current location:Home>Technical Articles>System Tutorial>LINUX
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- Nginx link tracking for microservice architecture
- In most microservice architectures, Nginx is basically a commonly used access layer facility, so we hope that the request ID will be verified and populated from the Nginx layer and printed in the Nginx request log. Reading tip: This article does not provide a complete solution for link tracking, only a support solution for link tracking at the Nginx layer! 1 Background Introduction The birth of microservices has solved many problems of traditional monolithic applications, such as poor maintainability, poor scalability, and poor flexibility (coarse-grained comparison). Although the microservice architecture is good, it also brings many challenges, among which troubleshooting is one of the challenges that needs to be solved. So, how do you find the root cause of a failure across many applications and instances? Based on the above requirements, we can place each transaction in each
- LINUX 691 2024-08-06 16:34:49
-
- bcache system environment requirements and installation and configuration guide
- basic information
- LINUX 351 2024-08-05 22:51:52
-
- Centos 7 installation and configuration NTP network time synchronization server
- Experimental environment: OS: LinuxCentos7.4x86_641. View the current server time zone & list the time zone and set the time zone (if it is already the correct time zone, please skip it): #timedatectl#timedatectllist-timezones#timedatectlset-timezoneAsia/Shanghai2. Understanding of time zone concepts: GMT, UTC, CST, DSTUTC: The entire earth is divided into twenty-four time zones. Each time zone has its own local time. In international radio communication situations, for the sake of unification, a unified time is used, called Universal Coordinated Time (UTC). :UniversalTim
- LINUX 503 2024-08-05 22:35:12
-
- Reasons and solutions for Linux command line garbled characters: Set character encoding to solve the garbled problem
- Garbled characters on the Linux command line may be due to a mismatch in character encoding. You can try using the exportLANG=en_US.UTF-8 command to set the character encoding. Solution to Linux command line garbled characters In Linux systems, we often need to perform various operations through the command line. Sometimes we may encounter the problem of garbled characters displayed on the command line, which brings great inconvenience to our use. Red Flag Linux, this article will introduce the causes and solutions of garbled Linux command lines. Causes of garbled characters 1. The system language setting is incorrect. The Linux system supports multiple languages. If the system language setting is incorrect, the command line may display garbled characters. 2. The terminal encoding setting is incorrect. The encoding of the terminal is incorrect.
- LINUX 367 2024-08-05 20:09:01
-
- How to easily install and configure UFW firewall on your server
- When managing a server, the first thing you must configure to reduce its security is to configure a firewall. Fortunately, Linux includes a default setting called Iptables, and many people find this firewall a bit complicated to configure and manage. There are simpler alternatives available, such as UFW. UFW is actually a CLI or command line interface containing Iptables firewall for Linux, which provides us with an easier way to manage and configure Iptables. For UFW, there is even a GUI or graphical interface called GUFW that we can use on our desktop PC or laptop to manage and configure the firewall. Install UFW on the server. How to install it on linux?
- LINUX 509 2024-08-01 08:13:55
-
- The company launches a business system, fully automated one-click installation system script sharing
- 1. Background description: The company recently needed to launch several business systems and purchased 11 HP servers. Engineers from the manufacturer helped install the servers, and the system was not installed, so we had to install it ourselves. Think about the Linux shutdown command. The environment in the computer room is so cold! Therefore, it is absolutely impossible to automatically install the Linux system one by one, so I compiled a script for a fully manual one-click installation system. I tested it on both RedHat and centos7, and the verification results were successful. Please refer to the specific process. Look below! The overall process of the one-click manual installation script is as follows: the client computer starts from the network card and manually obtains the IP address from the DHCP server in the external network; manually obtains the url of the boot file; the DHCP server
- LINUX 255 2024-07-31 16:14:24
-
- Solve the problem of garbled display of graphs and charts on Zabbix Chinese monitoring server
- Zabbix's support for Chinese is not very good, but sometimes we still choose Chinese for management purposes. In the web interface monitored by Zabbix, the Chinese under the graphic icon will display small squares. This is incorrect and requires downloading fonts. For example, "Microsoft Yahei", "Microsoft Yahei.ttf" is named "msyh.ttf", upload the downloaded font to /zabbix/fonts/fonts and modify the two characters in the /zabbix/include/defines.inc.php file at define('ZBX_GRAPH_FONT_NAME','DejaVuSans');define('ZBX_FONT_NAME'
- LINUX 237 2024-07-31 14:10:17
-
- Detailed explanation of ulimit command using CentOS 6.5 as an example
