In the actual production environment, the Sshkey key authentication is often used to implement data distribution data and other operations, but also can operate the intranet server in bulk, the implementation of non-dense authentication to push
Description1, this topic in each Linux distribution is different, and in the current era of memory hard disk, and then set a disk array after the speed of the equivalent.2, I think hard disk case, how big, I just control the use of memory in 99%
DF commandDf-report file system disk space usage #汇报文件系统的磁盘空间使用情况[[email protected] ~]# df -h File System capacity used available used% mount point/dev/sda3 18g 1.1G 17G 6% /devtmpfs
1.ps(1) Most commonly used is ps-le or ps-aux, with grep to see the status of a process, such as Ps-aux | grep pts(2) Ps-u can view details of the process that it belongs to(3) Ps-uu username can view the process of a specified userWhere the PID is
/etc/fstab is a file used to hold static information about the file system. When the system starts, the system automatically reads the information from this file and automatically mounts the file system specified in the file to the specified
3.7 su CommandRoot user switches to ordinary user commands, Su;Completely completely switch-, even environment variables, home directory also switch, command for #su-aming;View current login user, command for #whoami;View current directory, command
In addition to the ability to configure the local repository, Yum can also configure the server network warehouse by configuring the server and uploading the files first
The steps are as follows:1 . installation vsftpd In order to
1.Linux TerminalThe terminal essentially corresponds to the Linux/dev/tty device, Linux multi-user login is done by different/dev/tty devices, Linux default provides 6 pure command line Interface "Terminal" (it should be accurate that this is 6
In Linux, the color of the file is meaningful. Among them, the file name color is different in Linux, it is not the same type.Light blue: Indicates a linked file;Gray: Indicates other documents;Green: Represents an executable file;Red: Indicates
This example uses the centos6.5 version number First, to the official download Tomcat service:Http://tomcat.apache.org/download-70.cgi?Second, the Tomcat upload to Linuxserver in the root folder I set up a rommr folder is generally placed under
Need to install cifs-utils before using Mount commandUnder CENTOS7, use this.Yum Install Cifs-utilsUse mount command to complete mount after installationYou need to create a mounted path before mountingMkdir-p/MNT/HDFThe Mount command format is as
Common server and software faults, solutions, and solutions
I. Solution: do not display the backend Verification Code of zhimeng Dede
The dedede backend Verification Code does not display the solution. In many cases, the dedecms website background
CentOS7 install Nginx details, centos7nginx detailsClick to enter Nginx InstallationNgunx official website stable Version Download Page
FindPre-Built Packages for Stable versionSelect operations related to your system, as shown in figureCentOS 7,
Ubuntu uses git to obtain the source code.
Problem 1: fatal: unable to access 'https: // github.com/libevent/libevent.git/': Failed to connect to 127.0.0.1 port 46859: Connection refused
Solution:View All proxy
Linux SSH (Secure Shell Protocol) service, sshsecure
Before data transmission, SSH encrypts the data to be transmitted to ensure session security and data transmission security. The SSH client also contains a remote copy scp.
1. SSH Structure
The
Common Linux commandsCommon Linux commands
[Find]
Format: find
'>
1. Search by file attributes:-Name: searches by file name-iname: searches by file name, but not case sensitive-prune is not found in the currently
Linux system permission management command chmod resolution, permission management chmod
Chmod
Command name: chmod
Change the permissions mode of a file
Path:/bin/chmod
Execution permission: All Users
Function Description: Change the file or
Common options and examples of wget command, wget command example
The wget command is used to download files from a specified URL. Wget is very stable. It has strong adaptability to unstable networks in the case of narrow bandwidth. If the download
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service