When this happens, select the component machine by IP address or host name to see the detail log and trace files for the failure.
出现这种情况时,可以通过IP地址或主机名称选中这台组件机,以查看失败配置的详细日志和跟踪文件。
Log file analysis is a hot topic in machine learning and monitoring tools.
日志文件分析在机器学习和监控工具领域是一个非常热门的主题。
For example, some customers may choose to set up a log shipping environment on a standby machine.
例如,有些客户可能会在一台备用机器上建立一个日志传送环境。
The rules can specify which file to log the message to, what machine to send the logging message to, what user to send the message to (in the form of console messages), etc.
规则可以指定记录消息的文件,将记录消息发送给哪台计算机,将消息发送给什么用户(以控制台消息的形式)等。
If there are disk issues that appear to be limited to a single virtual machine, the first place to look is in the log file for the virtual machine.
如果存在似乎只局限于一台虚拟机的磁盘问题,那么要查看的第一个位置是这个虚拟机的日志文件。
This change was introduced to enable peer recovery of transaction log to complete in-doubt transactions when the machine hosting the transaction log crashes.
该变更的引入可以使得寄存事务日志的机器崩溃时,能够利用事务日志的同等恢复来完善不确定的事务。
Log files can grow very large and in many cases you will want to keep an historical record of events on your machine for problems.
日志文件可能变得很大,在许多情况下,您需要保存计算机上事件的历史记录,以便解决问题。
In this script, you also echo the machine name out to the command log (unique for each machine supplied).
在这个脚本中,您还将计算机名回显到命令日志(对所提供的每台计算机来说是唯一的)。
A common thing that happens when a UNIX machine is broken into is that the log files are deleted to cover the attacker's tracks.
当unix计算机受到入侵时,常见的情况是日志文件被删除,以掩盖攻击者的踪迹。
Log out - if you're in communal space without logging out properly, people can get onto the machine you've just vacated and dive into your profiles.
退出登录——在公共场所的机器里,没有退出登录的话,你的个人信息就会暴露给别人。
Log in to your virtual machine as the root user to begin the VMware Tools installation process.
作为根用户登录虚拟机,开始VMwareTools的安装过程。
Log on to the local machine with a user that has Domain Administrator rights (alainadmin).
通过一个拥有DomainAdministrator权限的用户(alainadmin)登录本地计算机。
The first time you log back in to each machine, keychain will prompt you for the passphrase.
在您第一次重新登录到每台机器时,keychain将要求您输入密码短语。
The scraper log is eventually sent to the SLA database, with transaction statistics ultimately ending up on the test machine.
最终将scraper日志发送到SLA数据库,其中带有在最终结束于测试机上的事务统计数字。
Remote login.Using the Telnet,Rlogin, or other programs, the user anywhere on Internet can log into any other machine on which he has an account.
远程登录。在因特同任何地方的用户都可以使用Telnet、Rlogin或其他的程序登录到他具有帐号的其他计算机上。
When you first log in to the Samba server from a newly added Windows machine, you need to log in as root with the Samba server's root password.
当首次从新添加的Windows计算机登录到Samba服务器时,将需要使用 Samba 服务器的root密码以 root 的身份登录。
Now that I've got the Jikes code on my machine, I need to create a CVS log file for StatCVS to chew on.
现在机器上已经有了Jikes代码,需要创建一个CVS日志文件供StatCVS处理。
For the root user of the Solaris 10 machine to be able to log in using telnet/ssh/rlogin with the above setup, you are required to create a Kerberos principal of type root/<host name>.
为了通过上面的设置,使得 Solaris10计算机的root用户能够使用telnet/ssh/rlogin 进行登录,您需要创建一个 root/<hostname>类型的Kerberos主体。
They sent me a notice saying my account was configured on the machine "ibmop720.osuosl.org," and I could log in using "ssh -i openpower seebs@ibmop720.osuosl.org."
他们发给我一条提示,通知我的帐号已经在 “ibmop720.osuosl.org”机器上配置好了,我可以使用 “ssh -i openpower seebs@ibmop720.osuosl.org” 来登录这个系统。
When a machine goes down, the master redistributes its log chunks to other machines to process (and these machines store the processed results locally).
当一个机器down掉后,控制机器就会重新发布他的log块到其他机器上继续进行处理。
(you can simply use SSH to get back to your local machine-it works the same as if you were running SSH from a remote machine.) First, use SSH to log in to the remote machine.
您可以简单地使用SSH以返回到您的本地计算机,这就好像您从远程计算机上运行ssh一样。
With these Settings, you should be able to log onto the remote machine without prompting for the password.
完成这些设置之后,就应该能够登录到远程计算机,系统不会提示输入密码。
You need to append the public key file contents to each machine you want to log in to automatically.
您需要将这个公钥文件的内容追加到您希望自动地进行登录的每台计算机。
The appliance creates a running virtual machine from that image, and you can log in to that virtual machine and install your required software.
设备从该映像中创建了一个运行的虚拟机,您可以登录到该虚拟机并安装所需的软件。
Using the following config settings, a user on a trusted host can log onto the remote machine without providing the password.
通过使用以下配置设置,可信主机上的用户就可以登录远程计算机,不需要提供密码。
To restore the database to the standby machine, log on to the standby machine with your DB2 user ID.
要将数据库还原到备用计算机,请使用您的DB2用户ID登录到备用计算机。
With everything on the a same machine, all three executing programs can use the same log file, and you'd get a nice combined log.
当一切都在相同的服务器上时,全部三个执行程序都可以使用同一个日志文件,这样您就会得到一个不错的组合日志。
All systems generate a varying quantity of log files that track and record different information about your machine.
所有系统都会生成不同数量的日志文件,这些文件用于跟踪和记录关于计算机的不同信息。
The application is executed on a single machine (limited set of machines) and reports all of the exceptions in the local log files using standardized exception reporting schemas.
应用程序在单台机器(或有限数量的机器)上运行,使用标准化的异常报告模式,在本地文件日志文件中报告所有的异常。
Although this is useful when using SSH to log in to a remote machine (as it means you don't have to provide a password), it is even more useful when performing remote administration.
尽管使用SSH登录到远程计算机是非常有用的(因为这样做意味着您无需提供密码),不过在执行远程管理方面,它更有价值。
应用推荐