Beats, Logstash and Kibana knowledge summary
Beats
Introduction to Beats:
Lightweight data collector: Beats platform integrates a variety of single purpose data collectors. They come from hundreds or thousands of machines The device and system send data to Logstash or Elasticsearch.Beats series: full category collector to handle all data types. ① Filebeat: log file ② Metricbeat: ind ...
Posted by mullz on Mon, 03 Jan 2022 09:35:18 +0100
Basic introduction to LVS
colony
Cluster overview
What is a cluster
A group of computers interconnected through a high-speed network and managed in a single system modeMany servers come together to provide the same service, which looks like a server to the clientRelatively high benefits in performance, reliability and flexibility can be obtained at a lower costTa ...
Posted by fansa on Mon, 03 Jan 2022 09:12:48 +0100
RH358 manage DHCP and IP address assignment -- configure IPv6 address assignment
RH358 manage DHCP and IP address assignment – configure IPv6 address assignment
This chapter describes how to configure DHCP to allocate IPv6 addresses. Although it is still a bit weak, it can be used for understanding and learning.
1. Overview of IPv6 address automatic configuration
IPv6 has many ways to configure network int ...
Posted by byenary on Mon, 03 Jan 2022 08:02:00 +0100
umount.nfs4: /mnt/nfs/code404: device is busy
introduce
When performing an NFS mount, you may see the device busy. In this case, you must force the uninstall in an appropriate way.
View mounted partitions
Using df -h to view partitions
# df -h
Filesystem Size Used Avail Use% Mounted on
/dev/vda1 20G 3G 18G 7% /
devtmpfs 236M 0 236M 0% /dev
tmpfs 245M 0 245M 0% /dev/shm
tm ...
Posted by music_man on Mon, 03 Jan 2022 07:47:19 +0100
Large file upload second transmission breakpoint continuous transmission fragment upload
preface
File upload is an old topic. When the file is relatively small, you can directly convert the file into a byte stream and upload it to the server. However, when the file is relatively large, it is not a good way to upload it in an ordinary way. After all, few people will tolerate it. When the file is uploaded to half of the interrupt, I ...
Posted by SaMike on Mon, 03 Jan 2022 07:43:56 +0100
Web Service Setup - Apache
Web Server Setup
Introduction to Web Services
The process by which a server interacts with a browser using the HTTP protocol
The browser determines the URL of the web pageBrowser requests IP address resolved by domain name serverThe browser requests a TCP link from the host's port 80The server confirms the connection request and the proc ...
Posted by jpoladsky on Mon, 03 Jan 2022 05:35:45 +0100
Computer network -- Cisco Packet Tracer experiment
Computer network -- Cisco Packet Tracer experiment
This experiment is based on Chess song teaching network complete
There are 15 experiments in this part, which need to be completed by Cisco packet tracker software. Please first understand the concepts of VLSM, CIDR, RIP, OSPF, VLAN, STP, NAT and DHCP to enable network planning and configur ...
Posted by chuddyuk on Mon, 03 Jan 2022 04:54:53 +0100
Simple understanding of IO and NIO
Main references: NIO learning documentation This great God writes very well and is easy to understand!!!!!!!!
1, NIO and IO contrast memory
IONIOFlow orientedCache orientedBlocking IOnon-blocking IO selector
Stream oriented and cache oriented
Flow oriented Java IO is stream oriented, which means you read one or more bytes from a stream at a ...
Posted by hnxuying on Mon, 03 Jan 2022 03:34:23 +0100
How to use Linux Netlink
How to use Linux Netlink
1, Netlink user mode construction process
1. Create a netlink based on a custom port_ Test socket.
#define NETLINK_TEST 99
skfd = socket(AF_NETLINK, SOCK_RAW, NETLINK_TEST); //Create a socket using user defined protocol NETLINK_TEST.
if (skfd == -1) {
perror("create socket error\n");
return -1;
}
2. Initialize s ...
Posted by 051119 on Sun, 02 Jan 2022 21:54:47 +0100
Linux mail server deep learning
Email sending process
E-mail is a kind of information transmission behavior that uses the network to transmit information to remote servers. We usually use "account @ host name" for e-mail. However, due to "malicious mail" and "spam flooding", we are not allowed to directly use the host's ip address to send mail. ...
Posted by Cazrin on Sun, 02 Jan 2022 15:27:24 +0100