Previously, the script used the save mode. Now, the command is appended to a file. In this way, you can easily modify the file twice.
The script is basically like this. You can modify it as needed ~ Add functions or something.
#! /Bin/bashwhile
Previously, the script used the save mode. Now, the command is appended to a file. In this way, you can easily modify the script for another time, you can change it as needed ~ Add functions or something. #! /Bin/bashwhiletruedoclearecho "-----------
The previous script is in save mode, now attach the command to a file, so that it can be easily modified two times or somethingThe script is basically like this, we can change with their situation again ~ add function or something.
Deploy Keepalived + LVS in CentOS to build a highly available WEB environment
I. Experiment deployment Software List
CentOS 6.4X64 mini
Keepalived-1.2.7.tar.gz
Ipvsadm 1.2.5-10
Ii. Tutorial Purpose
Keepalived is used to implement a cluster
Linux iptable firewall block and open ports
Source: http://hi.baidu.com/zplllm/item/f910cb26b621db57c38d5983
Evaluation:
1, close all the INPUT FORWARD OUTPUT only to some ports open.
Here is the command implementation:
Iptables-p INPUT
1. disable all INPUTFORWARDOUTPUT to open only some ports. The following is the command implementation: iptables-PINPUTDROPiptables-PFORWARDDROPiptables-POUTPUTDROP and then use the command iptables-L-n to check whether the settings are correct. you
1. Disable all input forward output and only open it to some ports.The following is a command implementation:
Iptables-P INPUT DROPIptables-P FORWARD DROPIptables-P OUTPUT DROP
Run the command iptables-L-n to check whether the settings are
Configuration method:1. Use Puttygen to generate public and private keys under putty2. Create the. SSH directory under the/root/directory3. Create a Authorized_keys file in the. ssh directory and copy the generated public key into the file;4. Change
Today, I got a new server, used as a stepping stone, and pasted and copied the previous Code. As a result, there was a problem and I couldn't forward it,
Beth was not clear, so I had to find it a little later. First, find the network,
No network
by Shay Anderson on October 2013Knowledge Base/Linux/How-to- Install Apache SOLR 4.5 on CentOS 6.4 In this tutorial I explain how to install the Apache SOLR 4.5 on CentOS 6.4. The examples below I am using the root user, if you is not your would
First, create a RHCS cluster environmentGoal:Prepare four KVM VMS, three as cluster nodes, one for installing Luci and configuring iSCSI storage services for the following functions:
Use RHCS to create a cluster named Tarena
All nodes
A Tomcat is mounted on the server. After specifying the port number, I will start accessing it! The company imposes limits on the RedHat port! Use iptables to view firewall settings: shell code iptables-nl I need a port 8880, it seems that it cannot
How can I skillfully configure two security tools to prevent brute-force attacks?Introduction to brute force attacks
We all know this buzzword: "Prevention is better than treatment ." If you are a Linux system administrator, you may know how a
Iptables is a firewall on a linux server. It is much more powerful than windows Firewall. Next I will give you a brief introduction to using iptables to disable and unban IP addresses, for more information, see.
The command to block a single IP
Basic iptables and Samba configuration example
Basic concepts of iptable
Iptables table chain rules
Iptables packet transmission process
Iptables Command Format
Iptables common OPTIONS
COMMANDS
Description of common PARAMETERS
Use
Enterprise requirements: 1. Configure ssh to allow access by sisi users and deny access by the remote.com domain. 2. Configure ftp to allow anonymous download from the/var/ftp/pub directory, deny Access to the remote.com domain. mount iso
Mysql Replication master-slave synchronization, mysqlreplication
Introduction:
Mysql master-slave synchronization is a common solution for enterprises. It is often used to back up databases. When the client operates the master database, the master
Abstract: By default, the iptables information filtering system is installed in centos. Currently, you need to configure the system to allow remote access to mysql. Related Knowledge: iptables related 1. iptables service/etc/init. d/iptablesstart |
I. view the iptables service status of the terminal. view the iptables service status # serviceiptablesstatus because iptables is loaded to the kernel in the module mode, if the corresponding module is not started, the iptables service is definitely
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.