我对 py-elasticsearch 批量 @Diolor 解决方案的工作原理感到困惑 /sf/ask/1420213931/ -python,但我想使用普通的 es.bulk()
我的代码:
from elasticsearch import Elasticsearch
es = Elasticsearch()
doc = '''\n {"host":"logsqa","path":"/logs","message":"test test","@timestamp":"2014-10-02T10:11:25.980256","tags":["multiline","mydate_0.005"]} \n'''
result = es.bulk(index="logstash-test", doc_type="test", body=doc)
Run Code Online (Sandbox Code Playgroud)
错误是:
No handlers could be found for logger "elasticsearch"
Traceback (most recent call last):
File "./log-parser-perf.py", line 55, in <module>
insertToES()
File "./log-parser-perf.py", line 46, in insertToES
res = es.bulk(index="logstash-test", doc_type="test", body=doc)
File "/usr/local/lib/python2.7/dist-packages/elasticsearch-1.0.0-py2.7.egg/elasticsearch/client/utils.py", line 70, in _wrapped
return func(*args, params=params, **kwargs)
File "/usr/local/lib/python2.7/dist-packages/elasticsearch-1.0.0-py2.7.egg/elasticsearch/client/__init__.py", line 570, in bulk
params=params, body=self._bulk_body(body))
File "/usr/local/lib/python2.7/dist-packages/elasticsearch-1.0.0-py2.7.egg/elasticsearch/transport.py", …Run Code Online (Sandbox Code Playgroud) 我正在尝试执行此命令:
ps -eo pid,args --cols=10000 | awk '/\/opt\/logstash\/logstash-1.5.3\// && $1 != PROCINFO["pid"] { print $1 }'
Run Code Online (Sandbox Code Playgroud)
蒙山ansible -m外壳模块(未工作示例):
ansible -m shell -a '"'ps -eo pid,args --cols=10000 | awk '/\/opt\/logstash\/logstash-1.5.3\// && $1 != PROCINFO[\'pid\'] { print $1 }' '"' all
Run Code Online (Sandbox Code Playgroud)
一种方法是将其放入文件中,但作为命令运行仍然很好 - 有什么想法吗?
安全组“显示 UDP 端口已打开”,但应拒绝连接。
我有一个实例 vpn2-a
vpn2-a i-xxxxxxxxx 11.11.11.11
Run Code Online (Sandbox Code Playgroud)
我想限制对该实例的 UDP 端口 1194 的访问,以接受来自以下私有 IP 地址的连接:
55.55.55.55/32, 66.66.66.66/32
Run Code Online (Sandbox Code Playgroud)
我已创建 SG 并附加到实例 vpn2-a
vpn_1_2-vpn12-security-group
1194 udp 55.55.55.55/32, 66.66.66.66/32
Run Code Online (Sandbox Code Playgroud)
1. 测试是否正常:
我确实从允许的vpn1-a 55.55.55.55执行一些“端口打开”测试
vpn1-a$ $ nc -vv 11.11.11.11 1194 -u
Connection to 11.11.11.11 1194 port [udp/openvpn] succeeded!
Run Code Online (Sandbox Code Playgroud)
太好了,现在让我们看看该端口是否被随机 IP阻止:
RANDOM_HOST$ nc -vv 11.11.11.11 1194 -u
Connection to 11.11.11.11 1194 port [udp/openvpn] succeeded!
Run Code Online (Sandbox Code Playgroud)
^^ 怎么办????估计是被拒绝了!!!请解释一下
2、调试:
这让我很困惑,但我确实做了一些测试:
在 vpn2-a 实例中:
vpn2-a# /etc/init.d/openvpn stop
Run Code Online (Sandbox Code Playgroud)
如您所见 - 端口 1194 上没有任何内容正在侦听
vpn2-a## netstat …Run Code Online (Sandbox Code Playgroud)