Skip to content

Commit

Permalink
Added graphics
Browse files Browse the repository at this point in the history
  • Loading branch information
Phil Zona committed Mar 23, 2017
1 parent f0b6814 commit e929649
Show file tree
Hide file tree
Showing 10 changed files with 15 additions and 5 deletions.
Binary file added docs/assets/linux_users_and_groups.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
4 changes: 3 additions & 1 deletion docs/security/use-public-key-authentication-with-ssh.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ description: 'Access your Linode via SSH using Public Key Authentication.'
keywords: 'ssh,pki,ssh keys,secure shell,vpn,tunneling'
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
alias: ['security/ssh-keys/']
modified: 'Wednesday, March 16, 2016'
modified: 'Thursday, March 23rd, 2017'
modified_by:
name: Linode
published: 'Tuesday, April 5th, 2011'
Expand All @@ -15,6 +15,8 @@ title: Use Public Key Authentication with SSH

Public key authentication provides SSH users with the convenience of logging in to their Linodes without entering their passwords. SSH keys are also more secure than passwords, because the private key used to secure the connection is never shared. Private keys can also be *encrypted* so their contents can't be read as easily. While SSH passwords are not required once keys are set up, passwords for *decrypting* the private keys locally are still required. For added convenience, depending on your local workstation's security, you can add the new password to your local keychain so it's saved after the first login.

![Use Public Key Authentication with SSH](/docs/assets/use_public_key_authentication_with_ssh.png "Use Public Key Authentication with SSH")

## Intro to SSH Keys Authentication

SSH keys come in pairs; a private and a public key. Usually the private key is saved as `~/.ssh/id_<type>` and the public key is `~/.ssh/id_<type>.pub`. The type of encryption most often used by default is RSA, so your keys should be named `id_rsa` and `id_rsa.pub`. The public key is meant to be handed out freely, and added to servers you wish to connect to in the `~/.ssh/authorized_keys` file. The private key should be secured on your local machine with strict access rules.
Expand Down
4 changes: 3 additions & 1 deletion docs/tools-reference/linux-users-and-groups.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ description: 'An introduction to the principal concepts and use of the users and
keywords: 'users,permissions,access control lists,chmod,chown,linux'
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
alias: ['docs/using-linux/users-and-groups/']
modified: Wednesday, September 17, 2014
modified: Thursday, March 23rd, 2017
modified_by:
name: Linode
published: 'Monday, August 31st, 2009'
Expand All @@ -19,6 +19,8 @@ external_resources:

If you are new to Linux/Unix, then the concept of permissions may be confusing. This guide will provide you with an explanation of what permissions are, how they work, and how to manage them. A number of examples will be provided to illustrate how to set and change permissions for both users and groups.

![Linux Users and Groups](/docs/assets/linux_users_and_groups.png "Linux Users and Groups")

## What are User and Group Permissions?

Linux/Unix operating systems have the ability to multitask in a manner similar to other operating systems. However, Linux's major difference from other operating systems is its ability to have multiple users. Linux was designed to allow more than one user to have access to the system at the same time. In order for this multiuser design to work properly, there needs to be a method to protect users from each other. This is where permissions come in to play.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ description: 'Use the utilities killall and kill to manage processes on Linux sy
keywords: 'kill,killall,processes,linux,process management,common linux commands'
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
alias: ['linux-tools/common-commands/killall-kill/']
modified: Tuesday, April 19th, 2011
modified: Thursday, March 23rd, 2017
modified_by:
name: Linode
published: 'Monday, November 29th, 2010'
Expand All @@ -15,6 +15,8 @@ title: Manage Processes with killall and kill

`killall` is a tool for ending running processes on your system based on name. In contrast, `kill` terminates processes based on process ID number or "PID." `kill` and `killall` can also send specific system signals to processes. Use `killall` and `kill` in conjunction with tools including `ps` to manage processes and end processes that have become stuck or unresponsive when necessary.

