博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
Kafka日志配置
阅读量:2389 次
发布时间:2019-05-10

本文共 3533 字,大约阅读时间需要 11 分钟。

1、问题描述

在server.properties中配置了log.dirs值,表示kafka数据的存放目录,而非Kafka的日志目录。

[root@node1 kafka_2.11-1.0.1]# vi config/server.properties
log.dirs=/data/kafka

Kafka运行时日志默认输出到$KAFKA_HOME/logs目录下,容易撑爆分区,造成操作系统崩溃。需要将日志输出到指定分区,比如/var/log目录下。

2、解决办法

(1)首先停止Kafka

[root@node1 kafka_2.11-1.0.1]# bin/kafka-server-stop.sh

(2)修改$KAFKA_HOME/bin/kafka-run-class.sh

[root@node1 kafka_2.11-1.0.1]# vi bin/kafka-run-class.sh

定位到LOG_DIR

# Log directory to useif [ "x$LOG_DIR" = "x" ]; then  LOG_DIR="$base_dir/logs"fi

增加一行,修改为

LOG_DIR=/var/log/kafka# Log directory to useif [ "x$LOG_DIR" = "x" ]; then  LOG_DIR="$base_dir/logs"fi

(3)修改log4j.properties

[root@node1 kafka_2.11-1.0.1]# sed -i 's/log4j.rootLogger=INFO/log4j.rootLogger=WARN/' config/log4j.properties

查看发现log4j.rootLogger的值已经修改为WARN级别

# Unspecified loggers and loggers with additivity=true output to server.log and stdout# Note that INFO only applies to unspecified loggers, the log level of the child logger is used otherwiselog4j.rootLogger=WARN, stdout, kafkaAppender
[root@node1 kafka_2.11-1.0.1]# vi config/log4j.properties

将最后几行的TRACE修改为INFO

修改前

# Uncomment the lines below and change log4j.logger.kafka.network.RequestChannel$ to TRACE for additional output# related to the handling of requests#log4j.logger.kafka.network.Processor=TRACE, requestAppender#log4j.logger.kafka.server.KafkaApis=TRACE, requestAppender#log4j.additivity.kafka.server.KafkaApis=falselog4j.logger.kafka.network.RequestChannel$=WARN, requestAppenderlog4j.additivity.kafka.network.RequestChannel$=falselog4j.logger.kafka.controller=TRACE, controllerAppenderlog4j.additivity.kafka.controller=falselog4j.logger.kafka.log.LogCleaner=INFO, cleanerAppenderlog4j.additivity.kafka.log.LogCleaner=falselog4j.logger.state.change.logger=TRACE, stateChangeAppenderlog4j.additivity.state.change.logger=false# Access denials are logged at INFO level, change to DEBUG to also log allowed accesseslog4j.logger.kafka.authorizer.logger=INFO, authorizerAppenderlog4j.additivity.kafka.authorizer.logger=false

修改后

# Uncomment the lines below and change log4j.logger.kafka.network.RequestChannel$ to TRACE for additional output# related to the handling of requests#log4j.logger.kafka.network.Processor=TRACE, requestAppender#log4j.logger.kafka.server.KafkaApis=TRACE, requestAppender#log4j.additivity.kafka.server.KafkaApis=falselog4j.logger.kafka.network.RequestChannel$=WARN, requestAppenderlog4j.additivity.kafka.network.RequestChannel$=falselog4j.logger.kafka.controller=INFO, controllerAppenderlog4j.additivity.kafka.controller=falselog4j.logger.kafka.log.LogCleaner=INFO, cleanerAppenderlog4j.additivity.kafka.log.LogCleaner=falselog4j.logger.state.change.logger=INFO, stateChangeAppenderlog4j.additivity.state.change.logger=false# Access denials are logged at INFO level, change to DEBUG to also log allowed accesseslog4j.logger.kafka.authorizer.logger=INFO, authorizerAppenderlog4j.additivity.kafka.authorizer.logger=false

(4)重启Kafka

[root@node1 kafka_2.11-1.0.1]# bin/kafka-server-start.sh config/server.properties &
[root@node1 kafka_2.11-1.0.1]# cd /var/log/kafka/[root@node1 kafka]# lltotal 76-rw-r--r-- 1 root root 11111 Apr 24 13:49 controller.log-rw-r--r-- 1 root root     0 Apr 24 13:16 kafka-authorizer.log-rw-r--r-- 1 root root     0 Apr 24 13:16 kafka-request.log-rw-r--r-- 1 root root  4472 Apr 24 13:49 kafkaServer-gc.log.0.current-rw-r--r-- 1 root root   722 Apr 24 13:49 log-cleaner.log-rw-r--r-- 1 root root 42951 Apr 24 13:49 server.log-rw-r--r-- 1 root root  2715 Apr 24 13:20 state-change.log[root@node1 kafka]#

转载地址:http://bhvab.baihongyu.com/

你可能感兴趣的文章
Linux下共享文件系统文件传输的简单设计(转载)
查看>>
点评Ubuntu下的文件安全删除工具
查看>>
数据可视化
查看>>
Security Ressources Sites
查看>>
mysql的比较运算
查看>>
Data Breach Report
查看>>
再探偏移注射
查看>>
DNS Security Tips
查看>>
符号执行
查看>>
Remote Installation Service (RIS) in Windows Server 2003
查看>>
Layer Four Traceroute
查看>>
Hardening guide for Apache 2.2.15 on RedHat 5.4 (64bit edition)
查看>>
Microsoft Outlook Web Access (OWA) version 8.2.254.0 information disclosure vulnerability
查看>>
STP mitm attack idea
查看>>
Month of PHP Security - Summary
查看>>
近期将要购买的图书
查看>>
nginx Directory Traversal Vulnerability
查看>>
Linux下apache+svn+ssl完美结合搭建安全版本控制平台
查看>>
Nginx 0.8.35 Space Character Remote Source Disclosure
查看>>
showrun的cissp经验谈
查看>>