Linux learning basics chapter Linux basic permissions

Authority meaning We all know that using ls -l can view file or directory information, including file permissions, such as the permission "lrwxrwxrwx." of "/ bin" below, These eleven bits are usually called permission bits, and the last "." It was added after RedHat 6, so what is the meaning of these eleven ex ...

Added by zeberdeee on Sat, 08 Jan 2022 06:52:07 +0200

[one Linux command per day] detailed usage of wget command

Linux wget is a tool for downloading files. It is used on the command line. It is an essential tool for Linux users, especially for network administrators. They often have to download some software or restore and back up from the remote server to the local server. If we use a virtual host to handle such transactions, we can only download it fro ...

Added by Paul1893 on Thu, 06 Jan 2022 17:03:59 +0200

Handling of common operation and maintenance faults of drbd

Introduction to drbd 1. What is DRBD? DRBD (Distributed Replicated Block Device) is a software implemented, non shared storage and replication solution that mirrors the contents of block devices between servers. DRBD is a mirror block device that mirrors the same data block by data bit. 2. Difference between DRBD and RAID1 RAID1 also real ...

Added by IWS on Thu, 06 Jan 2022 12:53:43 +0200

Kubernetes cluster deployment - ingress,ingress controller

I. ingress 1 ingress Ingress is an API object that manages the external access of services in the cluster. The typical access method is HTTP. Ingress provides load balancing, SSL finalization, and name based virtual hosting 1.1 description Node( Node): Kubernetes One of the working machines in the cluster is a part of the cluster. ...

Added by codersrini on Thu, 06 Jan 2022 01:07:32 +0200

Linux - Basic command usage

Linux -- basic command usage (Part 2) 1, linux user 1. What are users Users are used to run some processes and own some files or directories. In Linux, users are divided into three categories: root user , system users, ordinary users. The user is uniquely identified by UID, and the root user UID is 0. The system user UID range is 1-999. The ...

Added by _spaz on Wed, 05 Jan 2022 20:36:17 +0200

Zookeeper high availability cluster & distributed message queue Kafka | Cloud computing

1. Set up zookeeper cluster 1.1 problems This case requires: Set up zookeeper cluster1 leader2 follower s1 observer 1.2 steps To implement this case, you need to follow the following steps. Step 1: install Zookeeper 1) Edit / etc/hosts and all cluster hosts can ping each other (configured on Hadoop 1 and synchronized to node-0001, ...

Added by biohazardep on Wed, 05 Jan 2022 11:08:14 +0200

Manually deploy OceanBase three-copy cluster

Manually deploy ob triple-copy cluster 1. IP Address and Machine Planning Machine os:centos 7.5 8c12g IP Addresshost nameMachine RoleExplain192.168.32.111obce01observer+obproxy192.168.32.112obce02observer192.168.32.113obce03observer+obproxy192.168.32.114obce04observerAdd, Expand192.168.32.115obce05observer+obproxyAdd, Expand Note: The machin ...

Added by Springroll on Wed, 05 Jan 2022 11:06:50 +0200

LINUX learning basic chapter directory operation command

Command basic format command prompt [root@localhost ~]# root: represents the currently logged in user.Localhost: short host name of the current system (use the "hostname" command to view the full host name: localhost.localdomain)~: represents the current directory, the tilde represents the home directory, the super user home ...

Added by harishkumar09 on Wed, 05 Jan 2022 09:52:39 +0200

shell programming tutorial

I Format of shell script file shell script file generally consists of three parts: interpreter, command code and comments. [root@server ~]# cat test #!/bin/bash <<notes Here are multiline comments notes echo 'hello world' # Here is a single line comment echo valar morghulis [root@server ~]# sh test hello world valar morghulis The fi ...

Added by PHPisFUN on Wed, 05 Jan 2022 09:22:41 +0200

How to use linux qemu

catalogue 1, Operation mode of QEMU 2, QEMU executes programs in user mode 3, System mode usage of QEMU 1, Operation mode of QEMU He directly excerpted his "uncover home router 0day vulnerability mining technology", checked it online and found no satisfactory QEMU instructions, so he adopted the introduction in this book. If you ...

Added by koddos on Wed, 05 Jan 2022 07:09:20 +0200