赞
踩
cat /etc/*release
service neo4j status
systemctl status neo4j
sudo apt-get update && sudo apt-get upgrade -y
curl -fsSL https://debian.neo4j.com/neotechnology.gpg.key | sudo gpg --dearmor -o /usr/share/keyrings/neo4j.gpg
systemctl status neo4j
cat /etc/apt/sources.list.d/neo4j.list
echo "deb [signed-by=/usr/share/keyrings/neo4j.gpg] https://debian.neo4j.com stable latest" | sudo tee -a /etc/apt/sources.list.d/neo4j.list
cat /etc/apt/sources.list.d/neo4j.list
sudo apt-get update
curl -fsSL https://debian.neo4j.com/neotechnology.gpg.key | sudo gpg --dearmor -o /usr/share/keyrings/neo4j.gpg
sudo apt-get update
curl -fsSL https://debian.neo4j.com/neotechnology.gpg.key
cat /usr/share/keyrings/neo4j.gpg
rm /usr/share/keyrings/neo4j.gpg
sudo rm /usr/share/keyrings/neo4j.gpg
curl -fsSL https://debian.neo4j.com/neotechnology.gpg.key | sudo gpg --dearmor -o /usr/share/keyrings/neo4j.gpg
curl -fsSL https://debian.neo4j.com/neotechnology.gpg.key | sudo gpg --dearmor -o /usr/share/keyrings/neo4j.gpg
sudo apt udpate
sudo apt update
cat /etc/apt/sources.list
cat /etc/apt/sources.list
cat /etc/apt/sources.list.d/
cat /etc/apt/sources.list.d/neo4j.list
sudo apt update
curl -fsSL https://debian.neo4j.com/neotechnology.gpg.key | sudo gpg --dearmor -o /usr/share/keyrings/neo4j.gpg
echo "deb [signed-by=/usr/share/keyrings/neo4j.gpg] https://debian.neo4j.com stable latest" | sudo tee -a /etc/apt/sources.list.d/neo4j.list
sudo apt-get install neo4j -y
sudo systemctl enable --now neo4j
vim /etc/apt/sources.list.d/neo4j.list
sudo vim /etc/apt/sources.list.d/neo4j.list
vim /etc/apt/sources.list.d/neo4j.list
sudo systemctl enable --now neo4j
vim /etc/neo4j/
vim /etc/neo4j/neo4j.conf
cd /var/lib/neo4j/
cd /var/lib/neo4j/
cd /var/lib/neo4j/plugins/
wget https://objects.githubusercontent.com/github-production-release-asset-2e65be/525054099/ee4f6086-9d4a-453a-9ee1-0d276f813c95?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20240622%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240622T112652Z&X-Amz-Expires=300&X-Amz-Signature=f1d38221fd5a0d2d0bb455a97276820f16402c05c16e8763b63bdb0572498f6e&X-Amz-SignedHeaders=host&actor_id=80097021&key_id=0&repo_id=525054099&response-content-disposition=attachment%3B%20filename%3Dapoc-5.20.0-core.jar&response-content-type=application%2Foctet-stream
dir
systemctl status neo4j
wget https://github.com/neo4j/apoc/releases/download/5.21.0/apoc-5.21.0-core.jar
--2024-07-04 00:24:35-- https://github.com/neo4j/apoc/releases/download/5.21.0/apoc-5.21.0-core.jar
sudo wget https://github.com/neo4j/apoc/releases/download/5.21.0/apoc-5.21.0-core.jar
--2024-07-04 00:24:41-- https://github.com/neo4j/apoc/releases/download/5.21.0/apoc-5.21.0-core.jar
cypher-shell
sudo ufw status
netstat -nltp
cypher-shell
systemctl restart neo4j
sudo systemctl restart neo4j
cypher-shell
netstat 0-nltp
netstat -nltp
ping wwww.baidu.com
sudo apt update
curl -fsSL https://debian.neo4j.com/neotechnology.gpg.key | sudo gpg --dearmor -o /usr/share/keyrings/neo4j.gpg
sudo apt-get update
sudo apt install neo4j -y
sudo systemctl enable --now neo4j
sudo vim /etc/
sudo vim /etc/neo4j/neo4j.conf
cypher-shell
systemctl restart neo4j
sudo systemctl restart neo4j
netstat -nltp
systemctl status neo4j
sudo netstat -nltp
curl localhost:7474
curl ifconfig.me
ip add
curl ifconfig.me
ubuntu@150-136-217-63:~$ cat /etc/*release
DISTRIB_ID=Ubuntu
DISTRIB_RELEASE=22.04
DISTRIB_CODENAME=jammy
DISTRIB_DESCRIPTION="Ubuntu 22.04.3 LTS"
PRETTY_NAME="Ubuntu 22.04.3 LTS"
NAME="Ubuntu"
VERSION_ID="22.04"
VERSION="22.04.3 LTS (Jammy Jellyfish)"
VERSION_CODENAME=jammy
ID=ubuntu
ID_LIKE=debian
HOME_URL="https://www.ubuntu.com/"
SUPPORT_URL="https://help.ubuntu.com/"
BUG_REPORT_URL="https://bugs.launchpad.net/ubuntu/"
PRIVACY_POLICY_URL="https://www.ubuntu.com/legal/terms-and-policies/privacy-policy"
UBUNTU_CODENAME=jammy
ubuntu@150-136-217-63:~$ ping wwww.baidu.com
PING ps_other.a.shifen.com (110.242.68.66) 56(84) bytes of data.
