sersync+rsync real-time backup of conference data

The original scheme of linux is inotify+rsync to realize real-time data backup; inotify monitors the file system under linux at the linux kernel level, and records the open/access/modify operations of files; inotify has two shortcomings: rsync takes up too many resources due to the combination of rsync and rsync files. 1. It takes too long t ...

Posted by bav on Wed, 23 Feb 2022 13:29:37 +0100

[ServiceMesh] VirtualService implements Istio advanced traffic management

1, VirtualService (rich routing control) 1.1 URL redirection (redirect and rewrite) Redirect: redirect.Rewrite: that is, rewrite. It can not only redirect redirect on the url, but also directly rewrite the actual file of the request channel and more additional functions. 1.1.1. Case illustration proxy-gateway -> virtualservices/proxy - ...

Posted by ricroma on Wed, 23 Feb 2022 11:36:40 +0100

MySql master-slave separation

Master-slave database theoretical knowledge First step The master's operations on the data are recorded in the Binary log. Before each transaction updates the data, the master records these changes and writes them to the Binary log serially. After completing the log writing, the master notifies the storage engine to commit the transaction. T ...

Posted by telefiend on Wed, 23 Feb 2022 03:45:15 +0100

[Linux] process control -- process waiting and replacement

Process waiting 1. Necessity of process waiting ·We have previously introduced the zombie process, that is, when the child process exits, the parent process does not receive the exit status information of the child process. At this time, the child process becomes a zombie process, resulting in memory leakage. Once the process bec ...

Posted by pp4sale on Tue, 22 Feb 2022 15:12:09 +0100

PowerShell – get memory usage

Many times, PowerShell administrators must manually scan the server to see the performance problems of the server in the network. This can happen when one of the servers is not responding or unresponsive and causes performance problems on the related servers. In this case, knowing the memory usage of the server will help determine which particu ...

Posted by antonello on Mon, 21 Feb 2022 23:56:42 +0100

13, Configure and protect SSH services

13, Configure and protect SSH services This section describes how to configure and protect SSH services. As a service that must be understood in the foundation, it needs to be well mastered both in principle and operation. SSH is basically used for remote management in work. This column will cover the entire RHCSA certification: Addre ...

Posted by sgs on Mon, 21 Feb 2022 17:05:21 +0100

Linux tutorial (manual): concepts that Linux beginners must understand (common commands and operation analysis)

Recently, I plan to publish some articles on the use of basic commands of terminals under Linux. If you can use Linux, these articles can be used as a manual. If you've never been in touch with Linux readers, it's just right to see that there's nothing wrong (from getting started to giving up the series). I intend to write a TLDR at the begin ...

Posted by ayampanggang on Mon, 21 Feb 2022 16:41:34 +0100

DNS tunnel attack experiment record

It's time for bloggers to finish setting up. Because the data sets required by bloggers in the direction of setting up are rarely publicly provided (after all, DNS records have some privacy problems), they have to simulate DNS attacks to operate by themselves. First of all, if you want to know what is DNS tunnel attack, you can take a look at o ...

Posted by bobbfwed on Mon, 21 Feb 2022 13:51:25 +0100

Emergency response intrusion investigation Part II Linux

0x00 introduction In case of hacker intrusion, system crash or other security events affecting the normal operation of business, it is urgent to deal with them at the first time, so that the enterprise's network information system can resume normal operation in the shortest time, further find the source of intrusion, restore the process of ...

Posted by healy787 on Mon, 21 Feb 2022 08:11:05 +0100

Build mysql5 in CentOS 7.5 Intranet environment seven point three six

1, Configure local yum source For Intranet environment, first configure the local yum source to solve the dependent installation of MySQL. For details, refer to this article: Click Open 2, View server environment cat /etc/redhat-release III. go to the official website to download mysql installation package Click Open (1) Select versi ...

Posted by Navajo on Mon, 21 Feb 2022 07:34:48 +0100