Operations | Monitoring | ITSM | DevOps | Cloud

Analytics

Best Practices for Efficient Log Management and Monitoring

When managing cloud-native applications, it’s essential to have end-to-end visibility into what’s happening at any given time. This is especially true because of the distributed and dynamic nature of cloud-native apps, which are often deployed using ephemeral technologies like containers and serverless functions.

Grafana Plugin Tutorial: Polystat Panel (Part 2)

At the end of Part 1, the end result was a set of polygons that represented each Cassandra node in a Kubernetes statefulset. The cAdvisor-based metrics CPU/Memory/Disk utilization are scraped by Prometheus. This second tutorial will focus on a rollup of multiple Cassandra clusters running inside Kubernetes. We will end up with three dashboards tied together to provide an overview of our Cassandra clusters.

GoT Predictions: How we Analyzed Twitter to Find Who will Win the Iron Throne

With the final season of Game of Thrones premiering just last night, the question on the mind of every super fan is who will finally rise to the iron throne? To find the answer, we used Twitter along with our machine data analytics platform to check the popularity of specific characters and how often they are mentioned alongside the term “iron throne”.

How We Designed Loki to Work Easily Both as Microservices and as Monoliths

In recent years, monoliths have lost favor as microservices increased in popularity. Conventional wisdom says that microservices, and distributed systems in general, are hard to operate: There are often too many dependencies and tunables, multiple moving parts, and operational complexity.

Entity Extraction with spaCy

Entity extraction is, in the context of search, the process of figuring out which fields a query should target, as opposed to always hitting all fields. The reason we may want to involve entity extraction in search is to improve precision. For example: how do we tell that, when the user typed in Apple iPhone, the intent was to run company:Apple AND product:iPhone? And not bring back phone stickers in the shape of an apple?

The Top 5 Open-Source NIDS Solutions

In a hyper-connected world, the threat landscape is undoubtedly evolving. Ensuring the security of your enterprise networks on a daily basis is essential to protect your business, no matter how big (or small) it is. According to SophosLabs’ 2019 threat report, one dangerous ransomware called SamSam cost companies $6.5 million ($10K to $50K per ransom).

Illuminating the under-loved with Honeycomb

Most modern web apps end up sprouting some subset of tasks that happen in the “background”, i.e., when a user is not directly waiting on the request from a server to finish. These types of tasks range across all kinds of use cases – processing media, generating aggregate statistics for later view in the front end, and syncing data to 3rd party providers are just a few of many examples.