Detailed explanation and examples of function variable scope, variable type, common variable, global variable, environment variable and local variable in shell
Overview of function variables
Variable scope: the scope of Shell variables is the effective scope of Shell variables
Variable type
Common variables are also called global variables. The scope of common variables is the current shell script program file, including the functions in the script. Environment variables: the current shell ...
Added by Illusionist on Wed, 02 Feb 2022 12:15:01 +0200
ElasticSearch+Kibana+Serilog quickly build a unified log Center
Article catalogue
catalogue
preface
1, Why ElasticSearch+Kibana+Serilog?
2, Construction steps
1. Import the required Nuget package
2. Add the following code to Startup
3. Add the following configuration in appsetting
3. Build ElasticSearch+Kibana
4. Simple use of kibana
summary
preface
Because the current proj ...
Added by roze on Wed, 02 Feb 2022 03:33:26 +0200
Introduction to superset deployment, installation and use
Introduction to superset deployment, installation and use
Superset overview
Apache Superset is an open source, modern and lightweight BI analysis tool. It can connect with a variety of data sources, has rich icon display forms, supports custom dashboards, and has a friendly user interface, which is very easy to use.
Superset application scen ...
Added by EPCtech on Tue, 01 Feb 2022 16:46:34 +0200
Operation and maintenance - Practice - Basic Prometheus monitoring environment construction
Operation and maintenance - Practice (III) - Construction of basic Prometheus monitoring environment
In the previous article "building a basic Docker development environment", we have built a basic Docker environment for Linux servers, and we have made a custom network mode configuration. We can configure the specified IP for ...
Added by MarcAndreTalbot on Tue, 01 Feb 2022 16:01:37 +0200
Docker - basic commands, recommended collection!
preface
When I first saw others using Docker, I was puzzled. Why and how to use Docker? Why is Docker configuration so difficult? Why is network access blocked? And other factors hinder the author from learning Docker? In fact, the author is also very stupid. There are many points where I don't think clearly. By the way, share it.
Class hour ...
Added by php_novice2007 on Tue, 01 Feb 2022 15:36:58 +0200
3 character device driver programming
catalogue
1 miscellaneous character device
Core structure
Operation function
Miscellaneous character device registration application
2 early classic registration
Operation function
Classic device registration application
3 Linux2.6 character device
Core structure
Operation function
Linux2.6 device registration application
Linux sys ...
Added by buildernaut1 on Tue, 01 Feb 2022 06:37:38 +0200
Summary of Linux empowerment (sudo, polkit)
Summary of Linux polkit rights raising
As soon as I was about to take my annual leave, I received a regulatory vulnerability alert - "pkexec program in Linux Polkit has a privilege escalation vulnerability (vulnerability number: CVE-2021-4034). Pkexec application is a pre installed tool for Linux system, and the vulnerability affects main ...
Added by texmansru47 on Mon, 31 Jan 2022 22:18:08 +0200
Linux common instruction learning (Part 3): file search command
Tip: after the article is written, the directory can be generated automatically. Please refer to the help document on the right for how to generate it
preface
Environment and related software: VMWare 14, CentOS 7, SecureCRT.
Tip: the following is the main content of this article. The following cases can be used for reference
1, Fil ...
Added by daedlus on Mon, 31 Jan 2022 16:40:56 +0200
Partial optimization and anti-theft chain configuration of in-depth learning of nginx
1, Hide version number
1.1 method of modifying configuration file
vim /usr/local/nginx/conf/nginx.conf
http {
include mime.types;
default_type application/octet-stream;
server_tokens off; #Add close version number command
......
}
systemctl restart nginxcurl -I http://192.168.253.33
1.2 modify the sour ...
Added by acheoacheo on Mon, 31 Jan 2022 06:15:01 +0200
Linux system: permission management
Linux rights management
shell command operation principle
[yyx@VM-4-16-centos ~]$
Such a line of text is the command line, and the commands written later are called commands. Use which to view the directory where the commands we wrote are located. It can be seen that the commands under Linux are an executable file.
Generally, the operat ...
Added by sayoko on Mon, 31 Jan 2022 04:08:19 +0200