Linux learning route 2 [limit resource setting]
preface
The limit parameter in Linux can generally be set by ulimit command or editing / etc / security / limits Conf reloads to make it effective ulimit is more direct, but it is only valid in the current session. Limits Conf can make the user take effect in the next login according to the user and restrictions
1, ulimit command
1.1ulim ...
Posted by EdN on Wed, 09 Feb 2022 10:52:31 +0100
Huawei operator level router configuration example | NQA for IPv4 static routing
Networking requirements
When the network is relatively simple, or the router cannot establish a route to the destination network through the dynamic routing protocol, the static route can be configured. However, different from the dynamic routing protocol, the static routing itself has no detection mechanism. When the network fails, the static ...
Posted by MasK on Wed, 09 Feb 2022 01:44:09 +0100
ELK log analysis system
1, Preface overview and basic theory
1.1 ELK system introduction
ELK log analysis system is composed of Elasticsearch, Logstash and Kibana
Elasticsearch: open source distributed search engine. Features: distributed, zero configuration, automatic discovery, automatic index fragmentation, index copy mechanism, restful style interface, m ...
Posted by ahmedkl on Tue, 08 Feb 2022 21:10:12 +0100
docker image of enterprise operation and maintenance container
1. Hierarchical structure of image
Share the kernel of the host;The base image provides the smallest Linux distribution;The same docker host supports running multiple Linux distributions;The biggest advantage of adopting hierarchical structure is: sharing resources;
Copy on write writable container layer, equivalent to snapshot of virtu ...
Posted by mike97gt on Tue, 08 Feb 2022 11:47:28 +0100
Jenkins basic knowledge, java environment construction and Gitlab installation in Chapter 1 of Jenkins operation
preface
1, Continuous integration
1. Software development life cycle
Software development life cycle SDLC, a collection of plans, development (code landing), testing (function test / stress test / unit test / release online) - > collect user feedback ----- > upgrade
2. Software development waterfall model
Waterfall mode ...
Posted by suspect on Mon, 07 Feb 2022 20:05:03 +0100
GitLab + Jenkins + ACK Automated Deployment Scheme
From a practical point of view, this article introduces how to combine our commonly used GitLab and Jenkins to realize the automatic deployment of the project through K8s. The production architecture diagram currently used by the company is the focus of this explanation, as shown in the figure:The tools and technologies involved in this paper i ...
Posted by student101 on Mon, 07 Feb 2022 04:10:23 +0100
Summary of Linux time related knowledge: struct timeval, timespec, gettimeofday, time, localtime
preface
When we are developing on linux platform, we will basically encounter time-related operations. This paper analyzes and summarizes the commonly used time-related structures and interfaces.
Common types and structure definitions
timespec
prototype
struct timespec
{
__time_t tv_sec; /* Seconds. second */
__syscall_slong_t tv_nsec ...
Posted by schwa97 on Sun, 06 Feb 2022 19:22:32 +0100
Freshman year -- mathematics homework (end of serial)
Description (read!me!please!!!):
① The purpose of this article is to explain that the attached code is fragment interception. Each fragment focuses on showing a function. Different fragments have omitted and overlapped parts. See GitHub for the complete project code 👌
② Pay attention to the code comments, which can be said to be relatively d ...
Posted by ina on Sat, 05 Feb 2022 04:41:30 +0100
Emergency response learning
Intrusion detection
windows
I Account, process, self start
① Detection account
1. Direct analysis in Windows
Open the cmd window and enter lusrmgr MSc command to check whether there is a suspicious account 2. Log analysis
"eventvwr.msc #Event viewer and export Windows log -- Security
#Analyze with Log Parser
Typical command
1,Query th ...
Posted by TwistedLogix on Sat, 05 Feb 2022 02:54:21 +0100
linux format string vulnerability
format string vulnerability
Introduction to formatting strings
Common formatting string functions
functionBasic introductionprintfOutput to stdoutfprintfOutput to the specified FILE streamvprintfFormat the output to stdout according to the parameter listvfprintfFormat the output to the FILE stream according to the parameter listsprintfOutpu ...
Posted by cherubrock74 on Fri, 04 Feb 2022 13:15:19 +0100