64 bytes from 110.242.68.66 (110.242.68.66): icmp_seq=1 ttl=51 time=256 ms
^C64 bytes from 110.242.68.66: icmp_seq=2 ttl=51 time=249 ms
--- ps_other.a.shifen.com ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 1000ms
rtt min/avg/max/mdev = 249.421/252.856/256.292/3.435 ms
ubuntu@150-136-217-63:~$ sudo apt update
Get:1 http://security.ubuntu.com/ubuntu jammy-security InRelease [129 kB]
Get:2 https://nvidia.github.io/libnvidia-container/stable/ubuntu18.04/amd64 InRelease [1484 B]
Hit:3 https://download.docker.com/linux/ubuntu jammy InRelease
Hit:4 https://nvidia.github.io/nvidia-container-runtime/stable/ubuntu18.04/amd64 InRelease
Hit:5 https://packages.microsoft.com/repos/azure-cli jammy InRelease
Hit:6 http://ppa.launchpad.net/flexiondotorg/nvtop/ubuntu jammy InRelease
Get:7 https://packages.cloud.google.com/apt cloud-sdk InRelease [1616 B]
Hit:8 http://archive.ubuntu.com/ubuntu jammy InRelease
Hit:9 https://pkg.cloudflare.com/cloudflared jammy InRelease
Hit:10 http://archive.lambdalabs.com/ubuntu jammy InRelease
Get:11 http://archive.ubuntu.com/ubuntu jammy-updates InRelease [128 kB]
Hit:12 https://ppa.launchpadcontent.net/deadsnakes/ppa/ubuntu jammy InRelease
Hit:13 http://archive.ubuntu.com/ubuntu jammy-backports InRelease
Err:7 https://packages.cloud.google.com/apt cloud-sdk InRelease
The following signatures couldn't be verified because the public key is not available: NO_PUBKEY C0BA5CE6DC6315A3
Fetched 258 kB in 1s (198 kB/s)
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
238 packages can be upgraded. Run 'apt list --upgradable' to see them.
W: An error occurred during the signature verification. The repository is not updated and the previous index files will be used. GPG error: https://packages.cloud.google.com/apt cloud-sdk InRelease: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY C0BA5CE6DC6315A3
W: Failed to fetch https://packages.cloud.google.com/apt/dists/cloud-sdk/InRelease The following signatures couldn't be verified because the public key is not available: NO_PUBKEY C0BA5CE6DC6315A3
W: Some index files failed to download. They have been ignored, or old ones used instead.
