Skip to main content

linux用ssd有啥好处?有啥要注意的没?

发信人: mitbbs2715 (好吃不懒做), 信区: Linux
标  题: Re: linux用ssd有啥好处?有啥要注意的没?
发信站: BBS 未名空间站 (Thu May  1 01:45:22 2014, 美东)

应该就是tmpfs
对我来说意义不大,除非是 sync mount的,这么用太亏了,况且本来就有system
cache,所以意义不大, 放HDD应该就可以了.
compile大项目的时候tmpfs比较有用,能快个20%左右

如果有hibernation,可以把hibernation file放在SSD上,如果是用swap做
hibernation这时候swap放在SSD上,现代linux除了hibernation基本不用swap,因此可
以放心放在SSD上。

/挂SSD,/home挂HDD是对的,但我觉得不是绝对的,比如一般syslog会sync到disk,这
个对SSD还是伤的,这种东西link到HDD上去 (不建议-/var). 而如果home中有不怎么修
改又常用的大文件,比如一些iso之类的,完全可以放到SSD上去。

noatime比较重要不然每读一次就一个write.

不过嘛,以上都是理论上的,现在的SSD没啥问题,每天写50GB也能毫无压力用上五六
年,所以我都是直接裸挂/,然后每天rsync一次到HDD就好。




【 在 thomasz (thomasz) 的大作中提到: 】
: tmp丢到内存里?这是怎么设置的?
http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec