In this case, Elasticsearch. And because Elasticsearch can be down or struggling, or the network can be down, the shipper would ideally be able to buffer and retry
Logstash Alternatives: Pros & Cons of 5 Log Shippers [2019] - Sematext - 0 views
-
-
Logstash is typically used for collecting, parsing, and storing logs for future use as part of log management.
-
Logstash’s biggest con or “Achille’s heel” has always been performance and resource consumption (the default heap size is 1GB).
- ...37 more annotations...
Load balancing with ProxySQL - 0 views
-
accepts incoming traffic from MySQL clients and forwards it to backend MySQL servers.
手动安装 Prometheus · 从 Docker 到 Kubernetes 进阶手册 - 1 views
-
参数storage.tsdb.path指定了 TSDB 数据的存储路径、通过storage.tsdb.retention设置了保留多长时间的数据,还有下面的web.enable-admin-api参数可以用来开启对 admin api 的访问权限,参数web.enable-lifecycle非常重要,用来开启支持热更新的,有了这个参数之后,prometheus.yml 配置文件只要更新了,通过执行localhost:9090/-/reload就会立即生效,所以一定要加上这个参数。
-
Prometheus 由多个组件组成,但是其中许多组件是可选的: Prometheus Server:用于抓取指标、存储时间序列数据 exporter:暴露指标让任务来抓 pushgateway:push 的方式将指标数据推送到该网关 alertmanager:处理报警的报警组件 adhoc:用于数据查询
-
scrape_configs 用于控制 prometheus 监控哪些资源。
- ...6 more annotations...
Kubernetes 基本概念 · Kubernetes指南 - 0 views
-
Container(容器)是一种便携式、轻量级的操作系统级虚拟化技术。它使用 namespace 隔离不同的软件运行环境,并通过镜像自包含软件的运行环境,从而使得容器可以很方便的在任何地方运行。
-
每个应用程序用容器封装,管理容器部署就等同于管理应用程序部署。+
-
Pod 是一组紧密关联的容器集合,它们共享 PID、IPC、Network 和 UTS namespace,是 Kubernetes 调度的基本单位。
- ...9 more annotations...
Apache OpenMeetings Project - Home - 0 views
Running rootless Podman as a non-root user | Enable Sysadmin - 0 views
-
By default, rootless Podman runs as root within the container.
-
the processes in the container have the default list of namespaced capabilities which allow the processes to act like root inside of the user namespace
-
the directory is owned by UID 26, but UID 26 is not mapped into the container and is not the same UID that Postgres runs with while in the container.
- ...8 more annotations...
Little Snitch - 1 views
-
"As soon as you're connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to your benefit. But sometimes, like in case of tracking software, trojans or other malware, they don't. But you don't notice anything, because all of this happens invisibly under the hood."
Tagging AWS resources - AWS General Reference - 0 views
-
assign metadata to your AWS resources in the form of tags.
-
a user-defined key and value
-
Tag keys are case sensitive.
- ...17 more annotations...
Ingress - Kubernetes - 0 views
-
An API object that manages external access to the services in a cluster, typically HTTP.
-
load balancing
-
SSL termination
- ...62 more annotations...
CDC and DDL Changes to Source Tables - Microsoft® SQL Server 2012 Unleashed [... - 1 views
-
One of the common challenges when capturing data changes from your source tables is how to handle DDL changes to the source tables.
-
Change Data Capture
Auto DevOps | GitLab - 0 views
-
Scan for vulnerabilities and security flaws.
-
Auto DevOps starts by building and testing your application.
-
preview your changes in a per-branch basis.
- ...9 more annotations...
The dangers of UFW + Docker | Viktor's ramblings - 0 views
-
UFW doesn’t tell you iptables true state (not shocking, but still).
« First
‹ Previous
221 - 235 of 235
Showing 20▼ items per page