How to log and send executed commands to the server in Linux

At work, we need to record every command that the user executes and send it to the log server, and I have done a simple solution. This scheme sends every command executed by the user to the log daemon rsyslogd every time the user exits the login,

Solve the problem of iowait too high in Linux

I/O problem is always a difficult problem to locate, today, the online environment encountered I/O caused by the CPU load problem, see the following this relatively good article, after dinner I still in and tomatoes and cucumbers on the road to lose

Common linux Command mkdir command usage detailed

mkdir commands that we use a lot more when we operate Linux operations and Web deployments, primarily to create a directory folder that you specify. For example, Chiang Kai-shek in the previous blog article mentioned in the download data hard disk,

The free command usage in Linux is detailed

Grammar free (options) 1. Command format: free [parameters] 2. Command function: The free command displays the system's use and idle memory, including physical memory, interactive area memory (swap), and kernel buffer memory. Shared memory will be

An example of network application of Arch Linux operating system

Explain if you are configuring your network. [Root@arch ~]# ls/sys/class/net/#查看有哪些可用网络eno16777736 Lo[Root@arch ~]# ip addr add 1.1.1.21/24 dev eno16777736 #给接口eno16777736配置ip为1.1.1.21 Subnet Mask bit 255.255.255.0[Root@arch ~]# IP link set eno16777

Linux wget download Http/https proxy settings

Method one, with parameters directly behind the command Use the wget command to set up an HTTP proxy wget http://www.baidu.com/-E use_proxy=yes-e http_proxy=yourproxy.com:port Other additional parameters are necessary for downloading HTTPS files.

Linux site Timing automatic backup wget, SSH, SCP method summary

The first type of wget direct download: Run the CRONTAB-E command on the remote server to add a timed task 7 * * * * cd/home/backup/&&wget http://Source server ip/xxx_$ (date +%y%m%d). tar.gz (Automatically download to backup directory at 7:30 every

Linux under SSH key to login to the VPS server method

Linux Default login mode is the account and password login, if you change to use a key to log in will be relatively safe, but the key to landing a good and bad, want to login VPS must carry a key file, if modified the default root username also need

Linux system Installation SSH2 expansion steps detailed

Today there is nothing to say to everyone about Linux installation SSH2 expansion, want to install under the WinDOS but PHP expansion can not find, tears running ...So I can only do experiments in Linux, but all the same,,,, Download Address wget

SQUID3 (high hit Ratio) cache server configuration in Linux

Today, my varnish carried out a small pressure test, 40s 8000 concurrency, no failure, an estimate can withstand a greater concurrency, not to mention varnish, I recently found a high percentage of squid profile, of course, squid3.0 configuration

Linux rpm command parameters to use the detailed

RPM Execution Installation package Binary package (Binary) as well as source code package (sources) two. The binary package can be installed directly on the computer, and the source code package will be automatically compiled and installed by RPM.

Configure the build Postfix document on Linux systems

Another disadvantage of "Postfix", which is widely used in mail services, is much less, or it is designed to address the shortcomings of sendmail. Corresponding to the shortcomings of SendMail, it is also relatively mature in all aspects. Therefore,

Post-invasion repair and prevention notes for Linux sites

SignatureA long time ago, I used a CMS to build a site, collected some content, then did not care, became a no one maintenance of the garbage station. Yesterday, occasionally found that the site did not know when the black chain was hung, the site

Linux under SSH ftp command upload file details

If there is no FTP prompt:-bash:ftp:command not foundPlease install the FTP application first: Yum install FTP#ftp 127.0.0.1 21 Enter the FTP IP and port number of the remote space, carriage returnThen enter the user name and password according to

Chakra Linux installation and configuration steps diagram

I. Introduction to Chakra Linxu Chakra Linux is a user-friendly, powerful release and bootable CD-ROM, based on Arch Linux. Features include a graphical installer, automated hardware detection and configuration, the latest KDE desktop, and a wide

Using Iptables to prevent DDoS attack configuration under Linux

Use Iptables to set the maximum number of connection requests within a specified time for a single client, exceeding the restricted direct drop The code is as follows Copy Code Iptables-a input-p tcp–dport 80-m

A detailed explanation of the differences between Atime,ctime and Mtime in Linux

Guessing the man handbook should have these three-time instructions, so try man atime, and man st_atime have no relevant documentation. After To think of stat can see the file of these three time, use the man stat lookup, although there are

Linux firewall iptables allows the specified port to pass

1. Allow to pass through a port at one end Vi/etc/sysconfig/iptables -A input-m state--state new-m tcp-p TCP--dport 80-j ACCEPT (allow 80 ports through the firewall) /etc/init.d/iptables restart #最后重启防火墙使配置生效 Allow only specific IP access to a

Linux Server rsync sync settings detailed guide

I. Introduction (do not want to see directly can skip)Migrate Emos servers, the new server has been completed after the test, and then very important work is to complete the old mail system in the mail data migration, the choice of copy of the way

Linux RM Command Recovery (grep) by deleting files incorrectly

using the Extundelete plugin Suppose the deleted file is located in the/media/backup, and the mounted device is/DEV/SDA3. First, mount the current disk again. Then install the Extundelete dependent package, The code is as follows

Total Pages: 5467 1 .... 997 998 999 1000 1001 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.