Document Purpose
This document describes how to quickly create Linux system instances, remote connection instances, deployment environments, and so on. is designed to guide you through the creation, purchase, remote login, and rapid deployment
Search for and display file names from a file
When you search from more than one file, it displays the file name by default:
The code is as follows:
grep "word" file name
grep root/etc/*
Sample output:
The code is as follows:
/etc/bash.bashrc:
Using RM-RF * When we want to delete tens of thousands of or hundreds of thousands of or even millions of of files in a Linux system is not very useful because it takes a long time to wait. In this case, we can use the Linux system command rsync to
Breakpoint continuation is a combination of local storage and networked storage technology, mainly used to solve the problem of video loss when the network failure. DVS usually does not have the video storage function, but must by the backend NVR to
For Linux beginners, the RPM installation is a good choice. If you want to really master the Linux system, the source code installation is still a software installation under Linux is an important means. Because the Linux system application software
I. Remote Login method
SSH is a secure channel protocol that is used primarily for remote logins. In the RHEL 5 system, the OpenSSH server is provided by software packages such as OpenSSH, Openssh-server, which are installed by default, and the
Since the use of PHP-SYSLOG-NG monitoring log information, often found that some of the past will ignore the error information, is currently being resolved. One of the errors occurred when I logged on to the server using the key via SSH, and the log
Command 1: View file contents
"Cat filename" to view the contents of the file, the page stays at the end.
"More file name" Paging View file contents
Enter the next line
Space page
Q exit
"Head filename" to view the first few lines of the
Add a normal new user to Linux, and a superuser (also known as "root") is a special account that has the power to modify any file in the system. In daily work, it is best not to use the Super user account to enter the system, because any error
1, sagane@sagane-thinkpad-edge:~$ Mii-tool, when the network is not available, use this command to see if the physical link is normal.
2, ssagane@sagane-thinkpad-edge:~$ ssh root@192.168.1.43, With the root user login IP address 192.168.1.43
This article describes how to use backup scripts and commands and commercially available software to protect disk data securely and efficiently in a Linux environment.
The backup and recovery system assumes the function of ex ante backup and
The system provides the communication system between the users, when the user opens the terminal registers the login to discover the system to give the following information:
The code is as follows:
You have mail.
The user can then read the
You can bind the remote server port Remote_port to the local port, where-c is data compression,-f is the background operation, only when the user name password is prompted to the foreground. -N is not a remote command, which is useful in the case of
Introduced
How many ways do Linux systems scan SCSI disks? After Linux has added LUNs, can you recognize the device without restarting the host? If PowerPath is installed, what is the command to add/Remove LUNs dynamically? This article summarizes
Command: Userdel
Function Description: Delete user account.
Syntax: Userdel [-r][user Account]
Supplemental Note: Userdel can delete the user account and related files. If you do not add a parameter, only the user account is deleted without
Linux Shutdown system command shutdown
Shutdown, reboot the system
Linux is a multiuser, multitasking system that can cause user data loss in the system if the system is not properly shut down or restarted. The possibility is that the user is
To run a simple script
Suppose you have a script called:/usr/local/bin/myscript, you want to run every hour.
Service files
The first step is to create a service file that is placed in the appropriate system directory according to your Linux
In the Linux operating system, root is the highest, and is also known as the owner of the Super privilege. The actions that ordinary users cannot perform, which root users can accomplish, are also called Super Admin users.
In a system, each file,
1, processing the special file name
Assuming that there is a file named "-aaa" in the Linux system, if we want to do it, for example, now to delete it, if we enter the RM-AAA command on the command line according to the general deletion method, the
A. fdisk command
FDISK is a disk partitioning command that uses detailed commands to view related documents
Use command fdisk-l to view the partition status of the current disk
Two. DF command
DF is from the Coreutils software package, when
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service