ElasticSearch之虚拟内存
1.ElasticSearch之安装2.ElasticSearch之查看集群的参数3.ElasticSearch之健康状态4.ElasticSearch的日志配置5.ElasticSearch之cat aliases API6.ElasticSearch之Health API7.ElasticSearch之Nodes info API8.ElasticSearch之系统关键配置9.ElasticSearch之cat allocation API10.ElasticSearch之cat anomaly detectors API11.ElasticSearch之cat component templates API12.ElasticSearch之配置13.ElasticSearch之cat count API14.ElasticSearch之cat data frame analytics API15.ElasticSearch之禁用交换分区
16.ElasticSearch之虚拟内存
17.ElasticSearch之文件描述符的数量18.ElasticSearch之线程的数量19.ElasticSearch之cat datafeeds API20.ElasticSearch之cat fielddata API21.ElasticSearch之cat health API22.ElasticSearch之cat indices API23.ElasticSearch之cat master API24.ElasticSearch之cat nodeattrs API25.ElasticSearch之线程池26.ElasticSearch之cat nodes API27.ElasticSearch之cat pending tasks API28.ElasticSearch之cat plugins API29.ElasticSearch之cat recovery API30.ElasticSearch之cat repositories API31.ElasticSearch之cat segments API32.ElasticSearch之cat shards API33.ElasticSearch之cat task management API34.ElasticSearch之cat templates API35.ElasticSearch之cat thread pool API36.ElasticSearch之Search settings37.ElasticSearch之cat trained model API38.ElasticSearch之cat transforms API39.ElasticSearch之Merge40.ElasticSearch之Force merge API41.ElasticSearch之Task management API42.ElasticSearch之Slow Log43.ElasticSearch之Analyze index disk usage API44.ElasticSearch之Clear cache API45.ElasticSearch之Create index API46.ElasticSearch之Clone index API47.ElasticSearch之Close index API48.ElasticSearch之Open index API49.ElasticSearch之Delete index API50.ElasticSearch之Exists API51.ElasticSearch之Get index API52.ElasticSearch之Get index settings API53.ElasticSearch之Index stats API54.ElasticSearch之Refresh API55.ElasticSearch之Shard request cache settings56.ElasticSearch之Node query cache settings57.ElasticSearch之Index modules58.ElasticSearch之集群中的节点59.ElasticSearch之网络配置查看当前Linux
系统中vm.max_map_count
变量的值,命令如下:
sysctl vm.max_map_count
执行结果的样例,如下:
vm.max_map_count = 65530
修改参数vm.max_map_count
的值,命令如下
sysctl -w vm.max_map_count=262144
执行结果的样例,如下:
vm.max_map_count = 262144
为保证重启Linux
系统后vm.max_map_count
的取值依然生效,可以修改Linux
系统配置文件/etc/sysctl.conf
,追加如下内容:
vm.max_map_count=262144
配置文件/etc/sysctl.conf
的内容,样例如下:
# # /etc/sysctl.conf - Configuration file for setting system variables # See /etc/sysctl.d/ for additional system variables. # See sysctl.conf (5) for information. # #kernel.domainname = example.com # Uncomment the following to stop low-level messages on console #kernel.printk = 3 4 1 3 ##############################################################3 # Functions previously found in netbase # # Uncomment the next two lines to enable Spoof protection (reverse-path filter) # Turn on Source Address Verification in all interfaces to # prevent some spoofing attacks #net.ipv4.conf.default.rp_filter=1 #net.ipv4.conf.all.rp_filter=1 # Uncomment the next line to enable TCP/IP SYN cookies # See http://lwn.net/Articles/277146/ # Note: This may impact IPv6 TCP sessions too #net.ipv4.tcp_syncookies=1 # Uncomment the next line to enable packet forwarding for IPv4 #net.ipv4.ip_forward=1 # Uncomment the next line to enable packet forwarding for IPv6 # Enabling this option disables Stateless Address Autoconfiguration # based on Router Advertisements for this host #net.ipv6.conf.all.forwarding=1 ################################################################### # Additional settings - these settings can improve the network # security of the host and prevent against some network attacks # including spoofing attacks and man in the middle attacks through # redirection. Some network environments, however, require that these # settings are disabled so review and enable them as needed. # # Do not accept ICMP redirects (prevent MITM attacks) #net.ipv4.conf.all.accept_redirects = 0 #net.ipv6.conf.all.accept_redirects = 0 # _or_ # Accept ICMP redirects only for gateways listed in our default # gateway list (enabled by default) # net.ipv4.conf.all.secure_redirects = 1 # # Do not send ICMP redirects (we are not a router) #net.ipv4.conf.all.send_redirects = 0 # # Do not accept IP source route packets (we are not a router) #net.ipv4.conf.all.accept_source_route = 0 #net.ipv6.conf.all.accept_source_route = 0 # # Log Martian Packets #net.ipv4.conf.all.log_martians = 1 # ################################################################### # Magic system request Key # 0=disable, 1=enable all, >1 bitmask of sysrq functions # See https://www.kernel.org/doc/html/latest/admin-guide/sysrq.html # for what other values do #kernel.sysrq=438 vm.swappiness=20 vm.max_map_count=262144
已知Elasticsearch
进程的pid
为19483
,查看Elasticsearch
进程当前占用的mmap
的数量,命令样例如下:
wc -l /proc/19483/maps
执行结果的样例,如下:
414 /proc/19483/maps
相关资料
本文来自博客园,作者:jackieathome,转载请注明原文链接:https://www.cnblogs.com/jackieathome/p/17855065.html
合集:
ElasticSearch
【推荐】国内首个AI IDE,深度理解中文开发场景,立即下载体验Trae
【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】抖音旗下AI助手豆包,你的智能百科全书,全免费不限次数
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步
· 阿里最新开源QwQ-32B,效果媲美deepseek-r1满血版,部署成本又又又降低了!
· SQL Server 2025 AI相关能力初探
· AI编程工具终极对决:字节Trae VS Cursor,谁才是开发者新宠?
· 开源Multi-agent AI智能体框架aevatar.ai,欢迎大家贡献代码
· Manus重磅发布:全球首款通用AI代理技术深度解析与实战指南