Week 3, Text Processing Tools, shell Scripting
Text Processing Tools
1,cut
-d Specifies the separator.For example, -d: -d''
-f Specifies which column to choose.For example, -f1,3
--output-delimiter specifies the separator to display
Tr-s compression-d deletion-c except
2. Percentage of disks fetched using tr and cut
[root@glowing-bliss-1 data]# df -h | tr -s ' ' | cut -d' ' -f5 | tr -dc ...
Posted by ozone1 on Sun, 04 Aug 2019 18:29:17 +0200
Linux system: Elastic Search middleware built under centos7, common interface demonstration
Introduction of Middleware
1. Basic concepts
Elastic Search is a Lucene-based search server. It provides a full-text search engine with distributed multi-user capabilities, based on RESTful web interface. Elastic search is a popular enterprise search engine developed in Java and released as open source under Apache license.
2. Distributed datab ...
Posted by justice1 on Sat, 03 Aug 2019 15:16:46 +0200
Nginx + Docker Manual Cluster Run EMQ
In the process of supporting customers, EMQ X learns that customers use Nginx for load balancing and that the Docker container manually joins the cluster to run the EMQ cluster. The main process is now recorded.
Business Requirements
Use Nginx as a reverse proxy
Nginx needs to assign the address of the proxy server in advance
Run EMQ using Doc ...
Posted by kishore_marti on Sat, 03 Aug 2019 05:14:43 +0200
Let's work together on a simple and rough grid layout control for the main interface of Tv applications!
This post has been really a long time ~~, and finally I can take a breath to write a good blog, this time is really busy, iteration is too tight.Okay, let's skip the crap and get to today's topic.
Effect
Fig. 1 Tv application: the home page of DangBei Market
Figure 2 is our own simple and rough Tv application main int ...
Posted by Blackwind on Wed, 31 Jul 2019 18:55:39 +0200
POJ 1236 Network of Schools
POJ 1236 Network of Schools )
subject
The topic is very long. In fact, the meaning of the topic is very simple. Give a digraph and ask
You can walk through the whole picture from at least a few points
Adding at least a few edges can make the graph strongly connected
Analysis
Direct Tarjian Tarji ...
Posted by mourisj on Wed, 31 Jul 2019 18:19:29 +0200
How to modify the network card name of CentOS 7.6
1. Background introduction
In centos5, we used to name network devices like eth0. In centos6, we found that network devices had changed to em1. In version 7 of CentOS, we redefined the naming rules of network cards. Therefore, the modification of this naming rules still makes many people feel headache and unable to adapt to this random naming ...
Posted by bluemonster on Wed, 31 Jul 2019 17:20:55 +0200
Data Construction of Credit Card Scoring Model
Construction of Credit Card Scoring Model
Background description
At present, the total balance of user's age, credit card and personal credit line, the borrower's overdue in the past two years, forecast whether the borrower will anticipate the number of times, monthly income, debt ratio, family memb ...
Posted by djpic on Wed, 31 Jul 2019 10:41:06 +0200
Analysis of UDP Data Transferred by python Meteorological Equipment-Notes
Articles Catalogue
Background
II. Summary of Contents
2.1 Creation of UDP Communication Server
** DUP uses connectionless sockets**
2.2 16-digit data parsing
2.3 File Creation and Data Storage Analysis
Background
Recently, in a company's equipment, the built-in DTU sends 16-digit data messages ...
Posted by BSlepkov on Wed, 31 Jul 2019 08:06:39 +0200
Network Chat Room Based on Socket Programming
1. Project Profile:
Network Chat Room Based on Socket Programming
2. Functional description:
Multi-user registration, group distribution and private chat can be implemented:
3. Specific implementation process:Client implementation process:
1. The functions of the client can be further refined as follow ...
Posted by Bramme on Tue, 30 Jul 2019 22:06:13 +0200
< center>javascript proxy mode </center >
The so-called proxy pattern is to find a substitute object for an object in order to access the original object.
The reason why we use proxy is that we don't want or want to operate directly on the original object. We use proxy is to let it do a series of operations for the original object. After these ...
Posted by Oxymen on Tue, 30 Jul 2019 16:37:38 +0200