monitoring status is required to be notified in advance through a health check. Zabbix as an operational monitoring evergreen tree, it is easy to monitor thousands of servers. This section explains the installation of Zabbix, the basic configuration item monitoring of the server. The 16th chapter of the course summaryReview the key knowledge of the course.: Baidu Network Disk downloadOriginal address: http://linyunbbs.com/thread-2186-1-1.htmlQuick St
This course includes:"1" C language (1 months)"2" C + + syntax and data structure (1 months))"3" MFC project Development (1 months)"4" Linux project development (1 months)Previous sessions of the video have been uploaded to Baidu Network, please follow the video tutorial in advance to master the progress of the course.VS2015 Series Video tutorials include:"VS2015---0 ba
This course includes:"1" C language (1 months)"2" C + + syntax and data structure (1 months))"3" MFC project Development (1 months)"4" Linux project development (1 months)Previous sessions of the video have been uploaded to Baidu Network, please follow the video tutorial in advance to master the progress of the course.VS2015 Series Video tutorials include:"VS2015---0 ba
Uuid
Identification code of the network device
Onboot
Whether the device is activated when the system boots
DEVICE
Number of the physical NIC
IPAddr
IP Address
GATEWAY
Gateway Address
NETMASK
Subnet mask
DNS1
DNS server address
PREFIX
The number of bits of the subnet mask
HWADDR
The MAC address of the physical network card
all the files in the folder and its directory.Now, suppose you have a folder test with some scripts, all of which (including the TEST folder) have permission-rwxrwxr-x. If you want to remove the Write permission from the user group, you can run the command:Chmod-r g-w TESTRun the command ls-l, and you can see that the permission information for the TEST folder listed is drwxr-xr-x. The user group is removed from the Write permission (as is the case with all files in its directory).SummarizeYou
folder test with some scripts, all of which (including the TEST folder) have permission-rwxrwxr-x. If you want to remove the Write permission from the user group, you can run the command:Chmod-r g-w TESTRun the command ls-l, and you can see that the permission information for the TEST folder listed is drwxr-xr-x. The user group is removed from the Write permission (as is the case with all files in its directory).SummarizeYou should now have an in-depth understanding of the
Basic Linux Tutorial: Automatic Installation of Linux Kickstart
Starting from system installation
In systems such as RHEL, CentOS, and Fedora, the program used to install the system is named anaconda. It is a FedoraProject developed by Python and can provide graphic or text interfaces for system installation.
Before in
Linux Basic tutorial Linux password-free ssh login SettingsBrother LianOverviewin some common devices ssh, SCP, do not enter the password can save a lot of time. Generate keySee if there is a local key, if there is, do not generate, otherwise it will affect the previous device.Copy the code code as follows :(brother e
Basic Linux tutorial ---- install software in LinuxIntroduction
This article introduces several methods for installing software in Ubuntu and the use of apt and dpkg tools.1. Install software on Linux
There are usually three methods for installing software on Linux:
Online
log.log1 2012-012 2012-02345 ======[Email protected] test]#Example four: Using here doc to generate filesOutput:Copy CodeThe code is as follows:[Email protected] test]# Cat>log.txt > Hello> World> Linux> pwd=$ (PWD)> EOF[Email protected] test]# Ls-l Log.txt-rw-r--r--1 root root 3710-28 17:07 log.txt[Email protected] test]# Catlog.txtHelloWorldLinuxPwd=/opt/soft/test[Email protected] test]#DescriptionNote that the Bold section, here Doc, can be used f
, you can use the Shred command to implement,shred is a part of the coreutils , so Linux basically will have this command. Shred How to delete files completely :The code is as follows $ shred-u File Shred will overwrite the node and data block where the file resides with some random content, and delete the file (-u parameter ).If you want to clear a bit more thoroughly you can add the- z parameter, which means to fill with random data, and then fil
Basic tutorial for Embedded Linux (version 2nd)
Edit recommendations
Authoritative book on Embedded LinuxAmazon five-star ratingComprehensive Analysis of Embedded Linux development, revealing a large number of technical Insiders
Basic Information
Original Title: Embedded
OverviewIn some common devices ssh, SCP, do not enter the password can save a lot of time.Generate keySee if there is a local key, if there is, do not generate, otherwise it will affect the previous device.Copy the code code as follows :(brother even Linux training www.lampbrother.net) LS ~/.ssh/id_rsa.pubDo not use Ssh-key-gen to create public keys and keys on localhostCopy the code code as follows : SSH-KEYGEN-T RSAReturnCopy the public key to the
To view the operation time of the history record in the Linux operating system, you can do this in the following steps:Learn Linux 1, modify the /etc/profile file, add at the end:exporthisttimeformat= "%f%t ' WhoAmI '" 2, or in the user directory, modify the file . bash_profile, add export histtimeformat= "%f%t ' WhoAmI '"Exit the terminal and log back in.example, check The history operation time:Copy t
LinuxfindBrother even Linux training summary these timestamps includeCopy the code code as follows:Mtime file content Last modifiedThe time that the Atime file was read or accessedCTime File Status Change timeThe meaning of Mtime and atime is easy to understand, and ctime needs more explanations. Because the inode maintains the metadata on each file, the Inode data also changes if the file-related metadata changes. This can be caused by a series of
Linux Basic tutorial Linux password-free ssh login SettingsBrother LianOverviewin some common devices ssh, SCP, do not enter the password can save a lot of time. Generate keySee if there is a local key, if there is, do not generate, otherwise it will affect the previous device.Copy the code code as follows :(brother e
Mago linux basic O M + intermediate + advanced video tutorial full set of video downloads (nearly 50G), linux50g
Mago linux O M beginner + intermediate + advanced video tutorial full set of video downloads (nearly 50 GB)Directory details:18_02_ssl protocol, openssl and cre
, you can use the Shred command to implement,shred is a part of the coreutils , so Linux basically will have this command. Shred How to delete files completely :The code is as follows $ shred-u File Shred will overwrite the node and data block where the file resides with some random content, and delete the file (-u parameter ).If you want to clear a bit more thoroughly you can add the- z parameter, which means to fill with random data, and then fil
to find files that have been modified for a certain day, for example , today is a lunar month, to find out the revised document, change 0 to 2 . As follows: $ find/home Mtime 2Find files that have changed within 2 days $ find/home mtime-2The interval is expressed as ( -2,0], apparently only -1 and 0 two numbers, respectively, representing yesterday and today.Find files that were changed 2 days ago $ find/home Mtime +2 c. Find files by user or user groupThis type of option is relatively c
LinuxfindBrother even Linux Training Summarizing these timestamps includesCopy the code code as follows : mtime file content last modified The time that the atime file was read or accessed ctime file status change time The meaning of mtime and atime is easy to understand, and CTime needs more explanations. Because the inode maintains the metadata on each file, the inode data also changes if the file-related metadata changes. This can be caused by
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.