Awk:
Awk can be said to be an independent language that provides powerful functions for text processing, and can process various processing results. Now we will summarize it.
Awk: Report Generator
Basic syntax
Awk [Options] 'signature' file...
Awk
Linux Folder deletion command
Deleting a directory in Linux is very simple. Many people are still used to using rmdir. However, once the directory is not empty, it is deeply worried. Now we can use the RM-RF command.You can simply use RM, but you
AWStats is a fast-growing Perl-based web log analysis tool on SourceForge. Compared With Webalizer, an excellent open-source log analysis tool, AWStats has the following advantages:
1. User-friendly: You can directly call the corresponding language
Lamp -- Build the source MySQL cluster version
Environment: rhel6.1 x86
The software is as follows:
#Ls
Apr-1.4.6.tar.g memcached-1.4.13.tar.gz pcre-7.9.tar.gz
Apr-iconv-1.2.1.tar.gz libevent-2.0.18-stable.tar.gz mysql-cluster-gpl-7.0.5.tar.gz
Apr-
To plan a high-capacity web server, we will do it in the following steps:
I. Network Environment
----| (Eth0: 192.168.11.8) | (eth0: A. B. C. d)| A | -------------------- | B | -------------> ISP-- (Eth1: 192.168.11.5 )--Web.company.com
View open files to learn more about the system. You can understand which files an application opens or which application opens a specific file as a system administrator. This allows you to make better decisions. For example, you should not Uninstall
[Linux Notes] how to use the logrotate tool to automatically split the log files in the scroll, linuxlogrotate
In many real projects, applications continuously write logs. If the program code does not call a logstore that supports automatic
A is a web server inside the lan. Install Redhat Linux 6.xand compile Apache + PHP4 + MySQL
B is the company firewall, and the external address is a. B .c.d, which is the only path to the Internet. Run Apache on B
Reverse proxy to internal machine
An intrusion and deletion of trojan programs
An intrusion and deletion of trojan programsThe backdoor Trojan is as follows:(Of course, this was found slowly after being calmed down afterwards. Drinking coffee at that time felt like a free man)Trojan
Install apache in Linux source code and solve common errors.
Original document location
1. Compile and install apache
1. Resolve Dependencies
The httpd-2.4.4 needs a newer version of apr and apr-util, so it needs to be upgraded in advance.
There are
Use Apache + mod_wsgi to deploy Python programs such as webpy
Webpy is a lightweight Web framework on python. Like many other Python web frameworks, webpy supports wsgi deployment, at present, the best wsgi deployment solution is Apache + mod_wsgi,
1. First, cut Apache logs by day
VI/etc/httpd/CONF/httpd. confErrorlog "| rotatelogs/var/log/httpd/% Y % m % derror_log 86400 480 ″Customlog "| rotatelogs/var/log/httpd/% Y % m % daccess_log 86400 480" combined
Ii. Restart Apache server
Service
Recently, an Apache + Tomcat environment needs to be created for some reasons. But the trouble is that you do not have a Linux machine on hand, but you do not want to use Windows or install Linux. Therefore, I chose a solution like Apache + Tomcat +
1, rewrite rules introduction:The main function of Rewirte is to implement a URL jump, and its regular expression is based on the Perl language. Can be based on both server-level (httpd.conf) and directory-level (. htaccess) methods. If you want to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.