Learn about linux commands for hadoop administration, we have the largest and most updated linux commands for hadoop administration information on alibabacloud.com
Seven Linux commands that are not frequently used but are very powerful
1. sudo !! Command
If you run the command without a specific sudo command, an error is returned. Then, you don't need to rewrite the entire command, just enter '!! 'To capture the final command.Sudo !! CommandRunning the command without specifying sudo command will give you permission denied error. So, you don't need to rewrite the whol
Today, a simple pseudo-distributed cluster of Hadoop was built, with three CentOS systems on a virtual machine, but the password was forgotten. I would like to install a set of Oraclelinux, because of the time, or decided to check the method of retrieving the CentOS password. Make a record for easy access.1. All passwords have been forgotten.Press and hold ESC, enter an interface, select the second item by E, enter a space of +1, and then select the s
Special Permissions : passwd:sSUID: when running a program, the owner of the corresponding process is the owner of the program file itself, not the initiator;chmod u+s FILEchmod u-s FILE if FILE itself has execute permission, then SUID is displayed as s; S ;SGID: when running a program, the group of the corresponding process is the group of the program file itself, not the base group to which the initiator belongs;chmod g+s FILEchmod g-s FILEDevelopteam, Had
/directory: Create a user and then specify the user's home directoryDeleteUserdel User name: Just delete the user but do not delete the home directoryUserdel-r User name: Delete user with home directory deleteTo switch users:Ssh-l User name-P 22 HostExample: Ssh-l tom-p 22 192.168.17.131Su-user name Group ManagementAdd toGroupadd Group NameUseradd User name-G group nameDeleteGroupdel Group NameAttention:If there are users under the group, can not delete permissions for the file:Normal files: In
Special Permissions Introduction to Commands: SUID: when running a program, the owner of the corresponding process is the owner of the program file itself, not the initiator;chmod u+s FILEchmod u-s FILE If file itself has execute permission, then SUID is displayed as S;SGID: when running a program, the group of the corresponding process is the group of the program file itself, not the base group to which the initiator belongs;chmod g+s FILEchmod g-s
default permissions for newly created folders are 755Under Linux, the default permissions for newly created files are 644Learn to use Pietty, WinSCPUnzip tar.gz file TAR-ZXVF hadoop-1.1.2.tar.gz1. Installing the JDK1) Increased execution permissions chmod 777 jdk******2) unzip./jdk*******3) Rename MV jdk***** JDK4) Set environment variables, execute Vi/etc/profileAdd two rows of records export JAVA_HOME=/U
line full screen modeSystem administration Commands:Stat Displays details of the specified file, more detailed than LSWho shows online login usersWHOAMI Show current Operation userHostname Display host nameUname Display System InformationTop dynamic display currently consumes the most resources process informationPS Display transient process status Ps-auxDu view directory size Du-h/home with units display directory informationDF View disk size df-h w
replace the above command TAR-CVF/TAR-ZCVF/TAR-JCVF "C" in the "X".Shut down/Restart the machineShutdown-R shutdown Restart-H shutdown does not restartNow turn the machine off.Halt shut down the machineReboot restartVim useVim three modes: Command mode, insert mode, edit mode. Use ESC or I or: to toggle the mode.Command mode:: Q exit: q! Force exit: Wq Save and exit: Set number Displays line numbers: Set Nonumber hidden line number/apache find Apache in the document press N to jump to the next,
Tags: User copy ping string operation link file unit directory size mkdirLinux Common directives:LS display file or directory ls-l list file details ls-a lists all files or directories in the current directory, including hiddenLs-al display detailed file information, including hidden files mkdir creating a directoryMKDIR-P Create directory, if no parent directory, create parent directory CD switch directory touch create empty file echo Create file with contentCat View file contents CP Copy MV Mo
One, switch from user to root userWhether you're logging in to Ubuntu in graphical mode or in command-line mode, we'll find that the default is user, but when we need to do something with root privileges (such as a system file), we often need to use sudo to authorize it, which is a hassle, and we can switch to the root user, Simply execute sudo su.1 [email protected]:~$ sudo su2Note: For security reasons, the default Ubuntu root user does not have a fixed password, its password is randomly gener
) Options:
-T: List TCP protocol ports -u: List upd protocol port -n: Do not use domain name and service name, but use IP address and port number -l: List only in the Listening State Network service -A: List all network connections -r: List of routing lists , features and route commands a common combination: -tuln, -an, -rn View network connections in a certain state, such as Netstat -an | grep established view the number of rows in a network
to other users on the system. In this case, every user in the system can access the files or directories that the user owns.Each file or directory has three groups of access rights, each group is represented by three bits, respectively, the read, write, and execute permissions of the file owner, the read, write, and execute permissions of the user belonging to the primary group, and the read, write, and execute permissions of other users in the system.Second, the use of the CHMOD,CHOWN,CHGRP co
Filesystem Hierarchy Standard (FHS)/: root directory, all directories, files, devices are in/below,/is the Linux file system Organizer, is also the most superior leader./bin:bin is the binary (binary) abbreviation. In the general system, you can find the common Linux commands in this directory. The commands required by
trend.Type: Shows which type the specified command belongs toPRINTENV: Display Environment variablesHash: Key Value Database Cache is King caching enables system acceleration
Time
Date: Time ManagementLinux Time Implementation mode: RTCNtp:network Time ProtocolHardware clockSoftware clockHwclock- W: Write system time to hardware-S: Write hardware time into the system
Get help with the use of commands
Internal command:Help
text Mode– Linux also inherits the traditional command-line-based text user environment of UNIX systems, allowing users to perform their work in an efficient environment at the command line. –linux Most of the work is done through console mode. The console of the –linux system is also known as command-line mode or Linux
point, you can use WhoAmI to view the current user's identity.View logged in User: WhoThe WHO command is used to view user information for all currently logged-on systems.Common options:
Options
meaning
-M or AM I
Displays only the user name, logon terminal, and logon hours that run the WHO command
-Q or--count
Only shows the user's login account and the number of logged-in users
-U or--heading
Show Column
Tags: related special BSP command margin based on AMS get storage locationUse the type command first to determine whether it is an internal command or an external commandGetting commands to use in Linux helps: Built-in command: Use Help~]# Help COMMAND External command:(1) Help with the use of the command's own brief format~]# Commmand--help[]: Indicates optional;... : indicates can be multiple;(2) User m
it could be 9 parts.Manual chapters:Standard manual Chapters1 Users Command user commands2 system calls refers to a program running under User space that requests to the kernel to enter a service that is running higher privileges3 C Libraries C library Functions4 Devices and special documents DEVICES and special files5 format and conventions of files file Formats and conventions6 games! Games et7 Miscellaneous Miscellanea8 Systems Management and daemons system
Viewing compressed file contents TAR-CVF filename.tar directory_name file archive tar xvf Filename.tar Unpack the package tar xzvf filename.tar.gz extract and unpack tar xjvf filename.tar.bz2 extract and unpack tar ZTVF filename.tar.gz View tar content 20. Wildcard characters (wildcard character)?: Indicates that the location can be any single character*: Indicates that the location can be any number of characters[CharSet]: can replace any single character in the CharSetFor ex
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.