Huawei ECS elastic server cloud disk (CentOS 7) installation series data disk installation

In the last article, we talked about how to expand the system disk of the elastic server. In this article, we talked about how to install the data disk. First, we need to click buy disk in the console of Huawei cloud account, and then follow the prompts to buy a cloud disk. Note: the cloud disk purchased must be in the same area as the server t ...

Posted by StefanRSA on Thu, 21 Apr 2022 07:15:45 +0300

docker - install and deploy K8S cluster

kubernetes In Greek, it means captain or navigator Before the container technology, if multiple applications are running on the physical server, one application may occupy most of the resources, which may lead to the performance degradation of other applications. One solution is to run each application on different physical servers, but it ca ...

Posted by kevinn on Thu, 21 Apr 2022 05:24:35 +0300

Second week study

1, Describe the naming rules and purpose of the system directory name of the Linux distribution Naming rules of linux system directory: 1. Use LSB (Linux Standard Base) hierarchy 2. Follow FHS (File System Hierarchy Standard) standard 3. The file system starts from the root directory "/" 4. The maximum length of the file name is 255 b ...

Posted by DevXen on Thu, 21 Apr 2022 04:26:58 +0300

Basic concepts of embedded Linux partition

background Partition is a means of dividing the disk into regions. By saving the starting address, size and other information to the partition table, the disk can be divided into several regions for storing different contents. The use of partitions can not only make the system file entries clear, compatible with multiple file systems and moun ...

Posted by mlla2 on Wed, 20 Apr 2022 23:55:15 +0300

k8s cluster deployment is applicable to both internal and external cloud servers

Prepare the environment Linux CentOS 7.x two or more, 7.6 used in this paper explain The default configuration in this paper is in the Intranet environment, that is, the server is in the same LAN environment, and the differential configuration of the external network is additionally marked with [difference - serial number]. You can see ...

Posted by palpie on Wed, 20 Apr 2022 23:21:36 +0300

Chapter 17 understanding system services (daemons)

What is daemon and service Service is the embodiment of function. Daemon is the process of implementing services. There is usually no need to make a detailed distinction between the two. Daemon is a program after the program is executed. The name of daemon itself is usually added with d after the name of the service. This D means "dae ...

Posted by stevehaysom on Wed, 20 Apr 2022 21:35:17 +0300

User and file permissions

User identity Administrator: UID is 0. Administrator of the system. Unique ID, 0 is the administrator System user: UID is 1-999. You cannot log in to the server. You can only call the service program Ordinary user: UID starts from 1000. Users created by administrators to complete daily work Tip: redhat5/6 system user: 1-499, ordinary user: 500 ...

Posted by harinath on Wed, 20 Apr 2022 14:21:14 +0300

Exploitation and demonstration of vulnerability ms10-018

Exploitation and demonstration of vulnerability ms10-018 Today we will not learn C (just released two articles) to see the vulnerabilities and utilization of ie browser. The tools we use are: 1. A small white one ready to go 2. A Linux host (for example, kali, I used manjaro in my demonstration, and added the source of black arch. I will ha ...

Posted by Sianide on Tue, 19 Apr 2022 13:35:07 +0300

Of interprocess communication -- anonymous pipeline

1. Overview Anonymous pipeline is used for the communication between related processes. The word of pipeline is like its name. It is like laying a pipeline between two processes, and the processes interact with each other through the pipeline. The nameless pipeline has no name. It is created by the pipe or pipe2 function. The corresponding one ...

Posted by FluxNYC on Tue, 19 Apr 2022 09:05:37 +0300

awk command of Linux three swordsmen

awk is a pattern scanning and processing language. It is a very powerful document editing tool. It can process files not only in behavior units, but also in columns. Let's learn it from the following three aspects: Format explanation Simple practice Advanced practice 1, Format explanation 1. Command format awk [parameter] '[action]' [file na ...

Posted by garydt on Tue, 19 Apr 2022 07:58:08 +0300