C ා basic knowledge series - 17 practical writing a small tool

0. Preface This is a summary of the C ා Foundation Series. Now we use the knowledge we learned before to make a small tool for us to use. If you have read the IO article, you should have an impression. At that time, I mentioned a scenario description. When we use the system, we often worry about finding the location of a file. Now let's try to ...

Added by bampot on Thu, 07 May 2020 08:46:29 +0300

ELKB 7.X log system construction

Catalog What is ELKB Building ELKB system Problems to be noticed during construction What is ELKB ELKB is a popular solution for log system, which is composed by a set of components. This set of components are ElasticSearch, LogStash, Kibana and FileBeat. The functions of each component are as follows: Elastic search (es): Based on Apa ...

Added by rmt123 on Tue, 05 May 2020 16:58:56 +0300

Docker image migration

Docker image migration Experimental environment Operating system: CentOS Linux release 7.3.1611 (Core) docker version: 17.11.0-ce image copies To view an existing docker image: [root@localhost ~]# docker images REPOSITORY TAG IMAGE ID CREATED SIZE eg_postgre ...

Added by mrdeadman on Tue, 05 May 2020 10:58:03 +0300

Detect whether kernel functions are hook ed by trace stack

Rootkit needs to find out if there is a program catching it in time, and the detection program itself needs to be vigilant about Rootkit injection and left-right interaction. The instrumentation program found Rootkit to be very versatile, and I've previously described how to static scan through address ranges that are called from each other by ...

Added by psychowolvesbane on Mon, 04 May 2020 17:14:17 +0300

HAProxy https configuration, four-tier load balancing, and access control for load balancing services

In the previous section, we talked about the configuration of haproxy's access control ACL. For a review, please refer to https://www.cnblogs.com/qiuhom-1874/p/12817773.html ; Today let's talk about the configuration of haproxy's https, tcp-based four-tier load balancing, and access control. First let's look at the configuration of haproxy's ht ...

Added by amandas on Sun, 03 May 2020 09:12:33 +0300

linux system programming: write a ls command by yourself

ls is used to list the contents of the directory. To achieve this function, there is no doubt that you need to read the directory, involving two APIs: Opendir: DIR *opendir(const char *name), pass file name, return a pointer, point to directory sequence Readdir: struct dirent *readdir(DIR *dirp). Pass the return value of opendir to a structur ...

Added by tapupartforpres on Fri, 01 May 2020 20:21:39 +0300

Linux Learn 28-linux One Line Command Kills Processes with Specified Names (killall, kill, pkill)

Preface Common interview questions: How to use a linux directive to find a process with a specified name and kill it Three commands commonly used to kill processes: killall, kill, pkill Several ways to kill a process The killall command is used to kill processes by name. killall [parameter] [process name] The kill Command kills the p ...

Added by dcace on Thu, 30 Apr 2020 03:14:06 +0300

shell script seven: if structure conditional sentence knowledge and Practice

7, Knowledge and practice of if structure conditional sentence (1) if conditional single and double branch syntax 1. Single branch if condition then instructions fi 2. Bifurcate if condition then instructions else Instruction set 2 fi (2) if conditional multi branch statement 1. Structure of statement if condition 1 then ...

Added by crishna369 on Wed, 29 Apr 2020 17:46:38 +0300

Docker consult container service update and discovery

Docker consult container service update and discoveryContainer service update and discovery topologyThe nginx proxy service is deployed on the consumer server. The Registrar detects the service in the docker container and adds the registration to the consumer. The consumer template is registered and written into the created template according ...

Added by thomashw on Fri, 24 Apr 2020 14:54:25 +0300

Docker private warehouse, volume, port mapping

Private Warehouse EstablishmentTo build a private warehouse(1) Download the registry image at the character terminal(2) The client sets the daemon.json file to specify the private warehouse location(3) Generate registry container, open 5000 ports(4) Image labeling: docker tag original image name warehouse IP: port / image name (must be labeled ...

Added by serg91 on Thu, 23 Apr 2020 18:15:23 +0300