Deploy YUM warehouse and NFS shared services

I. overview of YUM 1. Introduction to Yum warehouse Software update mechanism of YuMe... za ● software update mechanism based on RPM package ● dependencies can be resolved automatically ● all software packages are provided by the centralized YUM software warehouse yum is a software update mechanism based on RPM package (short for red hat ...

Posted by jil on Thu, 30 Sep 2021 17:19:04 -0700

Nginx -- nginx module

preface Nginx module is a great advantage of nginx compared with apache. The module can provide more functions for nginx to meet the daily needs of operation and maintenance. When there are some requirements, we just need to compile a new module and restart nginx. 1, Common nginx web modules 1. Random Homepage_ index_ module (1)mkd ...

Posted by qteks200 on Thu, 30 Sep 2021 15:53:46 -0700

Seven ways to read Linux text files

Linux text file reading describe Text viewing and reading of any operating system is the most basic function; There are mainly seven commands (cat/tac/nl/more/less/head/tail) involved in text reading in linux system cat command Command purpose Read all information from the fileLink and print the contents of multiple files to standa ...

Posted by Frag on Thu, 30 Sep 2021 12:00:56 -0700

Linux learning notes

1.1 introduction to Linux Unix is a powerful multi-user and multi task operating system developed in Bell Labs of at & T in 1969. The trademark right of UNIX is owned by The Open Group. UNIX operating system is commercial and charged, and the price is a little more expensive than Microsoft Windows. Linux is a UNIX like operating system ...

Posted by mrcaraco on Wed, 29 Sep 2021 14:59:13 -0700

Use of docker command

1,Docker Docker is an open source application container engine, which is based on Go language and complies with Apache 2.0 protocol.Docker allows developers to package their applications and dependent packages into a lightweight and portable container, and then publish them to any popular Linux On the machine, virtualization can also be real ...

Posted by AbraCadaver on Wed, 29 Sep 2021 11:29:51 -0700

Deep understanding of Linux file system and log analysis

Deep understanding of Linux file system and log analysis 1, inode and block overview File data includes meta information and actual data Files are stored on the hard disk. The minimum storage unit of the hard disk is "sector", and each sector stores 512 bytes Block Eight consecutive sectors form a block Is the smallest u ...

Posted by yacaph on Mon, 27 Sep 2021 06:24:25 -0700

[Prometheus] from getting started to giving up - Basic Installation - Prometheus Server

Environmental description: Centos 7.9 x86_64 The command is executed under root #1 download the installation package of Prometheus website: https://prometheus.io/download/ The page is as follows: Select the corresponding version and download it. At present, it seems that there is no rpm package deployed on Centos, so we ne ...

Posted by xpherism on Mon, 27 Sep 2021 02:12:05 -0700

Complete operation commands of Docker's container, image and image Warehouse Center

This article introduces the operation parameters of Docker, including the operation commands for container, image and registry. Tips: This article comes from Learn Docker + K8S from BAT technical experts special column. 1. Container operation Common operation commands related to Docker and container are as follows: run docker run is u ...

Posted by hopelessX on Sun, 26 Sep 2021 17:30:32 -0700

Detailed tutorial on nginx function construction

1, Access control Authentication access based on user name and password Server configuration vim /usr/local/nginx/conf/nginx.conf Add under the location to be verified, taking the root region as an example location / { root html; index index.html index.htm; #Add the following two lines auth_basic "welcome you here"; auth_basic_us ...

Posted by sawade on Sat, 25 Sep 2021 18:07:10 -0700

Openssh remote control nfs network system files

Openssh 1, Introduction to Openssh OpenSSH is a free open source implementation of SSH (Secure SHell) protocol. SSH protocol family can be used for remote control or transfer files between computers. The traditional methods to realize this function, such as telnet (terminal emulation protocol), RCP, FTP, rlogin and rsh, are extremely insecure, ...

Posted by AoA_Falcon on Sat, 25 Sep 2021 04:26:13 -0700