ubuntu@150-136-217-63:~$ curl -fsSL https://debian.neo4j.com/neotechnology.gpg.key | sudo gpg --dearmor -o /usr/share/keyrings/neo4j.gpg
ubuntu@150-136-217-63:~$ echo "deb [signed-by=/usr/share/keyrings/neo4j.gpg] https://debian.neo4j.com stable latest" | sudo tee -a /etc/apt/sources.list.d/neo4j.list
deb [signed-by=/usr/share/keyrings/neo4j.gpg] https://debian.neo4j.com stable latest
ubuntu@150-136-217-63:~$ sudo apt-get update
^C
ubuntu@150-136-217-63:~$ sudo a^C
ubuntu@150-136-217-63:~$ sudo apt-get update
Get:1 https://nvidia.github.io/libnvidia-container/stable/ubuntu18.04/amd64 InRelease [1484 B]
Hit:2 http://archive.ubuntu.com/ubuntu jammy InRelease
Hit:3 https://download.docker.com/linux/ubuntu jammy InRelease
Hit:4 https://nvidia.github.io/nvidia-container-runtime/stable/ubuntu18.04/amd64 InRelease
Hit:5 http://archive.ubuntu.com/ubuntu jammy-updates InRelease
Hit:6 http://archive.ubuntu.com/ubuntu jammy-backports InRelease
Get:7 https://debian.neo4j.com stable InRelease [44.2 kB]
Hit:8 https://packages.microsoft.com/repos/azure-cli jammy InRelease
Hit:9 http://archive.lambdalabs.com/ubuntu jammy InRelease
Hit:10 https://pkg.cloudflare.com/cloudflared jammy InRelease
Hit:11 http://security.ubuntu.com/ubuntu jammy-security InRelease
Hit:12 http://ppa.launchpad.net/flexiondotorg/nvtop/ubuntu jammy InRelease
Get:13 https://packages.cloud.google.com/apt cloud-sdk InRelease [1616 B]
Hit:14 https://ppa.launchpadcontent.net/deadsnakes/ppa/ubuntu jammy InRelease
Get:15 https://debian.neo4j.com stable/latest amd64 Packages [7623 B]
Err:13 https://packages.cloud.google.com/apt cloud-sdk InRelease
The following signatures couldn't be verified because the public key is not available: NO_PUBKEY C0BA5CE6DC6315A3
Fetched 55.0 kB in 1s (38.5 kB/s)
Reading package lists... Done
W: An error occurred during the signature verification. The repository is not updated and the previous index files will be used. GPG error: https://packages.cloud.google.com/apt cloud-sdk InRelease: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY C0BA5CE6DC6315A3
W: Failed to fetch https://packages.cloud.google.com/apt/dists/cloud-sdk/InRelease The following signatures couldn't be verified because the public key is not available: NO_PUBKEY C0BA5CE6DC6315A3
W: Some index files failed to download. They have been ignored, or old ones used instead.
ubuntu@150-136-217-63:~$ sudo apt install neo4j -y
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
The following additional packages will be installed:
ca-certificates-java cypher-shell daemon fonts-dejavu-extra java-common libatk-wrapper-java libatk-wrapper-java-jni libpcsclite1 libxxf86dga1 openjdk-21-jre openjdk-21-jre-headless x11-utils
Suggested packages:
default-jre pcscd libnss-mdns fonts-ipafont-gothic fonts-ipafont-mincho fonts-wqy-microhei | fonts-wqy-zenhei fonts-indic mesa-utils
The following NEW packages will be installed:
ca-certificates-java cypher-shell daemon fonts-dejavu-extra java-common libatk-wrapper-java libatk-wrapper-java-jni libpcsclite1 libxxf86dga1 neo4j openjdk-21-jre openjdk-21-jre-headless x11-utils
0 upgraded, 13 newly installed, 0 to remove and 238 not upgraded.
Need to get 192 MB of archives.
After this operation, 374 MB of additional disk space will be used.
Get:1 http://archive.ubuntu.com/ubuntu jammy/universe amd64 daemon amd64 0.8-1 [60.9 kB]
Get:2 http://archive.ubuntu.com/ubuntu jammy-updates/main amd64 ca-certificates-java all 20190909ubuntu1.2 [12.1 kB]
Get:3 https://debian.neo4j.com stable/latest amd64 cypher-shell all 1:5.20.0 [20.9 MB]
Get:4 http://archive.ubuntu.com/ubuntu jammy/main amd64 java-common all 0.72build2 [6782 B]
Get:5 http://archive.ubuntu.com/ubuntu jammy-updates/main amd64 libpcsclite1 amd64 1.9.5-3ubuntu1 [19.8 kB]
Get:6 http://archive.ubuntu.com/ubuntu jammy-updates/universe amd64 openjdk-21-jre-headless amd64 21.0.3+9-1ubuntu1~22.04.1 [47.0 MB]
Get:7 https://debian.neo4j.com stable/latest amd64 neo4j all 1:5.20.0 [122 MB]
Get:8 http://archive.ubuntu.com/ubuntu jammy-updates/universe amd64 openjdk-21-jre amd64 21.0.3+9-1ubuntu1~22.04.1 [232 kB]
Get:9 http://archive.ubuntu.com/ubuntu jammy/main amd64 fonts-dejavu-extra all 2.37-2build1 [2041 kB]
Get:10 http://archive.ubuntu.com/ubuntu jammy/main amd64 libxxf86dga1 amd64 2:1.1.5-0ubuntu3 [12.6 kB]
Get:11 http://archive.ubuntu.com/ubuntu jammy/main amd64 x11-utils amd64 7.7+5build2 [206 kB]
Get:12 http://archive.ubuntu.com/ubuntu jammy/main amd64 libatk-wrapper-java all 0.38.0-5build1 [53.1 kB]
Get:13 http://archive.ubuntu.com/ubuntu jammy/main amd64 libatk-wrapper-java-jni amd64 0.38.0-5build1 [49.0 kB]
Fetched 192 MB in 2s (109 MB/s)
Preconfiguring packages ...
