Linux 內核調優 — 構建高性能的企業服務
吳光科,周賀良,何青龍
買這商品的人也買了...
-
$779$740 -
$880$616 -
$580$493 -
$500$390 -
$834$792 -
$1,074$1,020 -
$990Nginx Cookbook: Advanced Recipes for High-Performance Load Balancing, 2/e (Paperback)
-
$654$621 -
$690$538 -
$479$455 -
$780$616 -
$580$493 -
$650$507 -
$1,014$963 -
$479$455 -
$403網絡異常流量與行為分析
-
$654$621 -
$654$621 -
$750$593 -
$414$393 -
$414$393 -
$650$507 -
$760$593 -
$790$624 -
$880$660
相關主題
商品描述
《Linux內核調優——構建高性能的企業服務》從實用的角度出發,詳細介紹了Linux內核調整與優化相關的理論與應用知識,包括Nginx Web服務器企業實戰、Linux性能優化與安全攻防實戰、HTTP詳解、Linux高可用集群實戰、黑客攻擊Linux服務器與防護實戰、iptables入門簡介、Firewalld防火牆企業實戰。 《Linux內核調優——構建高性能的企業服務》免費提供與書中內容相關的視頻課程講解,以指導讀者深入地進行學習,詳見前言中的說明。 《Linux內核調優——構建高性能的企業服務》既可作為高等學校電腦相關專業的教材,也可作為系統管理員、網絡管理員、Linux運維工程師及網站開發、測試、設計人員等的參考用書。
目錄大綱
第 1 章 Nginx Web服務器企業實戰 ............................................................................................... 1
1.1 Nginx Web 入門簡介................................................................................................................................1
1.2 Nginx 工作原理 .......................................................................................................................................2
1.3 二進制部署 Nginx 實戰 ...........................................................................................................................4
1.4 源代碼部署 Nginx 實戰 ...........................................................................................................................5
1.5 Nginx 管理及升級....................................................................................................................................6
1.6 Nginx 常用模塊剖析 ................................................................................................................................9
1.6.1 access 模塊 ..................................................................................................................................9
1.6.2 auth_basic 模塊 ..........................................................................................................................12
1.6.3 stub_status 模塊..........................................................................................................................12
1.6.4 autoindex 模塊............................................................................................................................13
1.6.5 limit_rate 模塊............................................................................................................................14
1.6.6 limit_conn 模塊 ..........................................................................................................................15
1.7 Nginx 配置文件優化 ..............................................................................................................................16
1.7.1 優化一 .......................................................................................................................................16
1.7.2 優化二 .......................................................................................................................................18
1.8 Nginx 虛擬主機實戰 ..............................................................................................................................20
1.9 Nginx location 深入剖析 .........................................................................................................................23
1.10 企業實戰.............................................................................................................................................26
1.10.1 Nginx 動靜分離架構.................................................................................................................26
1.10.2 企業實戰 LNMP 高性能服務器.................................................................................................28
1.11 LNMP 架構工作原理 ...........................................................................................................................29
1.12 LNMP 架構源碼部署企業實戰.............................................................................................................30
1.13 Nginx Rewrite 規則詳解........................................................................................................................33
1.14 Nginx Web 日誌分析 ............................................................................................................................37
1.15 Nginx 日誌切割案例 ............................................................................................................................39
1.16 Nginx 防盜鏈案例實戰.........................................................................................................................41
1.17 Nginx HTTPS 簡介 ...............................................................................................................................43
1.17.1 Nginx HTTPS 工作原理.............................................................................................................43
1.17.2 Nginx HTTPS 證書配置.............................................................................................................45
VI Linux 內核調優——構建高性能的企業服務
1.18 Tomcat/Java 服務器實戰.......................................................................................................................48
1.18.1 Tomcat Web 案例實戰...............................................................................................................48
1.18.2 Tomcat 配置文件詳解...............................................................................................................50
1.18.3 Tomcat 連接器選擇...................................................................................................................53
1.19 JVM 虛擬機詳解..................................................................................................................................55
1.20 Tomcat 性能優化 .................................................................................................................................57
1.21 Tomcat 後台管理配置 ..........................................................................................................................59
第 2 章 Linux 性能優化與安全攻防實戰 ........................................................................................ 61
2.1 TCP/IP 報文詳解 ...................................................................................................................................61
2.2 TCP 三次握手及四次揮手 .....................................................................................................................64
2.3 優化 Linux 文件打開最大數 ..................................................................................................................66
2.4 Linux 內核參數詳解和優化 ...................................................................................................................68
2.5 影響服務器性能的因素.........................................................................................................................70
2.6 Linux 服務器性能評估與優化................................................................................................................71
2.7 Linux 故障報錯實戰 ..............................................................................................................................76
