Linux. Page 3

Shell programming specification and variables

introduction In some complex Linux maintenance work, a large number of repetitive input and interactive operations are n...
13:49 3 September 2021

Linux remote SSH uses certificate-secured login (what do you do-zgbn)

Linux Remote SSH Using Certificate Secure Login Server: Ali Cloud Server Operating System: CentOS 7 (Linux) Remote cli...
12:17 19 July 2020

An example of ASM disk not found in DBCA Library

Environmental Information red hat linux64 gi 11.2.0.4 oracle 11.2.0.4 Problem Phenomena After installing gi software...
11:45 5 July 2020

Django studies a love poem

   Django is one of the most representative frameworks for Web development in Python. This article will give y...
12:05 1 July 2020

Django studies a love poem

   Django is one of the most representative frameworks for Web development in Python. This article will give y...
12:04 1 July 2020

Record of Jenkins' step hole installation with container

In order to facilitate the start command of the management container, the docker compose command is used together with d...
22:41 28 June 2020

Implementation of Prometheus alarm through Alertmanager

Prometheus does not support the alarm function, mainly through the plug-in alertmanager to achieve alarm. Alertmanager i...
22:35 28 June 2020

Percona MySQL View Tables Not Accessed

It's really hard to find out if a table in an instance has access.( ...
12:51 28 June 2020

Differences between docker save and docker export

This article talks about the difference between docker save and docker export. ...
23:43 27 June 2020

Linux system running analysis tool - Summary of the use of the sarcommand

catalog sar introduction sar usage sar installation and...
23:21 25 June 2020

Selenium+Tesseract cracking login verification code

preface The type of login verification code I cracked is the type of mathematical formula, i.e... does it look simple, b...
0:25 25 June 2020

Linux system security management

Article catalog 1, Account security control 1.1: basic measures for account security 1.1.1: system account cleaning 1...
23:16 24 June 2020

Hexo +gitee blogging for the most complete teaching

Hexo is a fast, concise and efficient blog framework.Hexo Use Markdown (or other rendering engine) parses the article an...
22:26 24 June 2020

awk different separator-space separator

Today when I formatted the string with awk, I found a strange phenomenon. I checked the awk manual and recorded it here....
12:55 23 June 2020

[linux] learn operation and maintenance step by step - Basic chapter - file permission management

Write before: Blogger is a rebel who pursues freedom after 80's standard of devoting himself to education and training. ...
3:37 23 June 2020

Docker-swarm for Container Technology

In the previous section, I talked about the simple use and basic principles of docker machine, refer back to https://www...
12:53 20 June 2020

linux raw socket grabs network packets

Packet capturing based on linux 1, Get data ...
3:21 20 June 2020

Centos7 logical volume management (LVM)

1, LVM concept 1. A physical device is a stor...
21:17 17 June 2020

Create a yum warehouse and logical disk partition

1. Build your own yum warehouse, which is network source and local source respectively.Network Source:1. First create a ...
18:20 16 June 2020

Kafka Quick Start-RdKafka Source Analysis

Kafka Quick Start (11) - RdKafka Source Analysis ...
20:23 14 June 2020

Spark_ Correct use of checkpoint in spark and its difference from cache

1.Spark performance tuning: use of checkPoint https://blo...
0:48 14 June 2020

Shell syntax specification

ver: 1.0 Blog: https://www.cnblogs.com/Rohn This paper introduces some syntax specifications of Shell programming. The ...
21:45 13 June 2020

Using LLVM to cross compile Linux kernel modules in Windows

Simple common hello program cross compile Click here. Environment construction I'm not doing well, or even stupid, but ...
6:05 12 June 2020

Spring Cloud: Kubernetes deployment management k8s Foundation

Install Kubernetes Install kubectl https://...
0:40 12 June 2020

k8s deployment elasticsearch cluster

Environmental preparation The k8s and ceph environments we use are as follows:https://blog.51cto.com/leejia/2495558https...
13:00 10 June 2020

Centos7 builds frp intranet penetration server

brief introduction The purpose of NAT penetration is to enable packets with a specific source IP address and source port...
0:32 10 June 2020

Set up frp intranet penetration server

brief introduction The purpose of NAT penetration is to enable packets with a specific source IP address and source port...
4:41 9 June 2020

Container technology: Docker private image warehouse harbor

Earlier, we talked about the construction and simple use of docker distribution, a private image warehouse of docker. Pl...
23:55 7 June 2020

Getting started with kubernetes to real-world resource management and Qos

1. Pod Resource Management 1.1 re...
12:29 7 June 2020