Linux mail server deep learning
Email sending process
E-mail is a kind of information transmission behavior that uses the network to transmit information to remote servers. We usually use "account @ host name" for e-mail. However, due to "malicious mail" and "spam flooding", we are not allowed to directly use the host's ip address to send mail. ...
Posted by Cazrin on Sun, 02 Jan 2022 15:27:24 +0100
Performance analysis from IO to specific files
1. Overview
Performance analysis of IO has always been one of the focuses of performance analysis, and the idea of analysis is:
With clear logic in the code, you can completely know which files are read and written frequently. But for performance analysts, it's often a system that's not written by them, or sometimes produced by multiple ...
Posted by ro1960 on Sun, 02 Jan 2022 15:04:15 +0100
Enterprise operation and maintenance practice k8s (container resource limitation and resource monitoring) must be seen by beginners, praise and pay attention to the later stage
k8s container resource limit
Memory limit example
If the container exceeds its memory limit, it is terminated. If it is restartable, kubelet will restart it like all other types of runtime failures.
If a container exceeds its memory request, its Pod may be evicted when the node is out of memory.
vim memory.yaml
apiVersion: v1
kind: Pod ...
Posted by stopblackholes on Sun, 02 Jan 2022 14:34:06 +0100
Linux SPI Bus-SPI Universal Interface Layer
1. Introduction
As you can see from previous blogs, the SPI Universal Interface Layer is a middle layer, which provides a series of standard interface API s and standard data structures for protocol and controller drivers. So the SPI Universal Interface Layer is a core layer of the SPI bus.
The SPI Common Interface Layer code is focused on: / ...
Posted by beefy23 on Sun, 02 Jan 2022 13:46:29 +0100
Iptables Typical application of firewall & filter table control & NAT table | Cloud computing
1. iptables basic management
1.1 problems
This case requires you to practice the use of iptables command and complete the following tasks as required:
Close firewalld and start iptables serviceView firewall rulesAppend and insert firewall rulesDelete and clear firewall rules
1.2 scheme
iptables firewall has 4 tables and 5 chains, 4 t ...
Posted by ATLien on Sun, 02 Jan 2022 05:10:49 +0100
Introduction to Docker Basics
Introduction to Docker
I Docker introduction
www.docker.com
1.1 INTRODUCTION
1. Docker
Docker Is an open source application container engine based on Go Language and compliance Apache2.0 Open source agreement.
Docker Developers can package their applications and dependency packages into a lightweight and portable container, and then ...
Posted by redrabbit on Sat, 01 Jan 2022 22:26:47 +0100
Elasticsearch7.0 of Linux system 6.1 cluster installation and Kibana, ik and elasticsearch head installation
catalogue
I. elasticsearch7 6.1 installation steps
II. Install kibana client (all three machines should be installed. Ordinary users should perform the following operations)
III. install IK word splitter (ordinary user operation)
4. Install elasticsearch head plug-in (all three machines need to be operated. Ordinary users need ccb operation ...
Posted by Jack_Slocum on Sat, 01 Jan 2022 16:19:28 +0100
Introduction and use of 382 Jason
Introduction and use of Jason
Json is a lightweight data exchange format (also known as data serialization). Json uses a text format completely independent of the programming language to store and represent data. The concise and clear hierarchy makes Json an ideal data exchange language. It is easy for people to read and write, easy for machin ...
Posted by jmaker on Sat, 01 Jan 2022 14:44:02 +0100
tcpdump of Linux commands
summary
tcpdump is a packet capture tool for intercepting network packets and outputting packet contents, similar to wireshark in window.
It is the preferred tool for network analysis and troubleshooting under Linux system
Ordinary users cannot execute. Only users with root permission can execute
We can use tcpdump to grab packets
principle
C ...
Posted by andynick on Sat, 01 Jan 2022 14:13:42 +0100
Linux Network IPC: introduction and use of Socket socket
Communication between different hosts: ❤️
The concept of process communication originated from single machine system. Since each process runs within its own address range, the operating system provides corresponding facilities for process communication to ensure that two processes communicating with each other do not interfere with each o ...
Posted by tyson on Sat, 01 Jan 2022 13:38:37 +0100