- Summary: ulimit is used to limit the resources that each user can use, such as CPU, memory, handles, etc. The following takes CentOS6.5 as an example to summarize. ulimit is used to limit the resources that each user can use, such as CPU, memory, handles, etc. The following takes CentOS6.5 as an example to summarize. 1 Check the ulimit command format: ulimit[-SHacdefilmnpqrstuvx] Parameter S: Indicates soft limit. When the limit value is exceeded, an alarm will be issued. Parameter H: Indicates hard limit. The limit value must not be exceeded. Parameter a: All resource limits will be listed, such as: parameter c. : When an error occurs in some programs, the system may write the program's information in the memory into a file (for debugging). This kind of file is called
- LINUX 544 2024-07-31 11:13:02
-
- Shadow files in Linux: The key to system security
- Complete Manual of /etc/shadow File in Linux Shadow files and passwd files are generally used to perform the authentication process on Linux. Shadow files are text-based files used to store user data on a system. The most important thing is the linuxvi command, where the password is saved in encrypted or hashed format. Storing passwords in the /etc/passwd file can easily make the system insecure. Shadow files have file permissions set to 640 or 400. What will we cover? In this article, we will explain Shadow files in Linux. Why do we need shadow files? The passwd file in Linux is readable by everyone and for this purpose, it is encrypted
- LINUX 694 2024-07-31 07:36:55
-
- How to use Unetbootin to write the Linux system to a USB flash drive and perform boot settings
- There are many different Linux versions of Linux, but they all use the Linux kernel. So do you know the solution for installing the Linux system on the U disk? Next is the solution for installing the Linux system on the U disk collected by the editor. You are welcome to read: The solution for installing the Linux system on the U disk Planning work: | Unetbootin: Linux System writing tool to U disk. |BOOTICE: Boot setup tool. |Your own Linux system ISO image. |Format the U disk into FAT32 format, right-click on the U disk - low format, no tools are required. The first step is kalilinux. Use unetbootin to write the Linux system to the USB flash drive.
- LINUX 279 2024-07-31 07:13:55
-
- What should I do if the WPS missing fonts under the Linux system causes the file to be garbled?
- 1. Find the fonts wingdings, wingdings2, wingdings3, Webdings, and MTExtra from the Internet. 2. Enter the main folder, press Ctrl+h (show hidden files), and check if there is a .fonts folder. If not, create one. 3. Copy the downloaded fonts such as wingdings, wingdings2, wingdings3, Webdings, and MTExtra to the .fonts folder in the main folder. Then start wps to see if there is still a "System missing font..." reminder dialog box. If not, just Success! Notes: wingdings, wingdin
- LINUX 855 2024-07-31 00:41:34
-
- Deepin-linux operating system: a new choice for Huawei laptops, software installation guide
- 1. Introduction to Deepin-linux operating system 1.1 Official website: 1.2 Figure 11.3 Download address: Figure 22. Because Huawei computer notebooks come with deepin-linux operating system, this operating system has gradually become available to ordinary people (novices who do not understand Linux) people, including me). It is said that it is a tutorial on how to install a linux system in a domestic operating system and download a linux system image. Although it is not an exact tutorial on how to install a linux system, it is in line with the habits of Chinese people. I really like it. Figure 33. How to install software under the deepin-Linux operating system? This is crucial, right? 3.1 The Huawei laptop I bought during the Spring Festival came with the system, but it was not installed.
- LINUX 884 2024-07-31 00:06:07
-
- How to edit the /etc/passwd file using vipw command
- /etc/passwd can be edited using the vipw command. This command is also useful for editing the /etc/shadow (when used with the -s flag) and /etc/group files. To edit the /etc/passwd file, run the vipw command and select your preferred text editor when prompted. In my case, I choose Nano as shown below. sudovipw As shown in the picture on the right, after running the vipw command, the /etc/passwd file will be opened using a text editor. You can edit all arrays afterwards. In the example below, I will edit the linux-consoleuser information (last line). As you can see, the full name is LinuxH
- LINUX 545 2024-07-29 19:26:21
-
- How to install Kirin version of Linux on a laptop
- 1. Put the burned CD into the optical drive, restart the computer, boot F9 and select the CD to boot. After booting, you will enter the HPRecovery interface. Select RestoreSystemFromMedia directly and press Enter. 2. After entering the installation interface, you will first be prompted that this tool will delete all data on the entire hard disk and ask the user whether to continue. If there is data in the hard disk before, be sure to export it through other methods before this step. Select Yes to continue 3. Then there will be further confirmation that this process will delete the data. Please confirm again. Select OK to continue. 4. Then wait for about 10 minutes, and the system will be installed. Note that after the disc copy is completed, it will automatically eject. At this point, please remove the CD and hit Enter to continue.
- LINUX 391 2024-07-29 17:04:13
-
- Redis cache PHP 7.2 session variable sharing
- Generally, there are two forms of load balancing content, one is static and the other is dynamic. Dynamic website content may need to be interactive, which involves the issue of session sharing. By default, PHP stores sessions in LocalDisk. If the load is carried out between multiple PHP hosts, how to share the session? Today we will solve this problem. There are many ways to share files in a session: distributed file sharing; NFS, NAS file storage, etc. Nginx load balancing ip_hash module fixes visitors to a certain backend server. Store the session in the database; such as MySQL, Memcached, Redis, Mong
- LINUX 1107 2024-07-29 15:45:54