Linux Cloud Computing-Phase 2-essential knowledge

Source: Internet
Author: User
Tags aliases ldap

Linux Administrator Technology--

01. Wildcard characters * 、?、 [], {} function

*: Any number of arbitrary characters

?: Single Character

[A-Z]: one of multiple characters or continuous range, omitted if none

{A,MIN,XY}: Multiple sets of different strings, full match

02. Use NMCLI to create a new connection and configure it with parameters such as a static IP address

# NMCLI Connection Add Con-name "Connection name" ifname "Interface name" type Ethernet

# NMCLI Connection Modify "Connection name" Ipv4.method manual ipv4.address "IP address/Mask length

Default Gateway "

# NMCLI Connection Modify "Connection name" Ipv4.dns DNS server address Connection.autoconnect Yes

# NMCLI Connection up "connection name"

03. Specify the available Yum software sources for Red Hat series Linux hosts

# vim/etc/yum.repos.d/file name. Repo

[Warehouse ID]

Name = Warehouse Description text

BaseURL = Access address of the warehouse

Gpgcheck = 0

What is the difference between an LDAP user account and an ordinary system user account?

LDAP User: belongs to the network account, its login name, password stored on the other server

Ordinary system User: belong to the local account, its login name, password stored in the system/etc/passwd,/etc/shadow

and other documents.

05. When you use Crontab to edit a scheduled task, the format of each task record is composed

Minute hour date Month week

Task command line

What are the characteristics of the MSDOS partition mode, how to use the Fdisk tool to adjust the partition table of the hard disk

MSDOS partition mode: Can divide 1~4 primary partition, or 0~3 primary partition + an extended partition (n logical partition),

Operation of the disk <2.2TB

# fdisk

/dev/Disk Name

Main operation instructions: n New, D Delete, P view partition table, W save exit, Q do not save exit

How the LVM logical Volume storage scheme is implemented, with the use of the main command tools

LVM Storage Scheme: 1 or more scattered storage devices (physical volumes) = = "integrated into larger virtual disks (volume group) = ="

The virtual partition (logical volume) is then divided into the virtual disk, the main advantages: device peers, capacity dynamic scaling

Main command tools:

#

#

#

#

Vgcreate

Vgextend

Lvcreate

Lvextend

Volume group name physical storage device ...

Volume group name newly added physical storage device ...

-L size-N Logical Volume name volume group name

-L New Size/dev/Volume group name/Logical volume name

08. What is the role of swap space?

Swap space can use a portion of the hard disk space to simulate memory and alleviate the problem of insufficient physical memory

################################################################################

Linux Engineer Technology--

################################################################################

01. Command alias function, set a permanent valid command alias

The role of aliases: Create a shorter, better-written command word for a lengthy command line that requires frequent use

# VIM/ETC/BASHRC

Alias aliases = ' Actual command line '

02. Red Hat 7 Series Firewall service preset security zone public, trusted, drop functions and features

Public zone: The default zone, only allow SSH services for native, others deny

Trusted zone: Any access to this machine is allowed

Drop zone: Any packets that access this computer will be rejected

What is SELinux and how does it affect the Linux system?

SELinux mechanism: A kernel-based security enhancement mechanism that provides a set of documents, processes, and other objects in a Linux system

Pre-set protection rules

Impact on Linux systems: In a forced protected mode, even root cannot violate its protection rules (unless changing

or avoidance rules)

04. Quickly add a new virtual host when you configure the HTTPD Web server

1) Create a separate configuration file for each virtual host, put it in the/etc/httpd/conf.d/directory, configure the file

Name ends with. conf

2) Configure <virtualhost IP Address: Port number >. .. </VirtualHost> section tags, where statements are used

ServerName Specify the site name, use DocumentRoot to specify the Web page directory

3) Then restart the httpd service

05. Conditions for erecting a secure Web site based on httpd

Installing the Mod_ssl module package

Provide the available Web site certificates, keys, and deploy to the correct location

Modify the/etc/httpd/conf.d/ssl.conf configuration file to specify the site name, Web directory, certificate, and path to the key

06. Dynamic Web page and static Web page difference, based on httpd to support PHP program, Python program needs to have the conditions

Static Web page: The Web page file accessed by the browser is the Web page file provided by the server.

