Use the Apsara monitoring server to monitor whether the server is online or the service port status is down.

This document describes how to use shell on a unix host to monitor host survival and port survival.#! /Bin/bash# Author by fengzhanhai# It used by mon web service and net and host living# It was created on 2012-8-9# Webdate = 'date-d "today" + "% Y-%

Shell program structure

A simple command Command [-option] [parameter] Command can be an alias, function name, built-in command, external executable program or script Compound Statement of two shell Control Structure ForName[InWord]; DoList; Done For ((Expr1;Expr2;Expr3);

Shell scripts use iptables to automatically block IP addresses with a large number of connections to prevent CC attacks

This method is used to passively count the number of IP connections. iptables is used to block IP addresses with a large number of connections. For more information, see iptables to limit the number of ip connections to prevent CC attacks.The Shell

Shell script installation: htop, the latest tool for process management

The script content is as follows: #! /Bin/bash# Process management tool --- htop Echo "Checking System dependency package installation. Please wait ......"Yuminstallncurses-devel-y Echo "downloading the htop MAIN package ......"DOWNLOAD

Use shell scripts to monitor website status

Recently, the server room where the company is located is often unable to access the website due to attacks and network faults. In order to be able to know that the website is inaccessible for the first time and quickly solve the problem, tley uses

View linux traffic code in real time

#!/bin/bash while["1"] do eth=$1 RXpre=$(cat/proc/net/dev|grep$eth|tr:""|awk'{print$2}') TXpre=$(cat/proc/net/dev|grep$eth|tr:""|awk'{print$10}') sleep1 RXnext=$(cat/proc/net/dev|grep$eth|tr:""|awk'{print$2}')

Shell programming special variable -- Process status variable

Process status variable 1. $ get the current shell process ID (PID) 2. $! PID used to execute the previous command 3. $? Obtain the return value for executing the previous command (0 indicates success, and non-zero indicates failure, which is

Shell script to generate server password

I wrote a script that can generate random passwords. If you want to generate only numbers or only letters or upper-case passwords, you can customize them. I have written all the elements here. #! /Bin/bash # author: honway. liu # date: 2013-07-19 #

Loop Control Structure of shell script Programming

Loop Control-for Loop Syntax 1 For Variable in List Do Commands Done Syntax structure 2 For Variable in List; do Commands Done This List can be a List, variable, command, etc. A for Loop provides an element list in advance, and then uses variables

Bash script for Batch Job parallelization

When running a job in Linux, you often encounter the following situations: a large number of jobs need to be run, and the time required to complete each job is not very long. if we run these jobs in serial mode, it may take a long time. If we run

Use shell to implement mathematical functions

Recently, scripts always need to be computed. It will be troublesome to use awk each time. It encapsulates the addition, subtraction, multiplication, division, and source math. sh for each call. Some key points should be pointed out to avoid

Latest Shell text processing tools

This article describes the most common tools for using Shell to process text in Linux:Find, grep, xargs, sort, uniq, tr, cut, paste, wc, sed, awk;The examples and parameters provided are the most common and practical;The principle I use for shell

Test Process status of shell script

Test the network connection status based on the running status of the daemon. This is far better than simply finding the network connection status parameters. The following uses a script to test the status of a specified process name and displays

Centos server prohibits single-user mode (single) to enhance system security

1. Linux forgets the root password and enters the single-user mode to change the password (1) about lilo 1. When lilo appears: Enter Linux single Lilo: Linux single 2. Press enter to directly access the Linux Command Line 3. Use the password command

Security Optimization Configuration of php. ini in Centos Server

(1) Disable finding PHP Functions1disable_functions = This option can be used to set which PHP functions are not allowed to be used. Some functions in PHP are highly risky. You can directly execute some CentOS system-level script commands. If these

Tmp security settings for logical volumes in CentOS

When Centos is installed without a specified partition by default, the logical volume does not have an independent/tmp, which may cause security risks./dev/shm is also one of the risks. # Dd A 1 GB file, file/. tmpfs Ddif =/dev/zeroof =/. tmpfsbs

Nginx automatically blocks excessive ip connections

You can use commands to view IP addresses that are too high for web connections, but you need to use AI to seal them. This is too troublesome. You can directly write a script to automatically resolve this issue. The web server uses nginx and python

Configure Secure SSH in CentOS

This article describes how to modify the default sshd settings to ensure sshd security and restriction, and protect your server from hacker intrusion. Every time you change the sshd configuration file, You Need To Restart sshd. In this way, your

CentOS System Security Protection

Whether you are an ordinary Linux Desktop user or a system administrator managing multiple servers, you are faced with the same problem: an increasing number of threats. Linux is an open system that allows you to find many ready-made programs and

Enhance SSH security in CentOS-log on with a certificate

A few days ago, some people used putty and winscp, which had backdoors for promotion and promotion by Baidu. The password was simple and port 22 was cracked by brute force, or the security crisis caused by social engineering passwords, ssh security

Total Pages: 1330 1 .... 877 878 879 880 881 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.