WSS logging database grows very fast and it cause the storage problem most of the time in SharePoint Server 2010.To reduce the size of the logging database or to purge the old data from the logging database we can these steps.To find the Logging Database Name go to following path:-Login to central administration, monit
thinkphp Debug mode and Logging overview, thinkphp logging
This article is described as the use of thinkphp debug mode and logging, which plays a very important role in the development of thinkphp project, it is necessary to understand and grasp. Here's how:
1, can be set in config.php, the default is off state.
The opening method is as follows:
' App_debug ' =
Brief introduction:Description: This module provides files, HTTP Get/post,smtp,socket and other ways to achieve logging, and even automatic implementation of specific logging methodsQuick installation:Pip Install--upgrade loggingProcessing Flow:650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M00/88/13/wKioL1fpGgWT6WX0AADB8mVHrYk784.png "title=" Logging_flow.png "alt=" Wkiol1fpggwt6wx0aadb8mvhryk784.p
Detailed description of the logging module and logging
Many programs need to record logs every day. In addition, the information contained in the logs contains normal program access logs, and may also have errors, warnings, and other information output, the python logging module provides standard log interfaces. You can store logs in various formats.debug(),info
Python logging module instance and improvement, python logging instance
Python prints all attribute values of an object:
def prn_obj(obj): print '\n'.join(['%s:%s' % item for item in obj.__dict__.items()])
Python logger object attributes (obtained by the above functions)
Name: get_dataparent:
Some logs cannot be output
File: logger. conf
[formatters]keys=default [formatter_default]format=%(asctime)s - %(
This is a creation in
Article, where the information may have evolved or changed.
K8s Offline installation package Three-step installation, simple to unbelievable
Kubeadm Source Code Analysis
To say the truth, Kubeadm code is sincere, the quality is not very high.
A few key points to first talk about some of the core things Kubeadm did:
Kubeadm Generate certificate in/etc/kubernetes/pki directory
Kubeadm generate a static pod Yaml configurati
Introduction and practice of pod in kubernetes
The concept of podDetailed pod explanation can refer to k8s official website, the concept of pod mainly has the following points:(1) Pod is the smallest and simplest unit that you can create and deploy in Kubernetes. A pod represents a process that runs in a cluster;(2) How to use pod in kubrenetes cluster;(3) How to manage multiple containers in pod
Unde
[TOC]Introduction to Kubernetes DispatchingIn addition to having the Kubernetes cluster scheduler automatically select a node for the pod resource (the default schedule is that the resources are sufficient and the load is as average as possible), there are situations where we want to have more control over how the pod should be dispatched. For example, some of the machines in the cluster are better configur
Kubernetes is Google 's Open source container cluster management system. It is built on Docker technology and provides a whole set of functions, such as resource scheduling, deployment operation, service discovery, expansion and contraction capacity, for containerized applications, which can be regarded as Mini-paas platform based on container technology. The purpose of this article is to comb the architecture, concepts, and basic workflows of
Official Document: HTTPS://WWW.KUBERNETES.ORG.CN/DOC-11The Kubernetes cluster contains the node agent Kubelet and master components (APIs, scheduler, etc), all based on a distributed storage system. The following diagram is an architectural diagram of the kubernetes.Kubernetes nodeIn this system architecture diagram, we divide the service into services running on the work nodes and the services that make up the cluster-level dashboard.The
Service discovery mechanism Kubernetes provides two ways to discover the service:1. Environment Variables When the pod is running, Kubernetes writes the information for the service that existed before This method requires that the pod must be started after the service. The pod that was started before the service will not have an environment variable for that service. There is no such limit in the way
This is a creation in
Article, where the information may have evolved or changed.
Kris Nova, of Microsoft, shares lessons on over-engineering from she experience contributing to Kubernetes Kops. In hers spare time, she runs a Kubernetes special Interest Group bringing Kubernetes to AWS, all and working on Microsoft Acs. She ' s writing a book called Cloud Native
The role of Kubernetes Scheduler is to bind controller manager to a new pod according to a specific scheduling algorithm and scheduling policy to a suitable node in the cluster, and to write the binding information to the ETCD.I. Deployment OF SchedulerThe following generates the Kube-scheduler Kubeconfig file, as follows:cd/etc/kubernetesexport kube_apiserver="https://192.168.15.200:6443"Configure clusterKubectl config set---certificate-authority=/et
Brief Description:Using the Rke tool, on the 192.168.3.161 machine, create a kubernetes cluster with two nodes (192.168.3.162 and 192.168.3.163). Rke automatically creates KUBE_CONFIG_CLUSTER.YML configuration files in the/home/user directory.On another server (192.168.3.160), run the Rancher Server 2.0 container. After running, use the https://192.168.3.160 address to access Rancher Server 2.0 preview. (Note: No longer the previous 8080 port)In the R
Brief description:Using the Rke tool, on the 192.168.3.161 machine, create a kubernetes cluster with two nodes (192.168.3.162 and 192.168.3.163). Rke automatically creates KUBE_CONFIG_CLUSTER.YML configuration files in the/home/user directory.On another server (192.168.3.160), run the Rancher Server 2.0 container. After running, use the https://192.168.3.160 address to access Rancher Server 2.0 preview. (Note: No longer the previous 8080 port)In the R
previous Chapters Kubernetes All operations we are using command line tools kubectl completed. To provide a richer user experience, Kubernetes also developed a WEB-based Dashboard that enables users to deploy containerized applications with Kubernetes Dashboard, monitor the status of applications, perform troubleshooting tasks, and manage
Various exception information is inevitable during the operation of any system. to easily find the key to the problem, you need to create a log for the system to help analyze and find the problem, there are many methods to create logs. Here we will introduce one of the most popular methods. Logging, commons-logging, and log4 must be introduced. logging is a packa
Containerized technology (containerization).You may have a lot of doubts: what exactly is a container and how does it work? What does Docker and kubernetes mean, and what is the use of Google Container engine and managed VMS? How are they related, and how can we build a powerful service through containers and make them available in a large-scale cluster of production environments? How can you get business value by using this technology? Well, we don't
Services deployed by users on Kubernetes typically run on private networks, and pod and service provide parameters such as Hostport,nodeport to expose these service ports to K8S nodes for user access. There are obvious drawbacks to this approach:1) Easy to occupy excessive host port;2) service ports exposed to multiple hosts increasing the difficulty of firewalls and security configuration3) The default hostport,nodeport mode does not function as load
1. The following error was reported during the creation of Nginx pod:#kubectlcreate-F Nginx-pod.yaml from " Nginx-pod.yaml " " Nginx " is for default/default is automatically created and added to the service accountWorkaround:1> Modify the Kube_admission_control parameter in the/etc/kubernetes/apiserver file.Before modification:Kube_admission_control="--admission_control=namespacelifecycle,namespaceexists,limitranger, Securitycontextdeny,serviceacco
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.