Selecting previously unselected package daemon.
(Reading database ... 293937 files and directories currently installed.)
Preparing to unpack .../00-daemon_0.8-1_amd64.deb ...
Unpacking daemon (0.8-1) ...
Selecting previously unselected package ca-certificates-java.
Preparing to unpack .../01-ca-certificates-java_20190909ubuntu1.2_all.deb ...
Unpacking ca-certificates-java (20190909ubuntu1.2) ...
Selecting previously unselected package java-common.
Preparing to unpack .../02-java-common_0.72build2_all.deb ...
Unpacking java-common (0.72build2) ...
Selecting previously unselected package libpcsclite1:amd64.
Preparing to unpack .../03-libpcsclite1_1.9.5-3ubuntu1_amd64.deb ...
Unpacking libpcsclite1:amd64 (1.9.5-3ubuntu1) ...
Selecting previously unselected package openjdk-21-jre-headless:amd64.
Preparing to unpack .../04-openjdk-21-jre-headless_21.0.3+9-1ubuntu1~22.04.1_amd64.deb ...
Unpacking openjdk-21-jre-headless:amd64 (21.0.3+9-1ubuntu1~22.04.1) ...
Selecting previously unselected package openjdk-21-jre:amd64.
Preparing to unpack .../05-openjdk-21-jre_21.0.3+9-1ubuntu1~22.04.1_amd64.deb ...
Unpacking openjdk-21-jre:amd64 (21.0.3+9-1ubuntu1~22.04.1) ...
Selecting previously unselected package cypher-shell.
Preparing to unpack .../06-cypher-shell_1%3a5.20.0_all.deb ...
Unpacking cypher-shell (1:5.20.0) ...
Selecting previously unselected package neo4j.
Preparing to unpack .../07-neo4j_1%3a5.20.0_all.deb ...
Unpacking neo4j (1:5.20.0) ...
Selecting previously unselected package fonts-dejavu-extra.
Preparing to unpack .../08-fonts-dejavu-extra_2.37-2build1_all.deb ...
Unpacking fonts-dejavu-extra (2.37-2build1) ...
Selecting previously unselected package libxxf86dga1:amd64.
Preparing to unpack .../09-libxxf86dga1_2%3a1.1.5-0ubuntu3_amd64.deb ...
Unpacking libxxf86dga1:amd64 (2:1.1.5-0ubuntu3) ...
Selecting previously unselected package x11-utils.
Preparing to unpack .../10-x11-utils_7.7+5build2_amd64.deb ...
Unpacking x11-utils (7.7+5build2) ...
Selecting previously unselected package libatk-wrapper-java.
Preparing to unpack .../11-libatk-wrapper-java_0.38.0-5build1_all.deb ...
Unpacking libatk-wrapper-java (0.38.0-5build1) ...
Selecting previously unselected package libatk-wrapper-java-jni:amd64.
Preparing to unpack .../12-libatk-wrapper-java-jni_0.38.0-5build1_amd64.deb ...
Unpacking libatk-wrapper-java-jni:amd64 (0.38.0-5build1) ...
Setting up java-common (0.72build2) ...
Setting up libxxf86dga1:amd64 (2:1.1.5-0ubuntu3) ...
Setting up daemon (0.8-1) ...
Setting up libpcsclite1:amd64 (1.9.5-3ubuntu1) ...
Setting up fonts-dejavu-extra (2.37-2build1) ...
Setting up x11-utils (7.7+5build2) ...
Setting up libatk-wrapper-java (0.38.0-5build1) ...
Setting up libatk-wrapper-java-jni:amd64 (0.38.0-5build1) ...
Setting up openjdk-21-jre-headless:amd64 (21.0.3+9-1ubuntu1~22.04.1) ...
update-alternatives: using /usr/lib/jvm/java-21-openjdk-amd64/bin/java to provide /usr/bin/java (java) in auto mode
update-alternatives: using /usr/lib/jvm/java-21-openjdk-amd64/bin/jpackage to provide /usr/bin/jpackage (jpackage) in auto mode
update-alternatives: using /usr/lib/jvm/java-21-openjdk-amd64/bin/keytool to provide /usr/bin/keytool (keytool) in auto mode
update-alternatives: using /usr/lib/jvm/java-21-openjdk-amd64/bin/rmiregistry to provide /usr/bin/rmiregistry (rmiregistry) in auto mode
update-alternatives: using /usr/lib/jvm/java-21-openjdk-amd64/lib/jexec to provide /usr/bin/jexec (jexec) in auto mode
Setting up openjdk-21-jre:amd64 (21.0.3+9-1ubuntu1~22.04.1) ...
