Because there are 6 running levels in linux
The single-user running level is-1, which is the single-user running level.
You can change the root password in this mode.
This mode has the following features:
Passing parameter 1 or single for the
I. Shell Structure
1 ,#! Specifies the Shell for executing the script
2. # comment the line to describe the role and owner of the script.
3. command and control structure
2. Create a shell program
Step 1: create a file that contains commands and
First install: kernel-devel
Execute Command:
yum install kernel-devel-$(uname -r)
Download the virtual machine of the corresponding version from the official Virtualbox website.
Https://www.virtualbox.org/wiki/Linux_Downloads
Then
#rpm -ivh
1. Install GIT
$ Sudo aptitude install git
$ Sudo aptitude install git-doc git-svn git-email git-gui gitk
The git package contains most of the Git commands, which are mandatory and the second line is also the Git package, but is released separately.
Background:
0. server data is very important. If the disk is damaged, it will be troublesome. As a manager, it is necessary to synchronize and back up data in real time.
1. rsync is a good backup tool. The following uses Ubuntu as an example to
Chapter 2 passing parameters in basic shell programming scripts
Why should we pass parameters to shell scripts? Parameter passing can pass external values to the internal functions of the script to improve the flexibility of the script. parameter
This note is based on the introduction of linuxShell programming to a book proficient in learning experiments and related notes.
PDF File Download: http://download.csdn.net/detail/ruishenh/6586391Chapter 1 describes three methods to run a linux
In Unix/Linux, the most efficient technique is not to operate the graphic interface, but to operate on the command line, because the command line means automation.
Daily
In bash, use Ctrl-R instead of the Upper/lower cursor key to search for
Chapter 5 basic text processing sorted text
Text processing is almost the most important part of UNIX/LINUXShell programming. In the UNIX/LINUX design, everything is a file, and the collaborative work of many programs in the system is achieved
Create a scriptLinux has many different shells, but we usually use bash (bourne again shell) for shell programming, because bash is free and easy to use. So in this article, all the scripts provided by the author use bash (but in most cases, these
Upload to the/usr/tomcat7 directory
Cp/home/toto/Desktop/apache-tomcat-7.0.47.tar.gz/usr/tomcat7/
2. Go to the Tomcat 7 directory.
Cd/usr/tomcat7
3. Unzip tomcat
Tar-xzvf apache-tomcat-7.0.47.tar.gz
4. Check whether tomcat is enabled for
I. Working Principle of DrbdDRBD is a block device that can be used in HA. it is similar to a network RAID-1 function. (compare NFS in Linux) when you write data to a local file system, the data will be sent to another host on the network. record in
Zookeeper
Function
Displays process information.
Format
Ps [options]
Main Parameters
Basic Process Selection Control
-A,-e
All processes
-N, -- deselect
Select all processes except for meeting specific conditions
-D
All except the first PROCESS
[Free] LinuxSystem debugging technology sharing salon
Qian chonglang Linux technology Studio
Are you still wandering outside the Linux gate?
Are you still holding over 1000 pages of Linux classic hard-working late at night?
Are you sure
Reboot, halt, poweroff
After reading the man help information of these three commands, we found that the same functions are implemented.
Purpose:
Restart or shut down the system
Syntax:
Reboot [options]
Halt [options]
Poweroff [options]
It has been a headache for me since I started to use ubuntu. Fortunately, after plugging in the headset, you can barely use it, so you will not continue to investigate it.
A more serious problem has been found recently.Failed to wake up after being
1. Use commands to set the Ubuntu IP Address
1. modify the configuration file blacklist. conf to disable IPV6.
Sudo vi/etc/modprobe. d/blacklist. conf
The contents of the blacklist. conf file in The modprobe. d folder in the etc folder are edited
If you have multiple servers and one server is logged on for management, it cannot be said, so the batch management tools have emerged. If you have set SSH password-less Logon:
ssh-keygen -t rsassh-copy-id user@host
By distributing the key to the
Recently, several servers need to be backed up due to migration and other issues. The server runs the UbuntuServer. After studying the backup method, find the simplest one, which is also suitable for sharing among other Linux systems ~
The
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service