search
HomeDatabaseMysql TutorialMMS 主机管理(16)

MMS 主机管理(16)

Jun 07, 2016 pm 04:38 PM
mmsHostcreateAliasLabelmonitormanage

创建主机别名 可以为监控的主机创建别名或标签,这些别名是任意的,当现有的主机名不能充分描述主机信息的情况下非常有用的。在大多数情况下,主机名基于自动发现以主机名作为别名。设置别名步骤如下: ?单击Hosts, Mongos, Configs标签 选择要更改的主机列

创建主机别名

可以为监控的主机创建别名或标签,这些别名是任意的,当现有的主机名不能充分描述主机信息的情况下非常有用的。 在大多数情况下,主机名基于自动发现以主机名作为别名。 设置别名步骤如下:
  1. ?单击Hosts, Mongos, Configs标签
  2. 选择要更改的主机列表右侧齿轮图标,选择编辑主机
  3. 出现编辑主机窗口,单击Display name选项卡
  4. 输入要显示的名称后,点提交按钮
前面有改过,这里就不再贴图了。

删除主机

MMS自动发现过程中添加的主机不能忽略。要从MMS仪表板上删除主机,点击要删除的主机列表右边的齿轮图片,选择删除主机。 如果删除后又要添加,就需要手工添加,自动发现不了的。 mms-mh-1

Profile Databases

MMS监控可以收集MongoDB的数据分析器提供有关性能和数据库操作的统计信息。 在主机统计信息页面下部,可以查看profile 等级,如: mms-mh-2 注意以下问题:
  1. Profile 数据包含敏感信息,包括数据库查询的内容。
  2. 分析器消耗系统资源,会对MongoDB的性能产生负面影响。
允许MMS监控收集profile 数据,步骤如下:
  1. 单击Hosts, Mongos, Configs标签
  2. 选择需要开启的主机,点击主机列表右边的齿轮图标,选择编辑主机
  3. 出现编辑主机窗口,选择Profiling 标签
  4. 单击右下角标签开启
  5. 使用mongo shell的setProfilingLevel命令启动数据库分析
监控代理尝试尽量减少对系统的影响。?如果进行资源密集型操作,MMS监控会缩减收集数据的频率。 mms-mh-3 过一段时间,就会有数据收集到。 mms-mh-4 如果要删除profile数据: mms-mh-6

主机标签

可以创建主机标签,将某些主机放在这个标签下,来缩减MMS显示的主机列表。当有大量的主机,要查看一小组主机比较方便。 添加和编辑主机标签:
  1. 单击?Hosts, Mongos, Configs标签
  2. 直接点击all hosts链接。在?Last Ping列上方
  3. 从下拉列表中选择编辑标签,将出现Host Labels窗口
  4. 要编辑或删除现有的主机标签,点击铅笔图标或垃圾桶图标
  5. 要添加新的主机标识,输入名称,然后单击添加标签按钮
mms-mh-5 添加主机到主机标签中:
  1. 单击?Hosts, Mongos, ?Configs 标签
  2. 选择要添加主机的右侧,单击齿轮图标,选择编辑主机
  3. 出现编辑主机窗口,单击主机标签选项卡
  4. 以选择一个或多个标签分配给该主机
mms-mh-7 显示某个主机标签下的所有主机:
  1. 单击?Hosts, Mongos, ?Configs标签
  2. 直接点击all hosts链接。在?Last Ping列上方
  3. 选择相应的主机标签。将只显示属于该主机标签下的主机
mms-mh-8 mms-mh-9
Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
What Are the Limitations of Using Views in MySQL?What Are the Limitations of Using Views in MySQL?May 14, 2025 am 12:10 AM

MySQLviewshavelimitations:1)Theydon'tsupportallSQLoperations,restrictingdatamanipulationthroughviewswithjoinsorsubqueries.2)Theycanimpactperformance,especiallywithcomplexqueriesorlargedatasets.3)Viewsdon'tstoredata,potentiallyleadingtooutdatedinforma

Securing Your MySQL Database: Adding Users and Granting PrivilegesSecuring Your MySQL Database: Adding Users and Granting PrivilegesMay 14, 2025 am 12:09 AM

ProperusermanagementinMySQLiscrucialforenhancingsecurityandensuringefficientdatabaseoperation.1)UseCREATEUSERtoaddusers,specifyingconnectionsourcewith@'localhost'or@'%'.2)GrantspecificprivilegeswithGRANT,usingleastprivilegeprincipletominimizerisks.3)

What Factors Influence the Number of Triggers I Can Use in MySQL?What Factors Influence the Number of Triggers I Can Use in MySQL?May 14, 2025 am 12:08 AM

MySQLdoesn'timposeahardlimitontriggers,butpracticalfactorsdeterminetheireffectiveuse:1)Serverconfigurationimpactstriggermanagement;2)Complextriggersincreasesystemload;3)Largertablesslowtriggerperformance;4)Highconcurrencycancausetriggercontention;5)M

MySQL: Is it safe to store BLOB?MySQL: Is it safe to store BLOB?May 14, 2025 am 12:07 AM

Yes,it'ssafetostoreBLOBdatainMySQL,butconsiderthesefactors:1)StorageSpace:BLOBscanconsumesignificantspace,potentiallyincreasingcostsandslowingperformance.2)Performance:LargerrowsizesduetoBLOBsmayslowdownqueries.3)BackupandRecovery:Theseprocessescanbe

MySQL: Adding a user through a PHP web interfaceMySQL: Adding a user through a PHP web interfaceMay 14, 2025 am 12:04 AM

Adding MySQL users through the PHP web interface can use MySQLi extensions. The steps are as follows: 1. Connect to the MySQL database and use the MySQLi extension. 2. Create a user, use the CREATEUSER statement, and use the PASSWORD() function to encrypt the password. 3. Prevent SQL injection and use the mysqli_real_escape_string() function to process user input. 4. Assign permissions to new users and use the GRANT statement.

MySQL: BLOB and other no-sql storage, what are the differences?MySQL: BLOB and other no-sql storage, what are the differences?May 13, 2025 am 12:14 AM

MySQL'sBLOBissuitableforstoringbinarydatawithinarelationaldatabase,whileNoSQLoptionslikeMongoDB,Redis,andCassandraofferflexible,scalablesolutionsforunstructureddata.BLOBissimplerbutcanslowdownperformancewithlargedata;NoSQLprovidesbetterscalabilityand

MySQL Add User: Syntax, Options, and Security Best PracticesMySQL Add User: Syntax, Options, and Security Best PracticesMay 13, 2025 am 12:12 AM

ToaddauserinMySQL,use:CREATEUSER'username'@'host'IDENTIFIEDBY'password';Here'showtodoitsecurely:1)Choosethehostcarefullytocontrolaccess.2)SetresourcelimitswithoptionslikeMAX_QUERIES_PER_HOUR.3)Usestrong,uniquepasswords.4)EnforceSSL/TLSconnectionswith

MySQL: How to avoid String Data Types common mistakes?MySQL: How to avoid String Data Types common mistakes?May 13, 2025 am 12:09 AM

ToavoidcommonmistakeswithstringdatatypesinMySQL,understandstringtypenuances,choosetherighttype,andmanageencodingandcollationsettingseffectively.1)UseCHARforfixed-lengthstrings,VARCHARforvariable-length,andTEXT/BLOBforlargerdata.2)Setcorrectcharacters

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software