Linux learning route 2 [limit resource setting]

preface The limit parameter in Linux can generally be set by ulimit command or editing / etc / security / limits Conf reloads to make it effective ulimit is more direct, but it is only valid in the current session. Limits Conf can make the user take effect in the next login according to the user and restrictions 1, ulimit command 1.1ulim ...

Posted by EdN on Wed, 09 Feb 2022 10:52:31 +0100

Huawei operator level router configuration example | NQA for IPv4 static routing

Networking requirements When the network is relatively simple, or the router cannot establish a route to the destination network through the dynamic routing protocol, the static route can be configured. However, different from the dynamic routing protocol, the static routing itself has no detection mechanism. When the network fails, the static ...

Posted by MasK on Wed, 09 Feb 2022 01:44:09 +0100

ELK log analysis system

1, Preface overview and basic theory 1.1 ELK system introduction ELK log analysis system is composed of Elasticsearch, Logstash and Kibana Elasticsearch: open source distributed search engine. Features: distributed, zero configuration, automatic discovery, automatic index fragmentation, index copy mechanism, restful style interface, m ...

Posted by ahmedkl on Tue, 08 Feb 2022 21:10:12 +0100

docker image of enterprise operation and maintenance container

1. Hierarchical structure of image Share the kernel of the host;The base image provides the smallest Linux distribution;The same docker host supports running multiple Linux distributions;The biggest advantage of adopting hierarchical structure is: sharing resources; Copy on write writable container layer, equivalent to snapshot of virtu ...

Posted by mike97gt on Tue, 08 Feb 2022 11:47:28 +0100

Jenkins basic knowledge, java environment construction and Gitlab installation in Chapter 1 of Jenkins operation

preface 1, Continuous integration 1. Software development life cycle Software development life cycle SDLC, a collection of plans, development (code landing), testing (function test / stress test / unit test / release online) - > collect user feedback ----- > upgrade 2. Software development waterfall model Waterfall mode ...

Posted by suspect on Mon, 07 Feb 2022 20:05:03 +0100

GitLab + Jenkins + ACK Automated Deployment Scheme

From a practical point of view, this article introduces how to combine our commonly used GitLab and Jenkins to realize the automatic deployment of the project through K8s. The production architecture diagram currently used by the company is the focus of this explanation, as shown in the figure:The tools and technologies involved in this paper i ...

Posted by student101 on Mon, 07 Feb 2022 04:10:23 +0100

Summary of Linux time related knowledge: struct timeval, timespec, gettimeofday, time, localtime

preface When we are developing on linux platform, we will basically encounter time-related operations. This paper analyzes and summarizes the commonly used time-related structures and interfaces. Common types and structure definitions timespec prototype struct timespec { __time_t tv_sec; /* Seconds. second */ __syscall_slong_t tv_nsec ...

Posted by schwa97 on Sun, 06 Feb 2022 19:22:32 +0100

Freshman year -- mathematics homework (end of serial)

Description (read!me!please!!!): ① The purpose of this article is to explain that the attached code is fragment interception. Each fragment focuses on showing a function. Different fragments have omitted and overlapped parts. See GitHub for the complete project code 👌 ② Pay attention to the code comments, which can be said to be relatively d ...

Posted by ina on Sat, 05 Feb 2022 04:41:30 +0100

Emergency response learning

Intrusion detection windows I Account, process, self start ① Detection account 1. Direct analysis in Windows Open the cmd window and enter lusrmgr MSc command to check whether there is a suspicious account 2. Log analysis "eventvwr.msc #Event viewer and export Windows log -- Security #Analyze with Log Parser Typical command 1,Query th ...

Posted by TwistedLogix on Sat, 05 Feb 2022 02:54:21 +0100

linux format string vulnerability

format string vulnerability Introduction to formatting strings Common formatting string functions functionBasic introductionprintfOutput to stdoutfprintfOutput to the specified FILE streamvprintfFormat the output to stdout according to the parameter listvfprintfFormat the output to the FILE stream according to the parameter listsprintfOutpu ...

Posted by cherubrock74 on Fri, 04 Feb 2022 13:15:19 +0100