Linux Platform Common Network Service and security management
1, System performance/security, security threat model and protection methods, systems service access control and Service Security Foundation;
2, encryption/decryption principle and data security, key Exchange implementation, PKI basic concept and the use of OpenSSL detailed;
3. DNS (BIND9) service principle explaining, bind service configuration, advanced application and security, and realize the intelligent DNS system with view as the core to adapt to the analysis connection between domestic operators (The project that the horse Brother team realizes: Www.dns.la, the domestic application is second only to Dnspod's intelligent DNS system;)
4, the basic principle of FTP service, take vsftpd as an example to explain the implementation of FTP services, including virtual users and related rights customization, security Configuration and FTPs and other advanced topics;
5, the HTTP protocol principle, the request/Response message format, the SSL session principle and the HTTPS protocol; Apache base, each MPM model comparison, installation configuration and detailed parameters; Apache virtual host implementation and security applications (HTTPS, suexec, etc.);
6, PHP Environment configuration basis and integration with Apache a variety of ways; MySQL service introduction; Lamp architecture implementation; Customize lamp by compiling;
7, Nginx features detailed, Nginx basic configuration, virtual host implementation, URL address rewriting, and security applications and lemp implementation;
8. Web application framework Django Basic concept and its integration with Apache (Mod_python and Uwsgi) or nginx;
9, the basic principle and type of VPN, OpenVPN configuration and its application;
10, Iptables/netfilter security system Tools explaining; iptables command basic application, such as the function of each sub-command, general matching, extended matching and jump target, etc.
11, Iptables/netfilter advanced applications, including connection tracking, network address translation, and the use of a variety of expansion modules and seven-layer filtering and other advanced topics;
12, the basic concept of RPC; NFS service fundamentals and configuration; Samba service fundamentals and configuration;
13, the principle of e-mail system explaining; Postfix/dovecot, such as the configuration and application of mail Service tools, Smtps, Pop3s, Imaps and other advanced security applications implementation; Case-based Postfix, MySQL, LDAP, virtual domain, virtual user, Integrated application of authentication, message encryption, webmail, POP, IMAP services;
14, the principle and configuration of NSS; Pam basic concept, Common module explanation and system default configuration explanation;

Iv. MySQL database from beginner to proficient
1, relational database system and SQL related concepts in detail; MySQL features, development history and architecture details;
2, MySQL installation: RPM mode, compiled common binary mode and the way of compiling, single instance MySQL service start and stop service control;
3, the MySQL configuration file format detailed description; MySQL server variable, state variable scope and viewing mode, server variable value adjustment mode;
4, MySQL sql_mod; manage MySQL databases, tables, views, and Indexes (DDL statements); manage MySQL data (DML statements);
5, multi-table query, joint query and sub-query;
6, MySQL user management: Create and delete, Grant and cancellation of permissions, resource use capacity control;
7, the transaction of the relational database, the use of the transaction in MySQL, MySQL lock and its application; MySQL isolation level and its characteristics detailed;
8, storage engine and its property configuration, MySQL table maintenance;
9, the database configuration type and configuration strategy in detail; mysqldump, Xtrabackup, LVM snapshots and other backup tools used in MySQL database backup; MySQL database recovery;
10, the relational database index type is detailed; MySQL query analysis and its index customization;
11. mysql log file management: Query log, slow query log, binary log, relay log, transaction log and error log;
12, MySQL replication explaining, including master-slave, master-master and other architectures and the implementation of SSL-based encryption transmission, other common architectural form and comparison; MySQL 5.6 replication technology based on Gtid and multi-threaded replication technology;
13, MySQL read-write separation, connection pool and sharding technology: Introduce Mysql_proxy, Sql_relay, Amoeba and Cobar; one of the previous three is to introduce the realization of read and write separation;
14, small and medium enterprises low-cost MySQL high-availability cluster solution: MYSQL+COROSYNC/OPENAIS+DRBD principle and implementation;
15. Use of third-party tools such as PhpMyAdmin, Mysql-gui-tools and MySQL front;
16, with MySQL application as the center tuning hardware, system and MySQL services;