Setting up ca-certificates-java (20190909ubuntu1.2) ...
head: cannot open '/etc/ssl/certs/java/cacerts' for reading: No such file or directory
Adding debian:Security_Communication_Root_CA.pem
Adding debian:Izenpe.com.pem
Adding debian:HARICA_TLS_RSA_Root_CA_2021.pem
Adding debian:ACCVRAIZ1.pem
Adding debian:Microsoft_ECC_Root_Certificate_Authority_2017.pem
Adding debian:Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068_2.pem
Adding debian:D-TRUST_EV_Root_CA_1_2020.pem
Adding debian:QuoVadis_Root_CA_3_G3.pem
Adding debian:D-TRUST_BR_Root_CA_1_2020.pem
Adding debian:GlobalSign_Root_CA.pem
Adding debian:UCA_Extended_Validation_Root.pem
Adding debian:ePKI_Root_Certification_Authority.pem
Adding debian:Certainly_Root_E1.pem
Adding debian:Comodo_AAA_Services_root.pem
Adding debian:TunTrust_Root_CA.pem
Adding debian:Trustwave_Global_ECC_P256_Certification_Authority.pem
Adding debian:CA_Disig_Root_R2.pem
Adding debian:AC_RAIZ_FNMT-RCM_SERVIDORES_SEGUROS.pem
Adding debian:AC_RAIZ_FNMT-RCM.pem
Adding debian:UCA_Global_G2_Root.pem
Adding debian:SSL.com_Root_Certification_Authority_RSA.pem
Adding debian:Hongkong_Post_Root_CA_3.pem
Adding debian:OISTE_WISeKey_Global_Root_GB_CA.pem
Adding debian:USERTrust_ECC_Certification_Authority.pem
Adding debian:Actalis_Authentication_Root_CA.pem
Adding debian:TWCA_Global_Root_CA.pem
Adding debian:HARICA_TLS_ECC_Root_CA_2021.pem
Adding debian:Starfield_Root_Certificate_Authority_-_G2.pem
Adding debian:GlobalSign_Root_E46.pem
Adding debian:T-TeleSec_GlobalRoot_Class_2.pem
Adding debian:ISRG_Root_X2.pem
Adding debian:Security_Communication_ECC_RootCA1.pem
Adding debian:Buypass_Class_3_Root_CA.pem
Adding debian:Microsec_e-Szigno_Root_CA_2009.pem
Adding debian:Microsoft_RSA_Root_Certificate_Authority_2017.pem
Adding debian:AffirmTrust_Premium_ECC.pem
Adding debian:Certum_EC-384_CA.pem
Adding debian:Amazon_Root_CA_3.pem
Adding debian:GLOBALTRUST_2020.pem
Adding debian:GTS_Root_R3.pem
Adding debian:Go_Daddy_Root_Certificate_Authority_-_G2.pem
Adding debian:Certum_Trusted_Network_CA_2.pem
Adding debian:Entrust.net_Premium_2048_Secure_Server_CA.pem
Adding debian:Certigna.pem
Adding debian:Security_Communication_RootCA3.pem
Adding debian:AffirmTrust_Premium.pem
Adding debian:emSign_Root_CA_-_C1.pem
Adding debian:Starfield_Services_Root_Certificate_Authority_-_G2.pem
Adding debian:Baltimore_CyberTrust_Root.pem
Adding debian:Telia_Root_CA_v2.pem
Adding debian:DigiCert_Global_Root_G2.pem
Adding debian:Amazon_Root_CA_2.pem
Adding debian:GDCA_TrustAUTH_R5_ROOT.pem
Adding debian:TWCA_Root_Certification_Authority.pem
Adding debian:DigiCert_Assured_ID_Root_G2.pem
Adding debian:Go_Daddy_Class_2_CA.pem
Adding debian:ISRG_Root_X1.pem
Adding debian:e-Szigno_Root_CA_2017.pem
Adding debian:T-TeleSec_GlobalRoot_Class_3.pem
Adding debian:SSL.com_EV_Root_Certification_Authority_ECC.pem
Adding debian:GlobalSign_Root_CA_-_R3.pem
Adding debian:IdenTrust_Public_Sector_Root_CA_1.pem
Adding debian:CFCA_EV_ROOT.pem
Adding debian:DigiCert_TLS_RSA4096_Root_G5.pem
Adding debian:DigiCert_Global_Root_CA.pem
Adding debian:TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.pem
Adding debian:OISTE_WISeKey_Global_Root_GC_CA.pem
