Thread and method of creating thread

Understanding threads A process is divided into multiple independent execution streams, called threads Back to the previous example, a class should not only send and receive homework, but also do blackboard newspapers and clean up. If there is only the monitor, it is not only inefficient but also time-consuming. In order to complete the t ...

Added by cqinzx on Tue, 04 Jan 2022 07:28:45 +0200

Introduction to netstat, a tool for monitoring TCP/IP networks

explain netstat command is a very useful tool for monitoring TCP/IP network. It can display routing table, actual network connection and status information of each network interface device, as well as statistical data related to IP, TCP, UDP and ICMP protocols. It is generally used to check the network connection of each port of the machine an ...

Added by bluemonster on Tue, 04 Jan 2022 07:26:32 +0200

Ceph Overview & Ceph cluster deployment & Ceph block storage | Cloud computing

1. Experimental environment 1.1 problems Four virtual machines are prepared, three of which are used as storage cluster nodes and one is installed as client to realize the following functions: Create 1 client virtual machineCreate 3 storage cluster virtual machinesConfigure host name, IP address, YUM sourceModify the hostname of all ho ...

Added by wiseone on Tue, 04 Jan 2022 06:24:43 +0200

[Linux] xshell script (. sh) writing and execution

shell script A shell script is a collection of commands #!/bin/bash echo "The beginning of the file means that the file uses bash grammar"   1, Run sh file Method 1: execute the current file sh file # The file must contain x Execution Authority [Document assignment x jurisdiction: chmod u+x hello.sh] ./test.sh # The file can be empty x jur ...

Added by khaitan_anuj on Tue, 04 Jan 2022 06:06:19 +0200

SELinux & system troubleshooting & firewall policy management & service management | Cloud computing

1 case 1: enable SELinux protection 1.1 problems This example requires SELinux to be configured for virtual machines server0 and desktop0: Make sure SELinux is in force enable modeThis setting must remain valid after each reboot 1.2 scheme SELinux, security enhanced Linux: it is a set of kernel based enhanced mandatory security prote ...

Added by phoenixx on Tue, 04 Jan 2022 05:27:05 +0200

[linux] step by step operation and maintenance - Basics - mount

Article catalog Explanation of mount command 1) Function: the command used to mount the file system 2) The basic format is: 3) Common file system types are: 4) View which operating systems are supported by the current system 5) Detailed explanation of Mount options 6) mount related files 7) mount related parametersmount usage exampleAllow exec ...

Added by ReDucTor on Tue, 04 Jan 2022 01:45:31 +0200

[Linux from bronze to king] Chapter 13: detailed explanation of 40000 words of Linux multithreading

Catalogue of series articles preface 1, Linux thread concept 1. What is a thread An execution route in a program is called a thread. A more accurate definition is that a thread is "the internal control sequence of a process".All processes have at least one execution thread.Threads run inside a process, essentially in ...

Added by rar_ind on Mon, 03 Jan 2022 23:59:57 +0200

Linux combat notes ----- configMap management, Secret management and Volumes management of k8s storage

1, Configmap configuration management Introduction: • Configmap is used to save configuration data in the form of key value pairs. • the configMap resource provides a way to inject configuration data into the Pod. • it aims to decouple the image from the configuration file in order to realize the portability and reusability of ...

Added by marli on Mon, 03 Jan 2022 21:32:35 +0200

Day6 - understanding and learning BASH

Day6 - understanding and learning BASH 0X01 BASH Foundation 1. shell built-in properties Gets the length of the string length=${#Var} can get the length of var Gets the shell currently in use $BASH $0 Check current running user if [ $UID -ne 0 ] then echo NOT ROOT USER. Please run as root else echo Root User fi perhaps if test $UID - ...

Added by Bunkermaster on Mon, 03 Jan 2022 18:52:38 +0200

Block storage application cases & distributed file system & and object storage | Cloud computing

1. Block storage application case 1.1 problems Continue the experiment content of Day03, demonstrate the application case of block storage, and realize the following functions: Create mirror snapshotRestore data using snapshotsClone mirrors using snapshotsDelete snapshot 1.2 steps To implement this case, you need to follow the follow ...

Added by MajorMo on Mon, 03 Jan 2022 18:46:19 +0200