EFK Tutorial - ElasticSearch Role Separation

Build a high performance + high availability ES architecture by separating the data, ingest, master roles of elasticsearch Author: "The Wolf of Britain", welcome to reprint and submit Catalog _Purpose_Architecture_Step description_elasticsearch-data deployment_elasticsearch-ingest deployment_elasticsearch-master deployment purpose ...

Added by Cameri on Fri, 15 Nov 2019 03:17:43 +0200

Nginx Optimization - Hide Version Number and Page Cache Time

Configure Nginx Hidden Version Number In a production environment, you need to hide the Nginx version number to avoid securityLeakage of vulnerability View Method< Use fiddler I to view Nginx version number on Windows clientUse "curl-I web address" command to view in CentOS system Nginx Hide Version Number MethodModify Profile Met ...

Added by freshneco on Wed, 13 Nov 2019 21:10:09 +0200

PHP Framework websocket Active Message Push

Laravel combines swoole to implement a function that actively triggers message pushing, which allows you to send custom messages to all members of the template message, instead of sending messages through the client, and listens to the messages sent in the message on the service side for business logic. Active Message Push ImplementationNormall ...

Added by neptun on Tue, 12 Nov 2019 05:17:24 +0200

grpc - use golang to take you through a set of RPC services

Next, PHP is used as the client to call the server of golang. Install the grpc go plugin The grpc PHP plugin can help us to automatically generate the client stub class library (equivalent to the API file), which is convenient for us to introduce and call directly. Otherwise, it is not convenient to only generate the entity class of service / r ...

Added by starphp on Sat, 09 Nov 2019 00:01:02 +0200

The construction of NAT load balancing

**Four virtual machines Client lvs server rs1 server 172.22.144.188 VIP-172.22.144.59 DIP-192.168.49.2 RIP-192.168.49.3 rs2 server RIP-192.168.49.4 **Note that LVS server needs to play the role of scheduling and routing. Two IP addresses need to be enabled Whether lvs server, rs1 server and rs2 server are in time synchronization ...

Added by davemwohio on Tue, 05 Nov 2019 18:05:56 +0200

Using Nginx echo module to test location matching priority

The nginx echo module allows users to directly output strings in nginx, which is convenient for users to debug when configuring nginx. Document address: https://www.nginx.com/resources/wiki/modules/echo/ , github address: https://github.com/openresty/echo-nginx-module 1, installation Here, take nginx version: nginx/1.10.3 (Ubuntu) of ubuntu ...

Added by sufian on Sun, 03 Nov 2019 06:01:12 +0200

Deploying ELK log analysis system based on Docker container

Deploy elk log analysis system to consume more computer hardware. If you use virtual machine for test deployment, it is recommended to allocate more hardware resources. Otherwise, when elk container is running, it will not work normally. I will allocate 5G of memory to the docker host, four CPU s. I. environmental preparation I use a docker ho ...

Added by Jack Sparrow on Sat, 02 Nov 2019 01:55:08 +0200

http module of nginx

html pages [root@python html]# echo first > first/1.txt [root@python html]# echo second > second/1.txt [root@python html]# echo third > second/1.txt [root@python html]# echo second > second/1.txt [root@python html]# echo third > third/1.txt url address rewrite rewrite Module: rewrite instruction sysntax : rewrit ...

Added by Jack_Slocum on Fri, 01 Nov 2019 18:13:32 +0200

SSH autologin | SSH management tool

sshAutoLogin It can make your ssh login simply as well as efficiently on Mac or Linux. we are frequently using ssh login remote server by terminal. We will find a headache that is often entering a repetitive command line. Fuck~ it's a waste of time!Maybe you cloud write configure of alias on profile. enenen~ Finally, I determined to write a tim ...

Added by garcon on Thu, 31 Oct 2019 16:14:03 +0200

Linux Firewall basic instance

This is a basic operation example of Firewalld, using the Firewalld graphical operation interface for access control operation. Experimental topology requirement analysis First, the topology involves two regions. Here, work and public regions are used to make corresponding rules. 1. icmp is forbidden in the work area. 192.168.100.101 is allo ...

Added by EdN on Wed, 23 Oct 2019 07:40:07 +0300