Adding debian:COMODO_RSA_Certification_Authority.pem
Adding debian:GlobalSign_ECC_Root_CA_-_R5.pem
Adding debian:Certigna_Root_CA.pem
Adding debian:emSign_ECC_Root_CA_-_G3.pem
Adding debian:COMODO_Certification_Authority.pem
Adding debian:DigiCert_Trusted_Root_G4.pem
Adding debian:NetLock_Arany_=Class_Gold=_Főtanúsítvány.pem
Adding debian:E-Tugra_Global_Root_CA_RSA_v3.pem
Adding debian:Secure_Global_CA.pem
Adding debian:DigiCert_TLS_ECC_P384_Root_G5.pem
Adding debian:HiPKI_Root_CA_-_G1.pem
Adding debian:D-TRUST_Root_Class_3_CA_2_EV_2009.pem
Adding debian:Certum_Trusted_Network_CA.pem
Adding debian:vTrus_Root_CA.pem
Adding debian:AffirmTrust_Commercial.pem
Adding debian:certSIGN_ROOT_CA.pem
Adding debian:COMODO_ECC_Certification_Authority.pem
Adding debian:Amazon_Root_CA_1.pem
Adding debian:D-TRUST_Root_Class_3_CA_2_2009.pem
Adding debian:Certum_Trusted_Root_CA.pem
Adding debian:DigiCert_Assured_ID_Root_G3.pem
Adding debian:Amazon_Root_CA_4.pem
Adding debian:Entrust_Root_Certification_Authority_-_G2.pem
Adding debian:XRamp_Global_CA_Root.pem
Adding debian:Entrust_Root_Certification_Authority.pem
Adding debian:TeliaSonera_Root_CA_v1.pem
Adding debian:GTS_Root_R2.pem
Adding debian:AffirmTrust_Networking.pem
Adding debian:QuoVadis_Root_CA_3.pem
Adding debian:E-Tugra_Certification_Authority.pem
Adding debian:SecureSign_RootCA11.pem
Adding debian:Buypass_Class_2_Root_CA.pem
Adding debian:DigiCert_Assured_ID_Root_CA.pem
Adding debian:GlobalSign_ECC_Root_CA_-_R4.pem
Adding debian:E-Tugra_Global_Root_CA_ECC_v3.pem
Adding debian:SSL.com_Root_Certification_Authority_ECC.pem
Adding debian:emSign_ECC_Root_CA_-_C3.pem
Adding debian:certSIGN_Root_CA_G2.pem
Adding debian:IdenTrust_Commercial_Root_CA_1.pem
Adding debian:GTS_Root_R4.pem
Adding debian:Trustwave_Global_ECC_P384_Certification_Authority.pem
Adding debian:SZAFIR_ROOT_CA2.pem
Adding debian:SwissSign_Gold_CA_-_G2.pem
Adding debian:Hongkong_Post_Root_CA_1.pem
Adding debian:vTrus_ECC_Root_CA.pem
Adding debian:GlobalSign_Root_CA_-_R6.pem
Adding debian:Atos_TrustedRoot_2011.pem
Adding debian:SwissSign_Silver_CA_-_G2.pem
Adding debian:Starfield_Class_2_CA.pem
Adding debian:DigiCert_Global_Root_G3.pem
Adding debian:Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.pem
Adding debian:Certainly_Root_R1.pem
Adding debian:Entrust_Root_Certification_Authority_-_G4.pem
Adding debian:QuoVadis_Root_CA_2_G3.pem
Adding debian:SSL.com_EV_Root_Certification_Authority_RSA_R2.pem
Adding debian:Entrust_Root_Certification_Authority_-_EC1.pem
Adding debian:Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem
Adding debian:QuoVadis_Root_CA_2.pem
Adding debian:NAVER_Global_Root_Certification_Authority.pem
Adding debian:GTS_Root_R1.pem
Adding debian:ANF_Secure_Server_Root_CA.pem
Adding debian:Security_Communication_RootCA2.pem
Adding debian:DigiCert_High_Assurance_EV_Root_CA.pem
Adding debian:Trustwave_Global_Certification_Authority.pem
Adding debian:Hellenic_Academic_and_Research_Institutions_RootCA_2015.pem
Adding debian:QuoVadis_Root_CA_1_G3.pem
Adding debian:SecureTrust_CA.pem
Adding debian:USERTrust_RSA_Certification_Authority.pem
Adding debian:GlobalSign_Root_R46.pem
Adding debian:emSign_Root_CA_-_G1.pem
done.
