50 Knowledgeable Linux Command Techniques

1. Vim automatically adds annotations and intelligently changes lines #vi ~/.vimrc set autoindent set tabstop=4 set shiftwidth=4 function AddTitle() call setline(1,"#!/bin/bash") call append(1,"#====================================================") call append(2,"# Author: lizhenliang") call append(3,"# Create Date: " . strftime("%Y-%m-%d")) ...

Posted by lessthanthree on Wed, 09 Oct 2019 10:31:55 +0200

Vulnerability Environment Construction and Testing of CVE-2018-2893

Build a vulnerability environment (attacked) Install weblogic 10.3.6.0 Close windows Firewall Open the installation package and proceed until the following interface appears Then go on to the next step. Upon completion of installation        Go to C: Oracle Middleware user_projects ...

Posted by sliilvia on Tue, 08 Oct 2019 23:56:09 +0200

"F5 Connects NetOps/SecOps and DevOps" - - "5" Application Services 3 Extension

This paper mainly introduces the use of the third declarative component, Application Services 3 Extension (hereinafter referred to as AS3). AS3 provides a declarative way to configure the L4-L7 configuration of F5 BIGIP, including the configuration of LTM, DNS, AFM, ASM and other modules. It supports the configuration of multi-tenant and multi ...

Posted by mickfitz on Mon, 07 Oct 2019 12:26:09 +0200

Elastic search cluster building

Environment and Software centos7 elasticsearch 7.4.0 Because ES7 already has the JDK version of the required java built-in, the java installation is not introduced here. ES7 installation mode uses RPM installation mode. es node list ip Node name 192.168.1.100 es-node-master-01 192.168.1.101 es-node-master-02 192.168.1.102 es-node-mas ...

Posted by thomasgrant on Mon, 07 Oct 2019 04:14:21 +0200

Detailed description of hot standby configuration file for keepalived dual computers

Configuration example: https://blog.51cto.com/14227204/24389021. The working principle and function of keepalived: At first, keepalived was a powerful auxiliary tool designed specifically for LVS. It was mainly used to provide fault switching and health checking functions - to judge the availability of LVS load dispatcher and node server, to i ...

Posted by Lphp on Wed, 18 Sep 2019 09:18:31 +0200

A Brief Talk on proxy Agent Model <The Most Popular and Easy-to-understand Explanation>

I. Preface A proxy is an intermediary who accepts requests from the requester instead of the server. We've also heard of proxy servers, which help clients to request resources they want. Why do they use proxy? That's because clients can not access servers directly (firewall shielding), while proxy servers can access servers directly. Clients c ...

Posted by salim on Wed, 18 Sep 2019 07:13:04 +0200

firewalld firewall infrastructure configuration

Linux firewall system mainly works in the network layer. It belongs to the typical packet filtering firewall for real-time filtering and restriction of TCP/IP packets. How does the Linux firewall check data traffic? For the data packet entering the s ...

Posted by Toxinhead on Sun, 01 Sep 2019 12:53:53 +0200

PXE batch deployment

Deployment of PXE brief introduction What is PXE? 1. PXE is the abbreviation of Preboot Execution Environment, which is called Preboot Execution Environment. 2. A network protocol designed by Intel enables the computer to start the installation system through the network. 3. It is a mechanism to start a computer with network interface, which d ...

Posted by reckdan on Wed, 21 Aug 2019 17:13:38 +0200

Centos7 upgrades openssh to OpenSSH_8.0p1

Basic environment CentOS Linux release 7.6.1810 (Core) OpenSSH_7.9p1, OpenSSL 1.0.2k-fips 26 Jan 2017 Upgrade preparation Open the file transfer tool (such as xftp) while opening the ssh connection tool (such as xshell). Because the upgrade process cannot create new connections for the need to up ...

Posted by htcilt on Tue, 13 Aug 2019 10:00:21 +0200

roles of Ansible Automation Operation and Maintenance

Articles Catalogue Introduction to Ansible roles roles directory structure Create roles Give an example Use roles to install and open httpd services for the host, and add httpd to the firewall list haproxy deployment (load balancing) Implementation of keeping alive + haproxy high availability ...

Posted by zeb on Mon, 12 Aug 2019 11:19:52 +0200