Btrfs, also known as Butter FS, Better FS, or B-tree FS, is a modern file system that Oracle began designing and developing in 2007, and it was merged into the Linux 2.6.29 kernel in 2009. Btrfs is licensed under the GPL and is not very stable,
Uwsgi and Nginx log are in a file name on the log, can not be rotate by day, so the volume of a single file will become larger and worse, not conducive to log backup.
Nginx Method of Log segmentation
The Nginx log segmentation method is studied on
Turn from: http://www.perfgeeks.com/?p=723
Mmap () and MMAP2 () are often visible through strace statistical system calls. System call MMAP () can map a file to memory (process space). This allows the operation of the file to be converted to
/dev, device file storage directory, the application through the read and write to these files and control, can access the actual equipment;
/sys/devices directory, according to the type of bus attached to the device, organized into a
Modify the Linux kernel kernel boot picture (originally a small penguin picture).
Reprint please indicate the source: Http://blog.csdn.net/wang_zheng_kai
Navigation guidance and Control laboratory December 10, 2014
This article mainly introduces
Tag: Otherwise code runs its own dir requires mod pass numberLinux privilege Supplement: RWT RWT RWS RWS Special PrivilegesAs we all know, Linux file permissions such as: 777;666, in fact, as long as the corresponding file with the UID permissions,
First, preface3 memory models are supported in the Linux kernel, flat memory model,discontiguous and sparse. The so-called memory model, in fact, is from the CPU point of view, the distribution of its physical memory, in the Linux kernel, the use of
Transferred from: https://www.ibm.com/developerworks/cn/linux/l-cn-deadlock/Brief introductionDeadlock (Deallocks): Refers to two or more than two processes (threads) in the course of execution, because of the contention for resources caused by a
1. PrefaceA ring buffer was used in the recent project, and the code was changed by the Kfifo of the Linux kernel. Buffers are often used in the file system to alleviate the CPU's read and write memory and the speed of reading and writing disks
Open Terminal:Ctrl+alt+tDownload JDK:wget http://download.oracle.com/otn-pub/java/jdk/8u144-b01/090f390dda5b47b9b721c7dfaa008135/jdk-8u144-linux-x64.tar.gzDecompression jdk-8u144-linux-x64.tar.gz:Tar zxvf jdk-8u144-linux-x64.tar.gzcut to the JDK
Check the logs on the machine today, accidentally found a bunch of errors. Because previously configured DNS and squid, error, after the error, a certain degree, did not find the answer.Here is a little error message:8 11:40:30 host named[1668]:
Problem Description: My arch Linux has been used for more than half a year, because of the rolling problems of Arch Linux, I have never directly upgraded the system. Software versions and libraries are naturally lagging behind.When I was ready to
After logging in to Linux, switch directories to /usr/localCd/user/local
Create a new folder in the /usr/local directory servers to store Tomcat filesmkdir servers
in folder Servers download tomcat file ( Tomcat version according to
After logging in to Linux, switch directories to /usr/localCd/user/local
new Folder in /usr/local directory java to store jdk filesmkdir Java
in folder Java download jdk file ( jdk network path can be replaced according to your own
IfstatIntroducedIfstat tool is a network interface monitoring tool, relatively simple to see network trafficInstanceDefault usage#ifstat eth0 eth1 kb/s in kb/s out kb/s in kb/s out 0.07 0.20 0.00 0.00 0.07
Common commands1) Enter root file system roots directoryCD/2) Show current directoryPwd3) Display the system datePwd4) display "Welcome to use this system" on the display Chinese tipsecho "Welcome"5) use the cat command to view the etc/services
Recently saw the Linux Kernel Cmpxchg code, the implementation very does not understand. I read the inline assembly and Intel development documentation on the Internet, and then slowly understood it and recorded it for developers who were as
Install l2tp/ipsec vpn in Centos 71. install the software package required by l2tp ipsec
Yum install epel-release
Yum install openswan xl2tpd ppp lsof
2. Set ipsec
2.1 edit/etc/ipsec. conf
Vi/etc/ipsec. confReplace xx. xxx with the actual
Configure the SSH service to log on to the Linux server using the certificate
Common authentication methods for logging on to a Linux server through SSH (Secure Shell) include passwords and certificates. From the security perspective, we recommend
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.