In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/02 Report--
Today, I will talk to you about how to deploy the server on the CVM, which may not be well understood by many people. In order to make you understand better, the editor summarized the following contents. I hope you can get something from this article.
After buying a CVM, we need to make some necessary system settings to facilitate the establishment and use of the station in the future.
1. Connect to the CVM remotely first.
1) Open xshell, set the login information of CVM, and click Authentication or user Authentication. Enter the user name and password of the CVM.
2) set the server account password. Then click "connection" and fill in the IP address of the CVM you purchased in "Host".
3) set character set encoding. Click on the terminal, and then select UTF-8 in the Encoding option. Then press OK to save the configuration, and then connect to the host.
2. Use the partition tool auto_fdisk.sh that comes with the CVM to partition, format and mount the data disk. This tool is generally included by default and does not need to be downloaded and installed. Its function is to automatically detect whether there is a data disk that has not been partitioned, format a new data disk and mount it automatically. The operating system can then be configured. In addition, for the sake of security, you can also make the following deployment.
Remove unnecessary module applications
The default Apache installation enables some predefined modules that you may not use. Close these modules to prevent targeted attacks by hackers.
Microsoft's Web server and Internet information service are similar. By default, it is configured to serve a large number of application types, such as ASP, ASP.NET, and so on, and the list of application extensions should include only the list that will be used by extended Web sites or web applications. The extension of each application should also be time-limited, using specific HTTP verbs.
Monitor and audit Web server
Ideally, you should store all Web server logs that exist in a quarantine. Web service logs are website access logs, and database server logs and operating system logs should be monitored frequently. Also, you are looking for odd log entries, because log files tend to provide all the information about attempted attacks. If you find suspicious activity in the log, investigate immediately to see what's going on.
After reading the above, do you have any further understanding of how the CVM deploys the server? If you want to know more knowledge or related content, please follow the industry information channel, thank you for your support.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.