In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-03 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/03 Report--
How to solve the network failure of CVM? When we encounter a network failure of a CVM, we can not only use the Ping command to detect, but also use some network troubleshooting tools.
Traceroute (Route tracking)
Typically, the ping program is used to determine whether the basic connection is connected, and the traceroute utility can be used to determine more detailed information about the path of the target cloud host, including the routes through which the packet goes and the response time of these intermediate hosts.
Open the terminal, enter traceroute, and click enter.
The number of gateways through which the host and the target host interact can be detected and the result can be obtained from the accepted packets.
It will use the smallest TTL to send probe packets to track how many gateways it takes to reach the target host, and then monitor the response time through one gateway to calculate the total number of gateways.
Ifconfig
When troubleshooting network problems, one of the most important things is to find out the affected IP configuration of the CVM. Whether statically configured or obtained automatically, you can view the IP address information through the command.
Ifconfig allows us to obtain the IP address, subnet mask and default gateway of the current host. These are also the only way for us to troubleshoot the network.
Ifconfig command format: ifconfig [Network equipment] [parameters]
Route
Routing utility. Used to display the current status of the routing table on the host. Although the use of routing utilities is limited in common cases where a host has only a single IP address of a single gateway, this is critical in other cases where there may be multiple IP addresses and multiple gateways!
The syntax of the route command is:
Route [- f] [- p] [Command [Destination] [mask Netmask] [Gateway] [metric Metric]] [if Interface]]
1) route [- f] is used to clear routing tables that are not primary or loopback routes, and these routing tables are cleared before running the command.
2)-p] is usually used in conjunction with the add directive and is used to add to the registry and to start the TCP/IP protocol.
As a senior professional cloud computing service provider and cloud security service provider in the industry, it is committed to providing cloud servers for Internet enterprise users and enterprise users in traditional industries. Its products have the characteristics and advantages of "security and stability, easy to use, high service availability, high performance-to-price ratio" and are designed to be customized for enterprises to meet the needs of rich and diversified application scenarios.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 283
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.