当前位置:网站首页>Build personal leanote cloud notebook with Tencent cloud lightweight application server
Build personal leanote cloud notebook with Tencent cloud lightweight application server
2022-06-24 05:10:00 【m0re】
Leanote It's an online cloud note taking app , It has the following characteristics :
1. Support web page 、PC、 mobile phone APP Client and wechat version , Keep a record of , Easy to share , Voice support , Picture input .
2. Code highlighting , Code highlights covering all major languages , Do as you please Leanote Write the code , Memorize knowledge .
3.Markdown Editor , Live sync Preview .
4. Professional math formula editor , image Word and Latex Can edit mathematical formulas .
5. Support the creation of mind maps , Put ideas in a hierarchical tree of information .
6. Detailed history , Every save is backed up in the back end , Easy to find , One click recovery .
- Real time synchronization in the cloud .
Basic environment :
Tencent cloud lightweight application server
centos7.6
Steps to build :
- ssh Connect to server
Two 、 install MongoDB
MongoDB It is a high performance database based on distributed file storage , Between relational and non relational databases , It supports a very loose data structure similar to json and bson Format , Therefore, more complex data types can be stored .Mongo The biggest feature is that it supports a very powerful query language , Its syntax is somewhat similar to that of an object-oriented query language , You can almost implement most of the functionality of a relational database single table query , It also supports indexing data .
Leanote Cloud notes use MongoDB As a back-end database , Follow the steps below MongoDB database .
1. Execute the following command , install MongoDB.
yum -y install mongodb mongodb-server.x86_64 mariadb-devel.i686
2. Execute the following command , start-up MongoDB service .
systemctl start mongod
3. Execute the following command , see MongoDB Running state .
systemctl status mongod
3、 ... and 、 install Leanote
1. download Leanote Binary installation package .
wget https://nchc.dl.sourceforge.net/project/leanote-bin/2.6.1/leanote-linux-amd64-v2.6.1.bin.tar.gz
2. Unzip the installation package .
tar -zxvf leanote-linux-amd64-v2.6.1.bin.tar.gz
3. Edit the file leanote/conf/app.conf, Found in file app.secret term , Change the value of the entry to an arbitrary string .( If it is not modified, there will be a security risk ).
explain : according to Leanote Official documents , If not modified app.secret Item value , There will be security risks .
- Use vim The editor opens the file leanote/conf/app.conf.
vim leanote/conf/app.conf
b. Get into vim After editor , Input :/app.secret= And press enter to find app.secret
c. Find the location of the item and press i Key to enter edit mode , Modify the value of the entry to any string .
d. After the modification is completed , Press down esc Key to exit edit mode , Input :wq Save and exit vim Editor .
After modification, it is shown in the figure .
4. Initialize database .
mongorestore -h localhost -d leanote --dir /root/leanote/mongodb_backup/leanote_install_data/
5. Start the service .
nohup bash /root/leanote/bin/run.sh > /root/leanote/run.log 2>&1 &
6. Visit cloud notes .
Access in a browser
http://<ECS Public address >:9000
, Please put ecs Replace the public network address with the one in the resource bar on the left ECS Public network IP Address . The default administrative user is admin, The password for abc123, After successful login, it is shown in the figure below .
边栏推荐
- The trunk warehouse can also be tob, and Tencent cloud microenterprises do not leave quality behind
- How RedHat 8 checks whether the port is connected
- Analysis of electronic signature system
- Before creating an image, it is recommended to execute the following code to purify the image as an administrator
- Data acquisition gateway intelligent industrial Internet of things
- Detailed explanation of tcpip protocol
- 5g and industrial Internet
- What is the difference between a traditional data center and a cloud computing data center?
- Many regulations come into effect today! The main responsibility of network security will be further implemented
- Implementation principle of Flink connector mongodb CDC
猜你喜欢

Leetcode (question 1) - sum of two numbers

Loss and optimization of linear regression, machine learning to predict house prices

Leetcode question brushing (question 3) - the longest substring without repeated characters

Training methods after the reform of children's programming course

What is the new generation cloud computing architecture cipu of Alibaba cloud?

CTF learning notes 17:iwesec file upload vulnerability-02 file name filtering bypass

Introduction to the "penetration foundation" cobalt strike Foundation_ Cobalt strike linkage msfconsole

解析90后创客教育的主观积极性

Intensive learning and application of "glory of the king" to complete the application of 7 real worlds other than human players

Leetcode (question 2) - adding two numbers
随机推荐
Bi-sql order by
How does a R & d make a small demand bigger and bigger step by step
Analyzing the superiority of humanoid robot in the post human era
Open source and SaaS, how to choose software?
Inventory of common tools used by dry goods | data journalists
Hard core JS: there may be a memory leak in your program
Where to buy domain name space? Can the domain name be repeated?
Share 10 creative projects of Gaoxing!
What is the implementation of domain name to IP address conversion? What are the benefits of switching to a website?
Jimureport building block report - expression introduction
"Emergency response practice" logparser log analysis practice
CTF learning notes 17:iwesec file upload vulnerability-02 file name filtering bypass
Cos+cdn realizes the distribution of game client version files in a faster, better and cheaper manner
问题:sql创建存储过程
CLB health check principle and abnormal troubleshooting
Real time monitoring: system and application level real-time monitoring based on flow computing Oceanus (Flink)
IP and traffic reconciliation tool networktrafficview
CTF learning notes 18:iwesec file upload vulnerability-03-content-type filtering bypass
Automatically convert local pictures to network pictures when writing articles
The trunk warehouse can also be tob, and Tencent cloud microenterprises do not leave quality behind