MMS 监控代理配置选项说明(9)
这节来看看MMS监控代理配置文件的一些参数。 连接设置 MMS监控代理需要与MMS服务器进行通讯,下面的连接参数是必须的。 mmsApiKey 类型:字符串MMS组的MMS代理API密钥。可以在MMS界面上的代理设置选中查看。如:mmsApiKey= ABC123 mmsBaseUrl 类型:字符串MM
这节来看看MMS监控代理配置文件的一些参数。连接设置
MMS监控代理需要与MMS服务器进行通讯,下面的连接参数是必须的。mmsApiKey
类型:字符串 MMS组的MMS代理API密钥。可以在MMS界面上的代理设置选中查看。如:mmsApiKey= ABC123mmsBaseUrl
类型:字符串 MMS?Web服务器的URL。如:mmsBaseUrl=http://mms.ttlsa.com:8080HTTP代理设置
httpProxy
类型:字符串 通过代理服务器连接到MMS HTTP服务,在此设置代理服务器的URL。如:httpProxy=http://example-proxy.com:8080。监控代理2.3.1版本引入的。MongoDB SSL设置
当监控代理通过SSL连接mongodb时,需要设置这些配置。useSslForAllConnections
类型:布尔 设置为true,所有连接以SSL加密通讯。那么sslTrustedServerCertificates 参数就必须的了。sslTrustedServerCertificates
类型:字符串 指定证书路径。如:sslTrustedServerCertificates=/etc/mongodb-mms/mongodb-certs.pemsslRequireValidServerCertificates
类型:布尔 使用此选项可以禁用证书验证。MongoDB?Kerberos设置
krb5Principal
类型:字符串 代理使用的Kerberos主体。如:krb5Principal=mmsagent/myhost@EXAMPLE.COMkrb5Keytab
类型:字符串 指定Kerberos主要密钥文件绝对路径。如:krb5Keytab=/etc/mongodb-mms/mms-monitoring-agent.keytabMMS服务器SSL设置
监控代理与MMS服务器通过SSL通讯。sslTrustedMMSServerCertificate
默认情况下,监控代理会使用已安装在系统上的受信任的根CA。如果代理找不到信任的根CA,手动配置这些设置。 如果MMS HTTP服务使用的是自签的SSL证书此参数是必需的。 指定证书路径。如:sslTrustedMMSServerCertificate=/etc/mongodb-mms/mms-certs.pemsslRequireValidMMSServerCertificates
类型:布尔 设置该值为false禁用证书验证。Munin 设置
监控节点的硬件信息。对节点的监控后面再说。enableMunin
类型:布尔 如果不想监控代理通过Munin-node来收集硬件信息,设置为false。默认值为true。不推荐的配置
以下是不推荐的配置。MongoDB身份验证设置
如果所有被监视的MongoDB实例使用相同的MongoDB-CR用户名和密码,可以使用这些设置。 这里设置的用户名和密码将覆盖MMS界面的配置。 代理验证需求请关注后面的内容。globalAuthUsername
类型:字符串 监控代理用来连接mongodb的用户名。如:globalAuthUsername=mms-monitoring-agentglobalAuthPassword
类型:字符串 globalAuthUsername用户的密码。如:globalAuthPassword=somePassword原文地址:MMS 监控代理配置选项说明(9), 感谢原作者分享。

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Title: The working principle and configuration method of GDM in Linux systems In Linux operating systems, GDM (GNOMEDisplayManager) is a common display manager used to control graphical user interface (GUI) login and user session management. This article will introduce the working principle and configuration method of GDM, as well as provide specific code examples. 1. Working principle of GDM GDM is the display manager in the GNOME desktop environment. It is responsible for starting the X server and providing the login interface. The user enters

Understanding Linux Bashrc: Function, Configuration and Usage In Linux systems, Bashrc (BourneAgainShellruncommands) is a very important configuration file, which contains various commands and settings that are automatically run when the system starts. The Bashrc file is usually located in the user's home directory and is a hidden file. Its function is to customize the Bashshell environment for the user. 1. Bashrc function setting environment

How to configure a workgroup in Win11 A workgroup is a way to connect multiple computers in a local area network, which allows files, printers, and other resources to be shared between computers. In Win11 system, configuring a workgroup is very simple, just follow the steps below. Step 1: Open the "Settings" application. First, click the "Start" button of the Win11 system, and then select the "Settings" application in the pop-up menu. You can also use the shortcut "Win+I" to open "Settings". Step 2: Select "System" In the Settings app, you will see multiple options. Please click the "System" option to enter the system settings page. Step 3: Select "About" In the "System" settings page, you will see multiple sub-options. Please click

Title: How to configure and install FTPS in Linux system, specific code examples are required. In Linux system, FTPS is a secure file transfer protocol. Compared with FTP, FTPS encrypts the transmitted data through TLS/SSL protocol, which improves Security of data transmission. In this article, we will introduce how to configure and install FTPS in a Linux system and provide specific code examples. Step 1: Install vsftpd Open the terminal and enter the following command to install vsftpd: sudo

MyBatisGenerator is a code generation tool officially provided by MyBatis, which can help developers quickly generate JavaBeans, Mapper interfaces and XML mapping files that conform to the database table structure. In the process of using MyBatisGenerator for code generation, the setting of configuration parameters is crucial. This article will start from the perspective of configuration parameters and deeply explore the functions of MyBatisGenerator.

Monitoring errors in Laravel is an important part of improving application stability. During the development process, various errors will inevitably be encountered, and how to detect and resolve these errors in a timely manner is one of the keys to ensuring the normal operation of the application. Laravel provides a wealth of tools and functions to help developers monitor and handle errors. This article will introduce some of the important methods and attach specific code examples. 1. Use logging Logging is one of the important means of monitoring errors. Laravel has a powerful logging system built-in, developers

DRBD (DistributedReplicatedBlockDevice) is an open source solution for achieving data redundancy and high availability. Here is the tutorial to install and configure DRBD on CentOS7 system: Install DRBD: Open a terminal and log in to the CentOS7 system as administrator. Run the following command to install the DRBD package: sudoyuminstalldrbd Configure DRBD: Edit the DRBD configuration file (usually located in the /etc/drbd.d directory) to configure the settings for DRBD resources. For example, you can define the IP addresses, ports, and devices of the primary node and backup node. Make sure there is a network connection between the primary node and the backup node.

When we use win11 system, we sometimes need to check the configuration of our computer, but many users are also asking where to check the configuration of win11 computer? In fact, the method is very simple. Users can directly open the system information under settings, and then view the computer configuration information. Let this site carefully introduce to users how to find win11 computer configuration information. How to find win11 computer configuration information. Method 1: 1. Click Start and open Computer Settings. 3. You can view computer configuration information on this page. 2. In the command prompt window, enter systeminfo and press Enter to view the computer configuration.
