Linux learning basics chapter Linux basic permissions
Authority meaning
We all know that using ls -l can view file or directory information, including file permissions, such as the permission "lrwxrwxrwx." of "/ bin" below, These eleven bits are usually called permission bits, and the last "." It was added after RedHat 6, so what is the meaning of these eleven ex ...
Added by zeberdeee on Sat, 08 Jan 2022 06:52:07 +0200
[one Linux command per day] detailed usage of wget command
Linux wget is a tool for downloading files. It is used on the command line. It is an essential tool for Linux users, especially for network administrators. They often have to download some software or restore and back up from the remote server to the local server. If we use a virtual host to handle such transactions, we can only download it fro ...
Added by Paul1893 on Thu, 06 Jan 2022 17:03:59 +0200
Handling of common operation and maintenance faults of drbd
Introduction to drbd
1. What is DRBD? DRBD (Distributed Replicated Block Device) is a software implemented, non shared storage and replication solution that mirrors the contents of block devices between servers. DRBD is a mirror block device that mirrors the same data block by data bit.
2. Difference between DRBD and RAID1 RAID1 also real ...
Added by IWS on Thu, 06 Jan 2022 12:53:43 +0200
Kubernetes cluster deployment - ingress,ingress controller
I. ingress
1 ingress
Ingress is an API object that manages the external access of services in the cluster. The typical access method is HTTP.
Ingress provides load balancing, SSL finalization, and name based virtual hosting
1.1 description
Node( Node): Kubernetes One of the working machines in the cluster is a part of the cluster. ...
Added by codersrini on Thu, 06 Jan 2022 01:07:32 +0200
Linux - Basic command usage
Linux -- basic command usage (Part 2)
1, linux user
1. What are users
Users are used to run some processes and own some files or directories. In Linux, users are divided into three categories: root user , system users, ordinary users. The user is uniquely identified by UID, and the root user UID is 0. The system user UID range is 1-999. The ...
Added by _spaz on Wed, 05 Jan 2022 20:36:17 +0200
Zookeeper high availability cluster & distributed message queue Kafka | Cloud computing
1. Set up zookeeper cluster
1.1 problems
This case requires:
Set up zookeeper cluster1 leader2 follower s1 observer
1.2 steps
To implement this case, you need to follow the following steps.
Step 1: install Zookeeper
1) Edit / etc/hosts and all cluster hosts can ping each other (configured on Hadoop 1 and synchronized to node-0001, ...
Added by biohazardep on Wed, 05 Jan 2022 11:08:14 +0200
Manually deploy OceanBase three-copy cluster
Manually deploy ob triple-copy cluster
1. IP Address and Machine Planning
Machine os:centos 7.5 8c12g
IP Addresshost nameMachine RoleExplain192.168.32.111obce01observer+obproxy192.168.32.112obce02observer192.168.32.113obce03observer+obproxy192.168.32.114obce04observerAdd, Expand192.168.32.115obce05observer+obproxyAdd, Expand
Note: The machin ...
Added by Springroll on Wed, 05 Jan 2022 11:06:50 +0200
LINUX learning basic chapter directory operation command
Command basic format
command prompt
[root@localhost ~]#
root: represents the currently logged in user.Localhost: short host name of the current system (use the "hostname" command to view the full host name: localhost.localdomain)~: represents the current directory, the tilde represents the home directory, the super user home ...
Added by harishkumar09 on Wed, 05 Jan 2022 09:52:39 +0200
shell programming tutorial
I Format of shell script file
shell script file generally consists of three parts: interpreter, command code and comments.
[root@server ~]# cat test
#!/bin/bash
<<notes
Here are multiline comments
notes
echo 'hello world'
# Here is a single line comment
echo valar morghulis
[root@server ~]# sh test
hello world
valar morghulis
The fi ...
Added by PHPisFUN on Wed, 05 Jan 2022 09:22:41 +0200
How to use linux qemu
catalogue
1, Operation mode of QEMU
2, QEMU executes programs in user mode
3, System mode usage of QEMU
1, Operation mode of QEMU
He directly excerpted his "uncover home router 0day vulnerability mining technology", checked it online and found no satisfactory QEMU instructions, so he adopted the introduction in this book. If you ...
Added by koddos on Wed, 05 Jan 2022 07:09:20 +0200