当前位置:网站首页>Logstash start -r parameter
Logstash start -r parameter
2022-06-23 19:36:00 【zhangphil】
logstash The general command style to start is :
logstash -f "my.conf"
If you add -r Parameters :
logstash -r -f "my.conf"Once my.conf Configuration file changes ,logstash It will automatically load the modified my.conf file .
边栏推荐
- Design of hardware switch with programmable full function rate limiter
- Matrix analysis notes (II)
- Online text entity extraction capability helps applications analyze massive text data
- [one by one series] identityserver4 (VIII) uses entityframework core to persist data
- Robust extraction of specific signals with time structure (Part 1)
- Advanced network accounting notes (VII)
- GaussDB(DWS) 数据库智能监控运维服务-节点监控指标
- [comparative learning] koa JS, gin and asp Net core - Middleware
- Cloud security daily 220623: the red hat database management system has found an arbitrary code execution vulnerability and needs to be upgraded as soon as possible
- Approximate fair queuing on programmable switches reading notes
猜你喜欢

Helix QAC is updated to 2022.1 and will continue to provide high standard compliance coverage

How to write a great online user manual in 7 steps

混沌工程,了解一下

Hotline salon issue 26 - cloud security session

Robust extraction of specific signals with time structure (Part 2)

JDBC 在性能测试中的应用

ElastricSearch第二弹之分片原理

Kotlin jetpack compose Tab的渲染 AnimatedVisibility的使用

Hardware development notes (6): basic process of hardware development, making a USB to RS232 module (5): creating USB package library and associating principle graphic devices

LeetCode 每日一题——30. 串联所有单词的子串
随机推荐
科班出身,结果外包都不要
Hardware development notes (6): basic process of hardware development, making a USB to RS232 module (5): creating USB package library and associating principle graphic devices
SAP实施项目上的内部顾问与外部顾问,相互为难还是相互成就?
How to make a list sort according to the order of another list
【One by One系列】IdentityServer4(二)使用Client Credentials保护API资源
Advanced network accounting notes (6)
[one by one series] spa of identityserver4 (VI) authorization code process principle
Netcf summary
Check four WiFi encryption standards: WEP, WPA, WPA2 and WPA3
如何通过7个步骤编写出色的在线用户手册
How to avoid the "black swan" incident in the gene field: a security war behind a preventive "recall"
打新债 要求 打新债安全吗
How long do you need to prepare for the PMP Exam?
LeetCode 473. 火柴拼正方形
打新债好不好 打新债安全吗
[cloud trends] the four highlights of Huawei cloud store brand new release are here
JDBC 在性能测试中的应用
Check four WiFi encryption standards: WEP, WPA, WPA2 and WPA3
Application of JDBC in performance test
Application de JDBC dans les essais de performance