EFK Tutorial - ElasticSearch Role Separation
Build a high performance + high availability ES architecture by separating the data, ingest, master roles of elasticsearch
Author: "The Wolf of Britain", welcome to reprint and submit
Catalog
_Purpose_Architecture_Step description_elasticsearch-data deployment_elasticsearch-ingest deployment_elasticsearch-master deployment
purpose ...
Added by Cameri on Fri, 15 Nov 2019 03:17:43 +0200
Nginx Optimization - Hide Version Number and Page Cache Time
Configure Nginx Hidden Version Number
In a production environment, you need to hide the Nginx version number to avoid securityLeakage of vulnerability
View Method< Use fiddler I to view Nginx version number on Windows clientUse "curl-I web address" command to view in CentOS system
Nginx Hide Version Number MethodModify Profile Met ...
Added by freshneco on Wed, 13 Nov 2019 21:10:09 +0200
PHP Framework websocket Active Message Push
Laravel combines swoole to implement a function that actively triggers message pushing, which allows you to send custom messages to all members of the template message, instead of sending messages through the client, and listens to the messages sent in the message on the service side for business logic.
Active Message Push ImplementationNormall ...
Added by neptun on Tue, 12 Nov 2019 05:17:24 +0200
grpc - use golang to take you through a set of RPC services
Next, PHP is used as the client to call the server of golang.
Install the grpc go plugin
The grpc PHP plugin can help us to automatically generate the client stub class library (equivalent to the API file), which is convenient for us to introduce and call directly. Otherwise, it is not convenient to only generate the entity class of service / r ...
Added by starphp on Sat, 09 Nov 2019 00:01:02 +0200
The construction of NAT load balancing
**Four virtual machines
Client
lvs server
rs1 server
172.22.144.188
VIP-172.22.144.59 DIP-192.168.49.2
RIP-192.168.49.3
rs2 server
RIP-192.168.49.4
**Note that LVS server needs to play the role of scheduling and routing. Two IP addresses need to be enabled
Whether lvs server, rs1 server and rs2 server are in time synchronization ...
Added by davemwohio on Tue, 05 Nov 2019 18:05:56 +0200
Using Nginx echo module to test location matching priority
The nginx echo module allows users to directly output strings in nginx, which is convenient for users to debug when configuring nginx. Document address: https://www.nginx.com/resources/wiki/modules/echo/ , github address: https://github.com/openresty/echo-nginx-module
1, installation
Here, take nginx version: nginx/1.10.3 (Ubuntu) of ubuntu ...
Added by sufian on Sun, 03 Nov 2019 06:01:12 +0200
Deploying ELK log analysis system based on Docker container
Deploy elk log analysis system to consume more computer hardware. If you use virtual machine for test deployment, it is recommended to allocate more hardware resources. Otherwise, when elk container is running, it will not work normally. I will allocate 5G of memory to the docker host, four CPU s.
I. environmental preparation
I use a docker ho ...
Added by Jack Sparrow on Sat, 02 Nov 2019 01:55:08 +0200
http module of nginx
html pages
[root@python html]# echo first > first/1.txt
[root@python html]# echo second > second/1.txt
[root@python html]# echo third > second/1.txt
[root@python html]# echo second > second/1.txt
[root@python html]# echo third > third/1.txt
url address rewrite
rewrite Module: rewrite instruction
sysntax : rewrit ...
Added by Jack_Slocum on Fri, 01 Nov 2019 18:13:32 +0200
SSH autologin | SSH management tool
sshAutoLogin
It can make your ssh login simply as well as efficiently on Mac or Linux.
we are frequently using ssh login remote server by terminal. We will find a headache that is often entering a repetitive command line. Fuck~ it's a waste of time!Maybe you cloud write configure of alias on profile. enenen~ Finally, I determined to write a tim ...
Added by garcon on Thu, 31 Oct 2019 16:14:03 +0200
Linux Firewall basic instance
This is a basic operation example of Firewalld, using the Firewalld graphical operation interface for access control operation.
Experimental topology
requirement analysis
First, the topology involves two regions. Here, work and public regions are used to make corresponding rules.
1. icmp is forbidden in the work area. 192.168.100.101 is allo ...
Added by EdN on Wed, 23 Oct 2019 07:40:07 +0300