Dynamic Web page: Web page file accessed by the browser is a dynamically generated Web page file by a program specified by the server

Support PHP Program: Install httpd, PHP package

Support for Python programs: Install HTTPD, MOD_WSGI packages, and add program call aliases when configuring a site

(Wsgiscriptalias)

What is NFS referring to, the main difference from EXT4, XFS

Nfs,network File System: Document resources reside on other hosts ' directories, network filesystem

EXT4, XFS: The document resource is stored on a device that has a well-formatted partition on the computer, and the local file system

08. What are shell scripts and what are the benefits of using shell scripts?

Shell script: A collection of a number of command-line, able to complete a specific task, can be executed in order to repeat the execution of files

The benefits of Shell scripting: process repetitive tasks, simplify complex tasks, and automate tasks that are manually intervened

################################################################################

System & Service Management Advanced--

################################################################################

01. What are the roles and advantages of virtualization

Role: Integrate one or more sets of physical resources into a platform to virtualize more available computer resources in a software way

Advantages: To change more, save costs, resource scheduling more flexible, improve efficiency

02. When setting access permissions for a document, the values 777, 755, 700, 644, 600, 000 each indicate what permissions

777

755

700

644

600

000

= = "Rwxrwxrwx

= = "Rwxr-xr-x

= = "rwx------

= = "rw-r--r--

= = "RW-------

= = "---------

03. Description of the Linux directory/,/boot,/home,/root,/bin,/dev,/etc usage

/: root directory of the entire Linux file system

/boot: Store the system kernel, boot menu configuration and other files

/home: Default family directory for normal users (subdirectories with the same name)

/root: Administrator's home directory

/bin,/sbin: Storage System command, executable program

/dev: Store various device files

/etc: Store various system configuration, system service configuration file

04. Briefly describe the basic process of installing software from source code, and the purpose of each link, command tools

Tar Unpack: Extract the downloaded source package to release

./configure configuration: Set up the Installation checklist (Specify the installation directory, required features, etc.)

Make compile: The source code files are made into binary executable program files or related modules according to the installation manifest

Make install Installation: Install executables, related modules, configurations, documents, etc. into the system

What does the RAID array mean, RAID0, RAID1, RAID10, RAID5, RAID6 characteristics of the different levels

RAID0: Stripe mode, at least 2 disks, improves efficiency through concurrent read and write

RAID1: Mirrored mode, at least 2 disks, improves disk device reliability with mirrored backups

RAID10: Condition + mirroring mode, equivalent to RAID1+RAID0, at least 4 disks, higher read and write efficiency and reliability

RAID5: Cost-effective mode, at least 3 disks, of which 1 disk capacity is used to store recovery checksum data

RAID6: Equivalent to an extended version of RAID5, at least 4 disks, of which 2 disk capacity is used to store recovery checksum data

The role of the DNS server, the difference between authoritative DNS, cache DNS, and the rapid setting up of a cache DNS server

The role of the DNS server: to provide clients with "domain name-->IP address" Information Query service

Authoritative DNS: Responsible for at least one DNS zone, authorized by the Internet Domain name Authority, to provide only a small number of domain names query

Cache DNS: Does not require any DNS zones, no authorization, but can proxy client requests to query for almost all

Domain name

07. Brief description of how DNS separation resolution works, key configuration

DNS Separation Resolution: Provides different parsing results for different clients for the same domain name

Key configuration: The client is categorized by a view statement, using Match-client in each view to match the client's

Source addresses, each of which defines a destination DNS zone but calls a different address library file

08. What are the requirements for a PXE network batch installation, the role of each component, and how to implement unattended installations

DHCP Server: Provide the client with parameters such as IP address, and inform the next server address, startup file name

TFTP Server: Provides the client with boot files, boot menu configuration, kernel to install the system, and initial image files

Repositories: Provides installation tree resources for clients via HTTP or FTP (RHEL7 disc directory structure)

Implement Kickstart unattended Installation:

1) Prepare an answer list (i.e. answer file) for the questions involved in the installation process in advance

2) Then deploy this file to a location that the client can download

3) by modifying the boot configuration of the pxelinux.0 to enable the client to automatically invoke the answer file to implement polygon interaction when loading the system


Linux Cloud Computing-Phase 2-essential knowledge

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.