1 Ami will go to the following page after normal startup2 remote Links Click How to connect to your Linux instance into the download pageusing putty to connect to a Linux instance under WindowsHttp://www.chiark.greenend.org.uk/~sgtatham/putty/download.htmlDownload putty and Puttygen separately: Download and open. Equivalent to AWS own FTP tool
Start PuTTY (on theStart menu, click AllPrograms > PuTTY > PuTTY).
In the category pane, select sess
If an KeyPair private key (*.PEM) is created and downloaded when AWS launches an instance, this private key can be telnet to this instance system as credentials via putty. In practice, however, you will be prompted with the following error when logging in with Putty:No Supported authentication methods available (server Sent:publickey)This is due to the fact that AWS generated key files (*.PEM) and putty req
be omitted directly650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M01/83/63/wKiom1dx_iKhLygDAAAvES_DlNI872.png "style=" float: none; "title=" 9.PNG "alt=" Wkiom1dx_ikhlygdaaaves_dlni872.png "/>If I don't remember the full name, I can match it with a regular command, such as I need to know any service operation related to Securitygroup.Get-awscmdletname–apioperation Securitygroup-matchwithregex650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M00/83/63/wKiom1dx_ieDBoJ7AADvME6rZuU645
AWS EC2 is logged on by default using the Ec2-user account and has no permissions on many folders. How to execute a command with the root account is a problem. The solution is as follows: 1. Log in to the EC2 server according to the method provided by the official website (recommended for Windows users to use Putty connection) Host: Is the public DNS port for the server: 222. Create the root password and en
Label:To create an alias for the AWS Management Console login page URL $ aws Iam Create-account-alias--account-alias Create user $ aws Iam Create-user--user-name Delete User $ aws Iam Delete-user--user-name List all Users $ AWS
, you need to specify the ID of the corresponding VPC.#Create Security Group and Rulenew-ec2securitygroup-groupname mytestsecuritygroup-description "Ec2-classic from PowerShell "To confirm that the creation was successful. You can see that the {} behind the inpermissions is empty, which indicates that we have not configured any inbound ports yet.Get-ec2securitygroup-groupname Mytestsecuritygroup650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/83/6E/wKioL1dzbiOgbrT5AAE63q05BHo812.png "s
CloudFront distribution points, bind S3 buckets
Preparing the WordPress configuration document
Preparing the configuration document for VirtualHost
Uploading the configuration document into the S3 bucket
Configure bash shell scripts, including Lamp,wordpress,aws,crontab and S3 synchronization, and more
Create a EC2 virtual machine, specify the bootstrap command created in 14 steps
Update DNS records, point to the virtual machi
Finally, see how to manage AWS DNS services with PowerShell.The launch of Route 53 is simple, you can register a new domain name on AWS, or you can register a new domain name on another site and then migrate over. Beans on GoDaddy already have a domain name beanxyz.com, the management interface moved to Route 53 is very simple, in Route 53 to create a new Hostedz
/wyfs02/M00/83/C9/wKioL1d8mVDwO_AuAABzWFt89vU649.png "title=" 9.PNG " Style= "Float:none;" alt= "Wkiol1d8mvdwo_auaabzwft89vu649.png"/>The next step is to specify the resources that EC2 can access, specifying all of the S3 resources$policy 2 = @ "{" "Version": "2012-10-17", "Statement": [{"Effect": "Allow", "notaction": "s3:*", "Resource": "*" }]} "@ write-iamrolepolicy-policydocument $policy 2-rolename" newec2-s31 "-policyname" ALLOWS3 "After execution, you can see that it's been configured.650)
://s3.51cto.com/wyfs02/M02/83/AA/wKioL1d6CmWR2StsAADCflHoudk047.png "title=" 13.PNG "alt=" Wkiol1d6cmwr2stsaadcflhoudk047.png "/>In fact, the auto scaling group created the corresponding policy and alarm so I took a lot of effort. Because AWS does not know for what reason, his creation command is Write-asscalingpolicy, and the corresponding read command is get-aspolicy, the Delete command is Remove-aspolicy, completely does not conform to the naming s
} #Add new Routenew-ec2route-destinationcidrblock "0.0.0.0/0"-gatewayid $igwid-routetableid $ RouteTable. RoutetableidAs shown below650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M00/83/8E/wKioL1d1_z7zG2PeAAArGIDYbJY472.png "style=" float: none; "title=" 10.PNG "alt=" Wkiol1d1_z7zg2peaaargidybjy472.png "/>I can also force associations to the corresponding subnets. If it is in the default main routing table, all subnets will automatically inherit VPC-related routes, of course, I created a
' -DefaultCacheBehavior_MinTTL1000 ' -distributionconfig_ priceclass "Priceclass_all" ' -cachebehaviors_quantity0 ' -Aliases_Quantity1 ' -aliases_item "Test.beanxyz.com"After the command has been executed, it is created and can be used in about 15 minutes.650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M02/84/25/wKiom1eHBWfyxdcSAAA0x-_PLbY218.png "style=" float: none; "title=" 1.PNG "alt=" Wkiom1ehbwfyxdcsaaa0x-_plby218.png "/>At the same time, on my GoDaddy DNS I added an alias to m
Continue learning PowerShell to manage AWS S3 today. S3 is much simpler than EC2. S3 is generally used as normal storage, can hold some files that are not too high for I/O requirements, and so on.His operation is simple, nothing more than creating buckets, deleting buckets, uploading, downloading files, setting access rights and so on; S3 itself can also be made into a simple static web page.For example, the manag
/wKiom1eFsjjhmJY2AABI9C9reeY614.png "title=" 5.PNG " alt= "Wkiom1efsjjhmjy2aabi9c9reey614.png"/>Next, do a simple test.Beans directly created a CentOS 7 server, after installing MARIADB, connect to the endpoint of my RDS instance to seeConnection Successful650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M02/84/19/wKiom1eFsAuSTHNQAAA8-IM8uXY046.png "style=" float: none; "title=" 3.PNG "alt=" Wkiom1efsausthnqaaa8-im8uxy046.png "/>View Database650) this.width=650; "src=" Http://s3.51cto.com/
MySQL Log Management and mysql Log Management
In MySQL, there are four different types of logs: error logs, binary logs, query logs, and slow query logs.
Error Log
The error log records information related to MySQL startup and shu
Label:When everything is OK, there is no need to pay particular attention to what the transaction log is and how it works. You just have to make sure that each database has the correct backup. When a problem occurs, the understanding of the transaction log is important to take corrective action, especially if the database needs to be urgently restored to the specified point. This series of articles will tel
As you can see in Figure 1-14, the first one to manage is the log classification, which is what this section describes. It is done using the Ucadmin_logcategory.ascx user control, as shown in Figure 1-1, which is the final layout of the control.
Figure 1-1 Management Log Classification user control layout
As shown in Figure 1-1, the GridView control in the asp.n
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.