2.8 DDoS 攻擊簡介 .....................................................................................................................................79
2.9 SYN Flood 攻擊簡介 ..............................................................................................................................81
2.10 hping 概念剖析....................................................................................................................................84
2.11 DDoS攻擊實戰....................................................................................................................................85
2.12 DDoS防禦實戰....................................................................................................................................88
2.12.1 DDoS 企業防禦種類 .................................................................................................................88
2.12.2 Linux 內核防禦 DDoS ...............................................................................................................89
2.13 CC 攻擊簡介 .......................................................................................................................................89
2.13.1 CC 攻擊概念 ............................................................................................................................89
2.13.2 CC 攻擊工具部署.....................................................................................................................90
2.13.3 CC 攻擊工具參數.....................................................................................................................91
2.13.4 CC 攻擊實戰操作.....................................................................................................................93
2.13.5 CC 攻擊防禦 ............................................................................................................................93
2.14 HTTP Flood 攻擊簡介 ..........................................................................................................................96
2.15 Hydra 暴力破解攻擊............................................................................................................................97
2.16 Libssh安裝部署..................................................................................................................................97
2.17 Hydra 安裝部署和參數詳解.................................................................................................................98
2.18 暴力破解案例實戰 ..............................................................................................................................99
2.19 DenyHosts 安裝與配置....................................................................................................................... 102
2.19.1 DenyHosts 配置目錄詳解........................................................................................................ 102
2.19.2 DenyHosts 配置實戰 ............................................................................................................... 102
目錄 VII
2.19.3 啟動 DenyHosts 服務 .............................................................................................................. 104
2.19.4 刪除被 DenyHosts 禁止的 IP................................................................................................... 105
2.19.5 配置 DenyHosts 發送報警郵件................................................................................................ 106
2.20 基於 Shell 全自動腳本實現防黑客攻擊 ............................................................................................. 107
2.21 Metasploit 滲透攻擊實戰.................................................................................................................... 108
2.22 msfconsole 參數詳解 .......................................................................................................................... 111
2.23 構建 MySQL 數據庫環境 ................................................................................................................... 112
2.24 MySQL 數據庫安裝方式 .................................................................................................................... 114
2.25 Msfconsole 滲透 MySQL 實戰.............................................................................................................. 117
2.26 Tomcat 安裝配置實戰 ........................................................................................................................ 121
2.27 Msfconsole 滲透 Tomcat 實戰.............................................................................................................. 123
第 3 章 HTTP詳解...................................................................................................................... 127
3.1 TCP 與 HTTP....................................................................................................................................... 127
3.2 資源定位標識符.................................................................................................................................. 128
3.3 HTTP 與埠通信 ............................................................................................................................... 129
3.4 HTTP Request 與 Response 詳解........................................................................................................... 130
3.5 HTTP 1.0 與 HTTP 1.1 的區別.............................................................................................................. 132
3.6 HTTP 狀態碼詳解 ............................................................................................................................... 133
3.7 HTTP MIME 類型支持 ......................................................................................................................... 134
第 4 章 Linux 高可用集群實戰 .................................................................................................... 137
4.1 Keepalived 高可用軟件簡介................................................................................................................. 137
4.2 Keepalived VRRP 原理剖析一.............................................................................................................. 138
4.3 Keepalived VRRP 原理剖析二.............................................................................................................. 139
4.4 企業級 Nginx+Keepalived 集群實戰 ..................................................................................................... 139
4.5 Keepalived 配置文件實戰 .................................................................................................................... 143
4.6 企業級 Nginx+Keepalived 雙主架構實戰 .............................................................................................. 145
4.7 Redis+Keepalived 高可用集群實戰....................................................................................................... 149
4.8 NFS+Keepalived 高可用集群實戰......................................................................................................... 152
4.9 MySQL+Keepalived 高可用集群實戰 .................................................................................................... 154
4.10 HAProxy+Keepalived 高可用集群實戰................................................................................................ 157
