Filters - Ansible Documentation - 0 views
Logstash Alternatives: Pros & Cons of 5 Log Shippers [2019] - Sematext - 0 views
-
In this case, Elasticsearch. And because Elasticsearch can be down or struggling, or the network can be down, the shipper would ideally be able to buffer and retry
-
Logstash is typically used for collecting, parsing, and storing logs for future use as part of log management.
-
Logstash’s biggest con or “Achille’s heel” has always been performance and resource consumption (the default heap size is 1GB).
- ...37 more annotations...
Load balancing with ProxySQL - 0 views
-
accepts incoming traffic from MySQL clients and forwards it to backend MySQL servers.
手动安装 Prometheus · 从 Docker 到 Kubernetes 进阶手册 - 1 views
-
参数storage.tsdb.path指定了 TSDB 数据的存储路径、通过storage.tsdb.retention设置了保留多长时间的数据,还有下面的web.enable-admin-api参数可以用来开启对 admin api 的访问权限,参数web.enable-lifecycle非常重要,用来开启支持热更新的,有了这个参数之后,prometheus.yml 配置文件只要更新了,通过执行localhost:9090/-/reload就会立即生效,所以一定要加上这个参数。
-
Prometheus 由多个组件组成,但是其中许多组件是可选的: Prometheus Server:用于抓取指标、存储时间序列数据 exporter:暴露指标让任务来抓 pushgateway:push 的方式将指标数据推送到该网关 alertmanager:处理报警的报警组件 adhoc:用于数据查询
-
scrape_configs 用于控制 prometheus 监控哪些资源。
- ...6 more annotations...
Connection and Privileges Needed - 0 views
-
Percona XtraBackup needs to be able to connect to the database server and perform operations on the server and the datadir when creating a backup, when preparing in some scenarios and when restoring it.
-
When xtrabackup is used, there are two actors involved: the user invoking the program - a system user - and the user performing action in the database server - a database user.
-
these are different users in different places, even though they may have the same username.
- ...1 more annotation...
The Backup Cycle - Full Backups - 0 views
-
xtrabackup will not overwrite existing files, it will fail with operating system error 17, file exists.
-
Log copying thread checks the transactional log every second to see if there were any new log records written that need to be copied, but there is a chance that the log copying thread might not be able to keep up with the amount of writes that go to the transactional logs, and will hit an error when the log records are overwritten before they could be read.
-
It is safe to cancel at any time, because xtrabackup does not modify the database.
- ...15 more annotations...
Memory inside Linux containers | Fabio Kung - 0 views
-
/sys/fs/cgroup/ is the recommended location for cgroup hierarchies, but it is not a standard.
-
most container specific metrics are available at the cgroup filesystem via /path/to/cgroup/memory.stat, /path/to/cgroup/memory.usage_in_bytes, /path/to/cgroup/memory.limit_in_bytes and others.
-
cat /sys/fs/cgroup/memory/memory.stat
- ...3 more annotations...
Incremental Backup - 0 views
-
xtrabackup supports incremental backups, which means that they can copy only the data that has changed since the last backup.
-
You can perform many incremental backups between each full backup, so you can set up a backup process such as a full backup once a week and an incremental backup every day, or full backups every day and incremental backups every hour.
-
each InnoDB page contains a log sequence number, or LSN. The LSN is the system version number for the entire database. Each page’s LSN shows how recently it was changed.
- ...18 more annotations...
Run the Docker daemon as a non-root user (Rootless mode) | Docker Documentation - 0 views
-
running the Docker daemon and containers as a non-root user
-
Rootless mode does not require root privileges even during the installation of the Docker daemon
-
Rootless mode executes the Docker daemon and containers inside a user namespace.
- ...9 more annotations...
Deploy a Replica Set - MongoDB Manual - 0 views
-
Three member replica sets provide enough redundancy to survive most network partitions and other system failures.
Convert a Standalone to a Replica Set - MongoDB Manual - 0 views
-
Restart the instance. Use the --replSet option to specify the name of the new replica set.
Deploy Replica Set With Keyfile Authentication - MongoDB Manual - 0 views
-
Keyfiles are bare-minimum forms of security and are best suited for testing or development environments.
-
With keyfile authentication, each mongod instances in the replica set uses the contents of the keyfile as the shared password for authenticating other members in the deployment.
-
On UNIX systems, the keyfile must not have group or world permissions.
- ...3 more annotations...
Services | GitLab - 0 views
-
The services keyword defines a Docker image that runs during a job linked to the Docker image that the image keyword defines. This allows you to access the service image during build time.
kubeadm init | Kubernetes - 0 views
kubeadm join | Kubernetes - 0 views
Helm | Built-in Objects - 0 views
-
The built-in values always begin with a capital letter.
-
use only initial lower case letters in order to distinguish local names from those built-in.
-
Files.Get is a function for getting a file by name
- ...3 more annotations...
Helm | Values Files - 0 views
-
a subchart, the values.yaml file of a parent chart
-
Individual parameters passed with --set
-
The list above is in order of specificity: values.yaml is the default, which can be overridden by a parent chart's values.yaml, which can in turn be overridden by a user-supplied values file, which can in turn be overridden by --set parameters.
- ...4 more annotations...
Helm | Template Functions and Pipelines - 0 views
-
When injecting strings from the .Values object into the template, we ought to quote these strings.
-
Helm has over 60 available functions. Some of them are defined by the Go template language itself. Most of the others are part of the Sprig template library
-
the "Helm template language" as if it is Helm-specific, it is actually a combination of the Go template language, some extra functions, and a variety of wrappers to expose certain objects to the templates.
- ...10 more annotations...
« First
‹ Previous
161 - 180 of 200
Next ›
Showing 20▼ items per page