Setting up cypher-shell (1:5.20.0) ...
Setting up neo4j (1:5.20.0) ...
Adding system user `neo4j' (UID 118) ...
Adding new user `neo4j' (UID 118) with group `neo4j' ...
Not creating home directory `/var/lib/neo4j'.
Processing triggers for fontconfig (2.13.1-4.2ubuntu5) ...
Processing triggers for hicolor-icon-theme (0.17-2) ...
Processing triggers for libc-bin (2.35-0ubuntu3.4) ...
Processing triggers for man-db (2.10.2-1) ...
Not building database; man-db/auto-update is not 'true'.
Processing triggers for ca-certificates (20230311ubuntu0.22.04.1) ...
Updating certificates in /etc/ssl/certs...
0 added, 0 removed; done.
Running hooks in /etc/ca-certificates/update.d...
done.
done.
Scanning processes...
Scanning linux images...
Running kernel seems to be up-to-date.
No services need to be restarted.
No containers need to be restarted.
No user sessions are running outdated binaries.
No VM guests are running outdated hypervisor (qemu) binaries on this host.
ubuntu@150-136-217-63:~$ sudo systemctl enable --now neo4j
Synchronizing state of neo4j.service with SysV service script with /lib/systemd/systemd-sysv-install.
Executing: /lib/systemd/systemd-sysv-install enable neo4j
Created symlink /etc/systemd/system/multi-user.target.wants/neo4j.service → /lib/systemd/system/neo4j.service.
ubuntu@150-136-217-63:~$ sudo vim /etc/
Display all 228 possibilities? (y or n)
ubuntu@150-136-217-63:~$ sudo vim /etc/neo4j/
neo4j-admin.conf neo4j.conf server-logs.xml user-logs.xml
ubuntu@150-136-217-63:~$ sudo vim /etc/neo4j/neo4j.conf
ubuntu@150-136-217-63:~$ cypher-shell
username: neo4j
password:
Password change required
new password:
confirm password:
Connected to Neo4j using Bolt protocol version 5.4 at neo4j://localhost:7687 as user neo4j.
Type :help for a list of available commands or :exit to exit the shell.
Note that Cypher queries must end with a semicolon.
neo4j@neo4j> quit
Interrupted (Note that Cypher queries must end with a semicolon. Type :exit to exit the shell.)
neo4j@neo4j>
Interrupted (Note that Cypher queries must end with a semicolon. Type :exit to exit the shell.)
neo4j@neo4j> :exit
Bye!
ubuntu@150-136-217-63:~$ systemctl restart neo4j
==== AUTHENTICATING FOR org.freedesktop.systemd1.manage-units ===
Authentication is required to restart 'neo4j.service'.
Authenticating as: ubuntu
Password:
ubuntu@150-136-217-63:~$ sudo systemctl restart neo4j
ubuntu@150-136-217-63:~$ netstat -nltp
(Not all processes could be identified, non-owned process info
will not be shown, you would have to be root to see it all.)