4.10.1 HAProxy 入門簡介.................................................................................................................. 157
4.10.2 HAProxy 安裝配置.................................................................................................................. 158
4.10.3 HAProxy 配置文件詳解 .......................................................................................................... 159
4.10.4 安裝 Keepalived 服務.............................................................................................................. 162
4.10.5 配置 HAProxy+Keepalived....................................................................................................... 163
4.10.6 創建 HAProxy 腳本................................................................................................................. 164
VIII Linux 內核調優——構建高性能的企業服務
4.10.7 測試 HAProxy+Keepalived 服務............................................................................................... 165
4.11 LVS+Keepalived 高可用集群實戰....................................................................................................... 167
4.11.1 LVS 負載均衡簡介 ................................................................................................................. 167
4.11.2 LVS 負載均衡工作原理.......................................................................................................... 167
4.11.3 LVS 負載均衡實戰配置.......................................................................................................... 170
4.11.4 LVS+Keepalived 實戰配置 ...................................................................................................... 174
4.11.5 LVS DR 客戶端配置 VIP ........................................................................................................ 178
4.11.6 LVS 負載均衡企業實戰排錯經驗 ........................................................................................... 179
第 5 章 黑客攻擊 Linux 服務器與防護實戰 ................................................................................. 181
5.1 基於二進制方式安裝 DenyHosts .......................................................................................................... 181
5.2 DenyHosts 配置目錄詳解 ..................................................................................................................... 181
5.3 DenyHosts 配置實戰 ............................................................................................................................ 182
5.4 啟動 DenyHosts 服務 ........................................................................................................................... 183
5.5 刪除被 DenyHosts 禁止的 IP................................................................................................................ 184
5.6 配置 DenyHosts 發送報警郵件............................................................................................................. 185
5.7 基於 Shell 全自動腳本實現防黑客攻擊 ............................................................................................... 185
第 6 章 iptables 入門簡介 ........................................................................................................... 187
6.1 iptables 表與鏈功能............................................................................................................................. 188
6.2 iptables 數據包流程............................................................................................................................. 188
6.3 iptables 四張表和五條鏈...................................................................................................................... 190
6.4 Linux 下 iptables 下 filter 表 ................................................................................................................. 190
6.5 Linux 下 iptables 下 NAT 表 ................................................................................................................. 191
6.6 Linux 下 iptables 下 mangle 表 .............................................................................................................. 191
6.7 Linux 下 iptables 下 raw 表 ................................................................................................................... 191
6.8 Linux 下 iptables 命令剖析................................................................................................................... 192
6.8.1 iptables 命令參數 ..................................................................................................................... 192
6.8.2 匹配條件 ................................................................................................................................. 192
6.8.3 動作......................................................................................................................................... 193
6.9 iptables 企業案例規則實戰一 .............................................................................................................. 194
6.10 iptables 企業案例規則實戰二............................................................................................................. 194
第 7 章 Firewalld 防火牆企業實戰............................................................................................... 197
7.1 Firewalld 區域剖析 .............................................................................................................................. 197
7.2 Firewalld 服務剖析 .............................................................................................................................. 199
7.3 Firewalld 必備命令 .............................................................................................................................. 200
7.4 Firewalld 永久設置 .............................................................................................................................. 205
7.5 Firewalld 配置文件實戰 ....................................................................................................................... 207
目錄 IX
7.6 IT 運維安全概念 ................................................................................................................................. 208
7.7 IT 運維安全實戰策略.......................................................................................................................... 209
7.7.1 用戶名密碼策略 ...................................................................................................................... 209
7.7.2 啟用 Sudo 超級特權 ................................................................................................................. 210
7.7.3 關閉服務和埠 ...................................................................................................................... 211
7.7.4 服務監聽控制 .......................................................................................................................... 211
7.7.5 遠程登錄服務器 ...................................................................................................................... 212
7.7.6 引入防火牆.............................................................................................................................. 212
7.7.7 版本漏洞及補丁 ...................................................................................................................... 212