V. Cluster/Storage Topics
1, detailed the Linux system cluster architecture, type and application scheme;
2, Linux Virtual Server LVs principle, detailed explanation of its type and scheduling methods;
3, Lvs-nat, LVS-DR configuration and implementation of Apache, Nginx, SSH and other load balancing applications, and detailed comparison of the two implementation methods and their respective application scenarios;
4. LVS Persistent Connection Application environment theory and realization; Fw method realizes the affinity application of LVS;
5, Write bash script to achieve the Realserver health status monitoring, to achieve realserver fault isolation and automatic re-launch functions;
Highly Available service topics
6, high-availability cluster principle and heartbeat, openais/corosync and other solution principles explaining;
7, heartbeat installation, configuration and the Web as an example to achieve a high-availability environment;
8, Hertbeat Resources allocation method and maintenance; Use Heartbeat-gui to realize the management of the cluster based on the graphical way;
9, Corosync/openais High-availability cluster solution principle and implementation method; Based on case study, the method of using pacemaker configuration to implement high availability cluster is introduced in the production environment. (Step by step to implement HA cluster on Linux system in a completely manual way);
10, the resource management principle, the category, the LSB script writing and so on and the definition of the resource management; pacemaker-based resource management in high-availability environments, Stonith principles, categories and their implementation methods;
11, RHCS Cluster Kit working principle explaining, and from the micro point of view of the similarities and differences between the above solutions; RHCs cluster deployment demo;
12, LVS and Corosync integration to achieve high availability of director and load-balanced large-scale application server cluster, including Ldirectord applications;
13, high-availability service solution keepalived and its implementation, with Nginx as an example to explain the implementation of its dual-master model;
14, RAID, NAS, SAN, iSCSI and other storage principles and Linux-based iSCSI server implementation and application, explaining the application of open-source solutions such as Openfiler, FreeNAS or nexentastor;
15. The principle of GFS2 cluster file system; The implementation of GFS2 based on iSCSI explanation;


Vi. HTTP proxy acceleration, application server and monitoring system
1, the HTTP protocol caching principle and common header, commonly seen reverse proxy solution function comparison;
2, varnish service principle, installation configuration, varnish State engine details and VCL programming, varnish system parameters high-speed and the deployment plan in the Health department environment;
3, Nginx upstream and proxy module load balancing and reverse proxy deployment explaining;
4, Haproxy explaining: haproxy functions and characteristics, common configuration instructions, commonly used scheduling algorithms and ACLs, etc.
5, memcached service and its application in the Web service system;
6, Java, JSP, servlet, HotSpot JVM, J2SE, EE and Web container and other related technical points;
7. Tomcat architecture, installation configuration, connectors and integration with Apache or Nginx; Tomcat cluster model and its implementation case;
8, jetty system structure, installation configuration and with Apache or nginx integration;
9, Distributed File system details; Common Distributed File system features and characteristics of the comparison description; take Moosefs as an example to demonstrate the application of distributed file system;
10, CDN Technology Implementation principle;
11, extensible Web Services Design and related solutions selection (daily average 100,000 PV development to 1 million PV, then to 10 million PV site expansion ideas and deployment points); large-scale, high-concurrency, high-availability Web server farm architecture, design and implementation;
12. Web Environment stress test, system performance evaluation, result analysis and optimization;