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:45337 0.0.0.0:* LISTEN 3368/code-5437499fe
tcp 0 0 127.0.0.1:42717 0.0.0.0:* LISTEN 1674/python3
tcp 0 0 127.0.0.1:37553 0.0.0.0:* LISTEN 1674/python3
tcp 0 0 127.0.0.1:40353 0.0.0.0:* LISTEN -
tcp 0 0 127.0.0.1:61209 0.0.0.0:* LISTEN -
tcp 0 0 127.0.0.1:60523 0.0.0.0:* LISTEN 1674/python3
tcp 0 0 127.0.0.1:60107 0.0.0.0:* LISTEN 1674/python3
tcp 0 0 127.0.0.1:55189 0.0.0.0:* LISTEN 1674/python3
tcp 0 0 127.0.0.1:53469 0.0.0.0:* LISTEN 1674/python3
tcp 0 0 127.0.0.1:7000 0.0.0.0:* LISTEN 902/python3
tcp 0 0 127.0.0.53:53 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN -
tcp6 0 0 :::111 :::* LISTEN -
tcp6 0 0 :::22 :::* LISTEN -
ubuntu@150-136-217-63:~$ systemctl status neo4j
● neo4j.service - Neo4j Graph Database
Loaded: loaded (/lib/systemd/system/neo4j.service; enabled; vendor preset: enabled)
Active: active (running) since Sun 2024-06-23 07:45:40 UTC; 16s ago
Main PID: 8656 (java)
Tasks: 115 (limit: 272733)
Memory: 747.6M
CPU: 28.535s
CGroup: /system.slice/neo4j.service
├─8656 /usr/bin/java -Xmx128m -classpath "/usr/share/neo4j/lib/*:/usr/share/neo4j/etc:/usr/share/neo4j/repo/*" -Dapp.name=neo4j -Dapp.pid=8656 -Dapp.repo=/usr/share/neo4j/repo -Dapp.home=/usr/>
└─8704 /usr/lib/jvm/java-21-openjdk-amd64/bin/java -cp "/var/lib/neo4j/plugins/*:/etc/neo4j/*:/usr/share/neo4j/lib/*" -XX:+UseG1GC -XX:-OmitStackTraceInFastThrow -XX:+AlwaysPreTouch -XX:+Unloc>
ubuntu@150-136-217-63:~$ s^Cstemctl status neo4j
ubuntu@150-136-217-63:~$ sudo netstat -nltp
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:45337 0.0.0.0:* LISTEN 3368/code-5437499fe
tcp 0 0 127.0.0.1:42717 0.0.0.0:* LISTEN 1674/python3
tcp 0 0 127.0.0.1:37553 0.0.0.0:* LISTEN 1674/python3
tcp 0 0 127.0.0.1:40353 0.0.0.0:* LISTEN 879/cloudflared
tcp 0 0 127.0.0.1:61209 0.0.0.0:* LISTEN 889/python3
tcp 0 0 127.0.0.1:60523 0.0.0.0:* LISTEN 1674/python3
tcp 0 0 127.0.0.1:60107 0.0.0.0:* LISTEN 1674/python3
tcp 0 0 127.0.0.1:55189 0.0.0.0:* LISTEN 1674/python3
tcp 0 0 127.0.0.1:53469 0.0.0.0:* LISTEN 1674/python3
tcp 0 0 127.0.0.1:7000 0.0.0.0:* LISTEN 902/python3
tcp 0 0 127.0.0.53:53 0.0.0.0:* LISTEN 855/systemd-resolve
tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN 1/init
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 1173/sshd: /usr/sbi
tcp6 0 0 :::111 :::* LISTEN 1/init
tcp6 0 0 :::22 :::* LISTEN 1173/sshd: /usr/sbi
tcp6 0 0 :::7687 :::* LISTEN 8704/java
tcp6 0 0 :::7474 :::* LISTEN 8704/java
ubuntu@150-136-217-63:~$ curl localhost:7474
{"bolt_routing":"neo4j://localhost:7687","transaction":"http://localhost:7474/db/{databaseName}/tx","bolt_direct":"bolt://localhost:7687","neo4j_version":"5.20.0","neo4j_edition":"community"}ubuntu@150-136-217-63:~$ sudo ufw status
Status: inactive
ubuntu@150-136-217-63:~$ curl ifconfig.me^C
ubuntu@150-136-217-63:~$ ip add
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eno1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether 02:00:17:0a:2f:2d brd ff:ff:ff:ff:ff:ff
altname enp7s0
inet 10.19.89.196/20 brd 10.19.95.255 scope global eno1
valid_lft forever preferred_lft forever
inet6 fe80::17ff:fe0a:2f2d/64 scope link
valid_lft forever preferred_lft forever
3: docker0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default
link/ether 02:42:81:24:90:d0 brd ff:ff:ff:ff:ff:ff
inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0
valid_lft forever preferred_lft forever
ubuntu@150-136-217-63:~$ curl ifconfig.me
150.136.217.63ubuntu@150-136-217-63:~$ cypher-shell -u neo4j -p t-M@_[Q5401-1a_e
Connected to Neo4j using Bolt protocol version 5.4 at neo4j://localhost:7687 as user neo4j.
Type :help for a list of available commands or :exit to exit the shell.
Note that Cypher queries must end with a semicolon.
neo4j@neo4j> ALTER USER neo4j SET PASSWORD USPhD@WW1920
;
Invalid input 'USPhD': expected "CHANGE", "\"", "\'" or a parameter (line 1, column 31 (offset: 30))
"ALTER USER neo4j SET PASSWORD USPhD@WW1920"
^
neo4j@neo4j> ALTER USER neo4j SET PASSWORD "USPhD@WW1920";
0 rows
ready to start consuming query after 329 ms, results consumed after another 0 ms
neo4j@neo4j> :exit
Bye!
Copyright © 2003-2013 www.wpsshop.cn 版权所有,并保留所有权利。