Beats, Logstash and Kibana knowledge summary

Beats Introduction to Beats: Lightweight data collector: Beats platform integrates a variety of single purpose data collectors. They come from hundreds or thousands of machines The device and system send data to Logstash or Elasticsearch.Beats series: full category collector to handle all data types. ① Filebeat: log file ② Metricbeat: ind ...

Posted by mullz on Mon, 03 Jan 2022 09:35:18 +0100

Basic introduction to LVS

colony Cluster overview What is a cluster A group of computers interconnected through a high-speed network and managed in a single system modeMany servers come together to provide the same service, which looks like a server to the clientRelatively high benefits in performance, reliability and flexibility can be obtained at a lower costTa ...

Posted by fansa on Mon, 03 Jan 2022 09:12:48 +0100

RH358 manage DHCP and IP address assignment -- configure IPv6 address assignment

RH358 manage DHCP and IP address assignment – configure IPv6 address assignment This chapter describes how to configure DHCP to allocate IPv6 addresses. Although it is still a bit weak, it can be used for understanding and learning. 1. Overview of IPv6 address automatic configuration IPv6 has many ways to configure network int ...

Posted by byenary on Mon, 03 Jan 2022 08:02:00 +0100

umount.nfs4: /mnt/nfs/code404: device is busy

introduce When performing an NFS mount, you may see the device busy. In this case, you must force the uninstall in an appropriate way. View mounted partitions Using df -h to view partitions # df -h Filesystem Size Used Avail Use% Mounted on /dev/vda1 20G 3G 18G 7% / devtmpfs 236M 0 236M 0% /dev tmpfs 245M 0 245M 0% /dev/shm tm ...

Posted by music_man on Mon, 03 Jan 2022 07:47:19 +0100

Large file upload second transmission breakpoint continuous transmission fragment upload

preface File upload is an old topic. When the file is relatively small, you can directly convert the file into a byte stream and upload it to the server. However, when the file is relatively large, it is not a good way to upload it in an ordinary way. After all, few people will tolerate it. When the file is uploaded to half of the interrupt, I ...

Posted by SaMike on Mon, 03 Jan 2022 07:43:56 +0100

Web Service Setup - Apache

Web Server Setup Introduction to Web Services The process by which a server interacts with a browser using the HTTP protocol The browser determines the URL of the web pageBrowser requests IP address resolved by domain name serverThe browser requests a TCP link from the host's port 80The server confirms the connection request and the proc ...

Posted by jpoladsky on Mon, 03 Jan 2022 05:35:45 +0100

Computer network -- Cisco Packet Tracer experiment

Computer network -- Cisco Packet Tracer experiment This experiment is based on Chess song teaching network complete There are 15 experiments in this part, which need to be completed by Cisco packet tracker software. Please first understand the concepts of VLSM, CIDR, RIP, OSPF, VLAN, STP, NAT and DHCP to enable network planning and configur ...

Posted by chuddyuk on Mon, 03 Jan 2022 04:54:53 +0100

Simple understanding of IO and NIO

Main references: NIO learning documentation This great God writes very well and is easy to understand!!!!!!!! 1, NIO and IO contrast memory IONIOFlow orientedCache orientedBlocking IOnon-blocking IO selector Stream oriented and cache oriented Flow oriented Java IO is stream oriented, which means you read one or more bytes from a stream at a ...

Posted by hnxuying on Mon, 03 Jan 2022 03:34:23 +0100

How to use Linux Netlink

How to use Linux Netlink 1, Netlink user mode construction process 1. Create a netlink based on a custom port_ Test socket. #define NETLINK_TEST 99 skfd = socket(AF_NETLINK, SOCK_RAW, NETLINK_TEST); //Create a socket using user defined protocol NETLINK_TEST. if (skfd == -1) { perror("create socket error\n"); return -1; } 2. Initialize s ...

Posted by 051119 on Sun, 02 Jan 2022 21:54:47 +0100

Linux mail server deep learning

Email sending process E-mail is a kind of information transmission behavior that uses the network to transmit information to remote servers. We usually use "account @ host name" for e-mail. However, due to "malicious mail" and "spam flooding", we are not allowed to directly use the host's ip address to send mail. ...

Posted by Cazrin on Sun, 02 Jan 2022 15:27:24 +0100