Vii. Virtualization and IaaS Cloud technology topics


1, X86 platform virtualization technical difficulties and related solutions principles: CPU virtualization, Memory virtualization and IO virtualization, virtualization types and related features, etc.
2, Xen Virtualization Foundation; The virtual implementation principle of scheduling, interruption, memory, IO, network and block devices in Xen virtualization technology;
3, the installation, configuration and simple application of Xen on RHEL6 or CentOS6;
4. The configuration and management of virtual storage and virtual network equipment in Xen environment is detailed; qemu-img tools;
5. Xen management tool stack XM and XL from beginner to proficient;
6, XenServer Introduction;
7, KVM Virtualization Foundation, KVM Virtualization Technology implementation principle;
8, the installation, configuration and simple application of KVM;
9, based on Libvirt, Virt-intall and Virt-manager tool stack management KVM;
10, based on QEMU-KVM command line tools to manage KVM;
11. Optimization of Linux system based on KVM application;
12. Application of virtualization technology in production environment and description of common management tools;
13, IaaS, PaaS, SaaS Cloud Technology and the relationship between each other and the difference;
14, OpenStack Cloud Stack Detailed: Keystone, Glance, Nova, Swift, Horizon and other components of the functions, characteristics and collaborative process;
15, the network model of OpenStack and the quantum service in grizzly;
16, OpenStack block storage services and grizzly in the cinder services;
17. Full-featured OpenStack environment deployment with independent control nodes, multi-compute nodes and independent object storage nodes;


VIII. automatic operation and maintenance related topics
1. Overview of automated operations: manage IT assets efficiently and meet complex business requirements, build efficient IT systems, quickly discover and solve problems in IT systems, etc. network, system, and service monitoring tools
2, SNMP protocol principle and Linux system configuration and implementation of the application case;
3, network, system and services and other related indicators of the monitoring model and system structure;
4, Zabbix monitoring system detailed;
5, RRDtool detailed; cacti installation, configuration, scripting based on cacti to complete the monitoring function of the customization;
6, Nagios Introduction, Advanced and high-level applications, Nagios monitoring plug-in development;
Pre-class Tools
7, unattended installation script on Rhel/centos platform Kickstart; Complete System automation installation based on PXE;
8, Cobbler Service principle, configuration and application;
Configuration Management class Tools
9, Fabric command;
10, using the func (Fedora Unified Network Controller) to complete the Server Automation remote management detailed;
11, open source software automation configuration and Deployment tools puppet detailed;
12, Saltstack (equivalent to the Func-enhanced version of +puppet Lite version) detailed;
13, Genome introduction;
Note: If the class time is not enough, the 4th and 5th will be provided as a video, and 11th and 12th will only choose to speak one;


Nine, Linux system Fundamentals and system tuning
1, PC Server structure overview and Linux system Architecture overview;
2, Linux system process related theories (such as scheduling methods, preemption, priority, scheduling categories, etc.), process performance monitoring, analysis and tuning programs;
3, Linux Memory Architecture system (such as memory area, MMU, TLB, Slab, partner system, page and page frame and other related theoretical knowledge), memory utilization real-time monitoring, performance analysis and tuning scheme;
4. Linux system IO architecture and device driver; disk IO architecture (such as cache architecture architecture, Pdflush, bio, Disk queue, IO Scheduler, etc.), real-time monitoring, analysis and tuning of disk performance;
5, Linux virtual file system architecture and related theoretical knowledge (such as block, inode, log, etc.), common file system types and use of tools such as iozone to evaluate and compare file system performance, and the actual project needs to select the best file system;
6, interrupt and anomaly related theoretical knowledge (such as signal, IRQ, process upper half and bottom half, interrupt processor, etc.) and the application in the system tuning;
7, Linux network subsystem architecture system and related theoretical knowledge (such as socket buffer, NAPI, kernel buffer, etc.), network subsystem performance monitoring, analysis and tuning scheme design and implementation;
8, based on the Linux system tuning theory knowledge for the actual project tuning, such as MySQL server tuning (System part), etc.;

9, System performance assessment methods, indicators and common tools and methods to evaluate the operating system;

qq:3109523055 Contact: Lovelinux

2013 Horse Brother Linux full video tutorial, HD non-encrypted

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.