The Linux Commands Handbook
folder1 folder2 -name filename.txt 23 Find directories under the current tree matching the name "node_modules" or 'public': You can also exclude a path, using -not -path : You can search files that hours: find . -type f -mtime -1 -delete find . -type d -name node_modules -or -name public find . -type d -name '*.md' -not -path 'node_modules 24 You can execute a command on each result of the string: If you run basename on a path string that points to a directory, you will get the last segment of the path. In this example, /Users/flavio is a directory: 74 dirname Suppose you have a path0 码力 | 135 页 | 14.14 MB | 1 年前3
The Linux Commands Handbook
the name "node_modules" or 'public': find . -type d -name node_modules -or -name public 17 You can also exclude a path, using -not -path : find . -type d -name '*.md' -not -path 'node_modules/*' string: 60 If you run basename on a path string that points to a directory, you will get the last segment of the path. In this example, /Users/flavio is a directory: 33. dirname Suppose you have a path Operating System name. r prints the release, v prints the version: 105 The n option prints the node network name: The a option prints all the information available: 106 On macOS you can also use0 码力 | 112 页 | 13.74 MB | 1 年前3
This Debian Reference (version 2.109) Reference 9 / 238 character meaning - normal file d directory l symlink c character device node b block device node p named pipe s socket Table 1.4: List of the first character of ”ls -l” output • Name a major disaster. So be cautious. Note For the normal access to a printer, use lp(1). The device node number are displayed by executing ls(1) as the following. $ ls -l /dev/sda /dev/sr0 /dev/ttyS0 /dev/zero facilitate this need. shell glob pattern description of match rule * filename (segment) not started with ”.” .* filename (segment) started with ”.” ? exactly one character […] exactly one character with0 码力 | 266 页 | 1.25 MB | 1 年前3
Cilium v1.9 Documentationpackets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts EDT-based (Earliest Departure Time) rate-limiting with eBPF for container traffic that is egressing a node. This allows to significantly reduce transmission tail latencies for applications and to avoid locking0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.5 DocumentationTroubleshoo�ng Monitoring & Metrics Exported Metrics Cilium as a Kubernetes pod Cilium as a host-agent on a node Troubleshoo�ng Component & Cluster Health Connec�vity Problems Policy Troubleshoo�ng Automa�c Diagnosis network packets emi�ed by the applica�on containers, allowing to validate the iden�ty at the receiving node. Security iden�ty management is performed using a key-value store. Secure access to and from external This means that each host can allocate IPs without any coordina�on between hosts. The following mul� node networking models are supported: Overlay: Encapsula�on based virtual network spawning all hosts.0 码力 | 740 页 | 12.52 MB | 1 年前3
Debian Referenz v2.124Zeichen Bedeutung - normale Datei d Verzeichnis l symbolischer Link c Geräte-Node für zeichenorientierte Geräte b Geräte-Node für blockorientierte Geräte p benannte Pipe (named pipe) s Socket Tabelle auf der Hut. Anmerkung Für den normalen Zugriff auf den Drucker verwenden Sie lp(1). Die Geräte-Node-Nummer wird angezeigt, indem Sie ls(1) wie folgt ausführen: $ ls -l /dev/sda /dev/sr0 /dev/ttyS0 Bedürfnisse. Shell-Glob-Suchmuster Beschreibung der Regel * Dateiname (oder Segment), der nicht mit ”.” beginnt .* Dateiname (oder Segment), der mit ”.” beginnt ? genau ein Zeichen […] genau eins der in Klammern0 码力 | 289 页 | 1.44 MB | 1 年前3
Linux命令大全搜索工具 v1.852. 53. apk add ansible # server 54. ssh-keygen 55. /etc/ansible/hosts 56. apk add python # node 57. ssh-copy-id 58. 59. apk add man man-pages mdocml-apropos less less-doc 60. export PAGER=less 5. Handle 0x0001, DMI type 4, 40 bytes 6. Processor Information 7. Socket Designation: Node 1 Socket 1 8. Type: Central Processor 9. Family: Xeon MP 10. Manufacturer: 61. Handle 0x0055, DMI type 4, 40 bytes 62. Processor Information 63. Socket Designation: Node 1 Socket 2 64. Type: Central Processor dmidecode 在Linux系统下获取有关硬件方面的信息 - 271 - 本文档使用 书栈网0 码力 | 1347 页 | 8.79 MB | 1 年前3
Cilium v1.6 Documentationpackets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts io/docs/getting-started-guides/minikube/] to demonstrate deployment and operation of Cilium in a single-node Kubernetes cluster. The minikube VM requires approximately 5GB of RAM and supports hypervisors like0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 Documentationpackets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts io/docs/getting-started-guides/minikube/] to demonstrate deployment and operation of Cilium in a single-node Kubernetes cluster. The minikube VM requires approximately 5GB of RAM and supports hypervisors like0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.8 Documentationpackets emitted by the application containers, allowing to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external means that each host can allocate IPs without any coordination between hosts. The following multi node networking models are supported: Overlay: Encapsulation-based virtual network spanning all hosts io/docs/setup/learning-environment/minikube/] to demonstrate deployment and operation of Cilium in a single-node Kubernetes cluster. The minikube VM requires approximately 5GB of RAM and supports hypervisors like0 码力 | 1124 页 | 21.33 MB | 1 年前3
共 42 条
- 1
- 2
- 3
- 4
- 5













