The company wants to carry on the system optimization, now to the Nginx service request time and the request quantity carries on the analysis.Nginx request file under Linux to be cutGet access log log analysis1: Get URI and request time log to Tmp_0.
RM commands are mainly used to delete files and directories, in penetration testing we often need to upload or create some new test files, in order to leave as few traces as possible, we often need to delete some of our uploaded or new files, then
Synchronizing data to the hard drive: SyncCustomary shutdown command: shutdownShutdown-h nowShut down immediately, now equals time of 0Shutdown-h ' I wil shutdown after ten mins 'Tell everyone that the machine will be turned off in 10 minutes and
(1) VI is used in three wayscommand line mode text mode last line mode(2) command line mode can copy, delete, paste, insert, undo operationCopy command: yy | YG indicates the line where the cursor is copied Nyy (parameter n means copying a few lines)
NTP serverNTP---------Network Time ProtocolSoftware: NTPConfiguration file:/etc/ntp.confService: NTPDPort: 123/UDPExample: Configuring an NTP time server1) Installing the NTP software[[email protected] ~]# Yum install-y NTP2) Edit the NTP
I. FIREWALLDThe dynamic Firewall daemon provides a dynamically managed firewall to support the network "zone" to assign a certain degree of trust to a network and its associated links and interfaces. It has support for IPV4 and IPV6 firewall
FTP-------file Transport Protocol Files Transfer ProtocolConnection mode for FTP protocol:Active connectionThe client sends a connection request to the server's FTP port (by default, 21), and the server accepts the connection and establishes a
$ cat Tmux-attach1 if [-Z $1then2 ls 3 Else 4 Tmux attach-t $15fi$ cat/usr/bin/cscope-go.sh1#!/bin/Bash2 3# Generate Cscope index filesinchCurrent directory4 # The generated Cscope index files also include go standard packages5 6 if["$GOROOT"="
1, downloaded a yum rpm file on the Internet (yum-3.2.29-81.el6.centos.noarch.rpm), I am in http://www.rpmfind.net/linux/rpm2html/search.php? query=yum&submit=search+...&system=&arch= download Here, can also be under the official website.2, follow
/bin binary executable command. Commands for ordinary users are stored in this directory/dev system device files, or device driversThe base point of the/home user Master Directory/lost-found This directory is usually empty, when the system is not
Three week fifth session (August 18)4.5/4.6 disk Formatting4.7/4.8 Disk Mount4.9 Adding swap space manually4.5/4.6 disk FormattingCat/etc/filesystem: Viewing Supported file systems1650) this.width=650; "src="
Several ways that Linux often uses file transfers 1, terminal new STFP protocol connection or Command mode:sftp-p22 [email protected]The port can not be filled out, the default is 22, the port p is uppercase. Transfer files under the local path to
To set read and write permissions for a folder:sudo chmod-r 777/dataPermission Code Descriptionsudo chmod 600xxx (only the owner has read and write permissions)sudo chmod 644xxx (owner has read and write permissions, group user only Read permissions)
IFS simple description,
Many Commands in bash split words. In most cases, spaces are used as separators by default. In some cases, tabs and line breaks are also separated. The most typical is "for I in a B c", which splits the Variable list "a B c"
About the linux PPA source, linuxppa Source
Add PPA:1,First, go to the ubuntu system, choose system> administration> update manager> setting. On the software source page, click other software.
Tab, click add in the lower left corner, and paste the
Yum preliminary understanding and use, yum preliminary understanding of use
Yum (Yellow dog Updater, Modified) is a character front-end Package Manager based on RPM package management. The RPM package can be automatically downloaded and installed
Redis sentinel mode, redissentinelI. Introduction to sentinel
Role of Sentinel: 1): Master status detection2) If the Master node is abnormal, the Master-Slave switch will be performed, and one of the Slave will be used as the Master node and the
Install mysql,
Installation environment: The system is centos6.5
1. Download
: Http://dev.mysql.com/downloads/mysql/5.6.html#downloads
Download version: I have selected 5.6.33, general edition, and 64-bit linux.
You can also directly copy the 64-bit,
Notes on common Linux O & M commands and common linux commands
1. df-hl is used to view the disk space occupied by files or directories.
2. Common options for du:-H: display in a readable way-a: displays the disk space occupied by the directory,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service