Detailed explanation and examples of function variable scope, variable type, common variable, global variable, environment variable and local variable in shell

Overview of function variables Variable scope: the scope of Shell variables is the effective scope of Shell variables Variable type Common variables are also called global variables. The scope of common variables is the current shell script program file, including the functions in the script. Environment variables: the current shell ...

Added by Illusionist on Wed, 02 Feb 2022 12:15:01 +0200

ElasticSearch+Kibana+Serilog quickly build a unified log Center

Article catalogue catalogue preface 1, Why ElasticSearch+Kibana+Serilog? 2, Construction steps 1. Import the required Nuget package 2. Add the following code to Startup 3. Add the following configuration in appsetting 3. Build ElasticSearch+Kibana 4. Simple use of kibana summary   preface Because the current proj ...

Added by roze on Wed, 02 Feb 2022 03:33:26 +0200

Introduction to superset deployment, installation and use

Introduction to superset deployment, installation and use Superset overview Apache Superset is an open source, modern and lightweight BI analysis tool. It can connect with a variety of data sources, has rich icon display forms, supports custom dashboards, and has a friendly user interface, which is very easy to use. Superset application scen ...

Added by EPCtech on Tue, 01 Feb 2022 16:46:34 +0200

Operation and maintenance - Practice - Basic Prometheus monitoring environment construction

Operation and maintenance - Practice (III) - Construction of basic Prometheus monitoring environment In the previous article "building a basic Docker development environment", we have built a basic Docker environment for Linux servers, and we have made a custom network mode configuration. We can configure the specified IP for ...

Added by MarcAndreTalbot on Tue, 01 Feb 2022 16:01:37 +0200

Docker - basic commands, recommended collection!

preface When I first saw others using Docker, I was puzzled. Why and how to use Docker? Why is Docker configuration so difficult? Why is network access blocked? And other factors hinder the author from learning Docker? In fact, the author is also very stupid. There are many points where I don't think clearly. By the way, share it. Class hour ...

Added by php_novice2007 on Tue, 01 Feb 2022 15:36:58 +0200

3 character device driver programming

catalogue 1 miscellaneous character device Core structure Operation function Miscellaneous character device registration application 2 early classic registration Operation function Classic device registration application 3 Linux2.6 character device Core structure Operation function Linux2.6 device registration application Linux sys ...

Added by buildernaut1 on Tue, 01 Feb 2022 06:37:38 +0200

Summary of Linux empowerment (sudo, polkit)

Summary of Linux polkit rights raising As soon as I was about to take my annual leave, I received a regulatory vulnerability alert - "pkexec program in Linux Polkit has a privilege escalation vulnerability (vulnerability number: CVE-2021-4034). Pkexec application is a pre installed tool for Linux system, and the vulnerability affects main ...

Added by texmansru47 on Mon, 31 Jan 2022 22:18:08 +0200

Linux common instruction learning (Part 3): file search command

Tip: after the article is written, the directory can be generated automatically. Please refer to the help document on the right for how to generate it preface Environment and related software: VMWare 14, CentOS 7, SecureCRT. Tip: the following is the main content of this article. The following cases can be used for reference 1, Fil ...

Added by daedlus on Mon, 31 Jan 2022 16:40:56 +0200

Partial optimization and anti-theft chain configuration of in-depth learning of nginx

1, Hide version number 1.1 method of modifying configuration file vim /usr/local/nginx/conf/nginx.conf http { include mime.types; default_type application/octet-stream; server_tokens off; #Add close version number command ...... } systemctl restart nginxcurl -I http://192.168.253.33 1.2 modify the sour ...

Added by acheoacheo on Mon, 31 Jan 2022 06:15:01 +0200

Linux system: permission management

Linux rights management shell command operation principle [yyx@VM-4-16-centos ~]$ Such a line of text is the command line, and the commands written later are called commands. Use which to view the directory where the commands we wrote are located. It can be seen that the commands under Linux are an executable file. Generally, the operat ...

Added by sayoko on Mon, 31 Jan 2022 04:08:19 +0200