![Manage Processes with killall and kill](/docs/assets/manage_processes_with_killall_and_kill.png "Manage Processes with killall and kill")

## Usage

### killall
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ description: 'Practical examples for using sed to transform text files and strea
keywords: 'sed,find and replace,regular expression,unix'
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
alias: ['linux-tools/common-commands/sed/']
modified: Monday, August 22nd, 2011
modified: Thursday, March 23rd, 2017
modified_by:
name: Amanda Folson
published: 'Thursday, July 1st, 2010'
Expand All @@ -17,6 +17,8 @@ external_resources:

The traditional Unix utility `sed` makes it possible to manipulate strings and streams of text from the command line without using a text editing application. `sed` is useful in a number of different contexts, including finding and replacing strings of text in a large number of files, manipulating text for [Stack Scripts](http://linode.com/stackscripts/) and other kinds of scripts, as well as a component in basic shell scripting.

![Manipulate Text from the Command Line with sed](/docs/assets/manipulate_text_from_the_command_line_with_sed.png "Manipulate Text from the Command Line with sed")

This document provides a gentle overview of `sed` usage, accompanied by a number of practical applications of `sed`. If you find this guide helpful, please consider our guide to [basic administration practices](/docs/using-linux/administration-basics) or the rest of the [Tools & Reference section](/docs/tools-reference/).

## Using Sed
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ description: 'Use Nginx as a Front-end Proxy and Software Load-Balancer.'
keywords: 'apache,nginx,proxy,load balancer,load balancing,web server,http,use nginx as proxy,use nginx as load-balancer,front-end proxy,cluster'
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
alias: ['web-servers/nginx/configuration/front-end-proxy-and-software-load-balancing/','websites/loadbalancing/Use-Nginx-for-Proxy-Services-and-Software-Load-Balancing/','uptime/loadbalancing/use-nginx-for-proxy-services-and-software-load-balancing/index.cfm/','uptime/loadbalancing/use-nginx-for-proxy-services-and-software-load-balancing/', 'uptime/loadbalancing/how-to-use-nginx-as-a-front-end-proxy-server-and-software-load-balancer/']
modified: Friday, August 9th, 2013
modified: Thursday, March 23rd, 2017
modified_by:
name: Linode
published: 'Tuesday, May 11th, 2010'
Expand All @@ -19,6 +19,8 @@ external_resources:

The nginx web server can act as a very capable software load balancer, in addition to its more traditional roles serving static content over HTTP and dynamic content using FastCGI handlers for scripts. Because ngnix uses a non-threaded, event-driven architecture, it is able to outperform web servers like Apache. This is particularly true in deployments that receive heavy loads.

![Use Nginx as a Front-end Proxy and Software Load Balancer](/docs/assets/use_nginx_as_a_frontend_proxy_and_software_load_balancer.png "Use Nginx as a Front-end Proxy and Software Load Balancer")

Using a proxy is helpful when the demands of serving a single website outgrow the capabilities of a single machine. Additionally, there are some web frameworks, like [Seaside](/docs/frameworks/seaside/) and Ruby On Rails's Mongrel server, that deploy applications on framework-specific web servers. While these single-purpose servers provide powerful application services, they are not suitable for hosting entire applications. In these cases, using nginx as a front-end proxy to pass only the essential requests to the application server is a viable means of unifying dynamic content with static content and providing a stable production environment.

This document provides an overview of using nginx as a front-end proxy server for other HTTP servers, and as a software load balancer to distribute traffic across a cluster of machines providing HTTP resources. For an introductory guide to configuring nginx, please see our [Basic Nginx Configuration](/docs/websites/nginx/basic-nginx-configuration) guide. If you want a simple nginx deployment with content that uses PHP or Perl scripts, consider following one of our [Installing Nginx](/docs/web-servers/nginx/) guides.
Expand Down

0 comments on commit e929649

Please sign in to comment.