ZabbixCommonParametersAndCommandAs follows!
Common parameters:
#/Usr/local/iftop/sbin/iftop help // view the help Command
-I: sets the monitored Nic, for example: # iftop-I eth1
-B displays traffic in bytes (bits by default), for example: #
Previously, Perf Event: System Performance Tuning tool in Linux introduced some of the most common perf usage and application optimization in Linux. This article will focus on the kernel and other perf commands.
In terms of the kernel, there are a
BKJIA special draft]1. Introduction to important log files in Linux
/Var/log/boot. log
This file records the system events during the boot process, that is, the information displayed during the Linux system boot self-check process, as shown in
When running a service that is important to your IT environment, IT is necessary to ensure that IT uses high availability (HA) technology, including configuration software and hardware. This article will teach you how to use Corosync and Pacemaker
Many devices, such as routers and firewalls, provide interfaces for remote access and management. For example, Windows servers can use the Telnet protocol for remote management. However, Telnet is not safe. Because the account and password are
Network Traffic detection is one of the necessary technologies for enterprise network administrators. network traffic detection allows network security administrators to monitor exceptions and threats in enterprise networks. This article mainly
In Windows, performance monitoring is basically used. There are two categories related to IO performance: "LogicalDisk" and "PhysicalDisk ", "LogicalDisk" is used to monitor file-related IO performance, while "PhysicalDisk" is used to monitor Luns
Install supporting software
Rehat7.2 is used as an example to discuss MRTG configuration and installation. To install MRTG, install the following software packages: GCC, Perl, gd, libpng, and zlib.
Configure the SNMP service
For
OpenStack is an open-source project designed to provide software for the construction and management of public and private clouds. Its community has more than 130 enterprises and 1350 developers who use OpenStack as a general front-end for
I was writing a speech ppt. I suddenly heard the text message and thought it was an advertisement. Just put down your mind, and text messages keep ringing. You don't have to think about which server should trigger an alarm.
When I opened the nagios
OpenStack Compute provides a cloud tool for an organization. Its functions include running Virtual Machine instances, managing networks, and controlling cloud access through users and projects. The most basic open-source project of OpenStack is
The program code involved in this article can be downloaded from my github and updated continuously
Virtualization uses kvm and libvirt as C API
Basic Idea: the host is responsible for running the program and collecting data. An additional server is
Linux has many release versions, each having its own characteristics. out of habit, we need Windows. Out of study or understanding, we sometimes need to install several Linux sets. Since Linux's LILO functions are powerful enough, we will discuss
What measures should be taken immediately after the Linux server is installed to enhance the security of the server. These methods are also applicable to other Linux releases or versions.
◆ 1. disable unnecessary services
Linux services are divided
In our daily work, we often need to install the same Linux on multiple computers with identical hardware, especially for cluster applications or backup database servers. I am a part-time Linux teacher. Due to the needs of lectures, I often need to
Back up the linux Master Boot Record MBR ):
The root user enters the shell and runs:
Dd if =/dev/hda of =/boot. bak bs = 512 count = 1
Restore the MBR to boot. grub.
Write MBR
Dd if =/boot. bak of =/dev/hda
Or use tools such as diskgen to
System Environment:
The system is xp and ubuntu linux. Xp is installed in the second partition of the system. The first partition is dell's system diagnostic tool. Linux is installed in the sixth partition and the second active partition.
During
We know two ways to win a variable:
Echo $ HOME echo $ {HOME}
In the echo $ {variable} method, you can also modify the content of the variable. You only need to add some character signs and then use the comparison string to modify the content of the
Thanks to carlos's friend for reminding me that he introduced Galaxium Messenger, An MSN client. So I tried Galaxium and found that it is indeed a client with excellent compatibility, beautiful interface and powerful. I will introduce it to you here.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service