ObjectiveAny system will have problems, the problem is generally how to troubleshoot the bug? This time the log of the Exception Log and key node logs is very important, in the face of a lot of log files, how to find the useful information we need?
For those who have just come into contact with Linux, it will definitely give Linux a bunch of different filenames to stun. Don't say, just for example, we know that the most common compressed files under Windows are only two, one is zip, the other
Network Configuration Common commands Introduction:The function of the network kernel in Linux1. Execute command generated address:(effective immediately after execution, service restart after the
1: Create file: Touch file nameThe touch command can also change the access time and modification time of an existing file without changing the contents of the file.Change modification time only touch-m file nameChange access time only touch-a file
Recently in the forum to see someone asked how Linux set only allow domain name access to the site and prohibit IP access to the site, before they have used this function, you can prevent others to use IP address to visit their own site, below I
[Note that during the installation process, some commands are not found, just yum isntall a bit.]Here's my success at CentOS release 6.4.Installation of RABBITMQ:RABBITMQ is based on Erlang, so you must first configure the Erlang environment.Unzip
OverviewIn some common devices ssh, SCP, do not enter the password can save a lot of time.Generate keySee if there is a local key, if there is, do not generate, otherwise it will affect the previous device.Copy the code code as follows :(brother
Introduction of environment variable fileTransferred from: http://blog.csdn.net/cscmaker/article/details/7261921Environment variables in Linux include system-level and user-level, system-level environment variables are system variables to be read by
By the November, half of the semester, and the "Information Security system Design Fundamentals" This course also to the midterm. So, I'm here, on the first half semester of the most basic knowledge, do a reviewReview plan is divided into two steps,
Test method: Expression: expressed, expressed[Expression][[Expression]]Test expressionThere are three common conditions tested in bash:1. Integer test:-eq equals-lt less than-ne Not equal to-GT Greater than-le less than or equal to-ge greater than
Restrict IP Login:(1): Directory/etc/under Hosts.allow to allow login IP configuration file(2): Directory/etc/under Hosts.deny to restrict IP profilesAdd IP or network segments in/etc/hosts.allow that allow SSH loginSshd:192.168.0.10:allow orSshd:192
VI is the standard editor for UNIX and Linux systems. Once you learn it, you will be in the world of Linux. Basically VI can be divided into three states, namely the command mode, insert mode, and the bottom line mode.The VI Editor is the standard
Command Page It's in the /dev/pts .Add IPIP addr Add 172.25.254.xxx dev eth0Increase GatewayRoute add default GW 172.25.254.251View GatewayRoute-nPhysical and virtual machines do not implement communication steps in the same network segmentBrctl
In Unix-like systems, you can use top to view information such as system resources, processes, memory consumption, and so on. View network status You can use Netstat, nmap and other tools. To see real-time network traffic, monitor TCP/IP
Linux command Useradd,userdel,passwd,groupadd,groupdel,su,usermodLinux Cloud Genesis Tags: Linux useradd userdel passwd groupadd Groupdel usermod Released: September 16, 2016Useradd commandCommand functionThe Useradd command is used for new system
Mkbundle (1)-Linux man PageNameMkbundle, mkbundle2-creates a bundled executable.SynopsisMkbundle [Options] assembly1 [assembly2 ...]DescriptionMkbundle generates an executable program that would contain static copies of the assemblies listed on the
Linux system startup process (3) One of the system fault repairin the use of Linux may cause a variety of reasons for the machine can not start, so there should be a response to these problems should be a measure to restore the system to let this
Centos compression and packaging, Centos compression and packaging
This is basic knowledge, but some things are like this. If it is useless for a long time, it will be forgotten. In the past, there was a bad habit of not taking notes, after learning
Git terminology Chinese and English table, git Chinese and English table
English
Chinese
English
Chinese
English
Chinese
Repository
Repository and version Library
Merge
Branch merge
Snapshot
Snapshots
Record the log of creating LVM at one time and create LVM log records
First, let's take a picture of laruence LVM. I feel this is the clearest picture.
# The following is a direct record using the Xshell logging system. Some Comments [BEGIN] 9:22:
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service