Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

A Quick Start on Java Garbage Collection: What it is, and How it works

In this tutorial, we will talk about how different Java Garbage Collectors work and what you can expect from them. This will give us the necessary background to start tuning the garbage collection algorithm of your choice. Before going into Java Garbage Collection tuning we need to understand two things. First of all, how garbage collection works in theory and how it works in the system we are going to tune.

Understanding Java Garbage Collection Logging: What Are GC Logs and How To Analyze Them

When working with Java or any other JVM-based programming language we get certain functionalities for free. One of those functionalities is clearing the memory. If you’ve ever used languages like C/C++ you probably remember functions like malloc, calloc, realloc and free. We needed to take care of the assignment of each byte in memory and take care of releasing the assigned memory when it was no longer needed.

Running and Deploying Elasticsearch on Kubernetes

Big data, AI, machine learning, and numerous others are all buzzwords we seem to throw around lightly in recent years. Even though they are hugely different from one another, they all have one thing in common. Data! Huge amounts of data that need to be managed. The downside of that is that the more data you have the more of a headache it is to store, query, and make sense of.

Elastic Stack Features (formerly X-Pack) Alternatives: Free, Open Source, Commercial and Cloud Services Comparison

Elastic Stack Features (formerly X-Pack) is an Elastic Stack extension that bundles security, alerting, monitoring, reporting, and graph capabilities. One could use either all or specific components. People love Splunk. But not its price. So people are always on a lookout for a good Splunk alternative. Many of those people migrated from Splunk to ELK Stack or Hosted ELK Stack solutions like Logsene.

Logging vs Monitoring: How are They Different & Why You Need Both

Logging or monitoring? If you deploy and manage an application, these are the two key techniques available to you for helping to ensure that the application meets availability and performance expectations. One of them is Application Performance Management, or APM, though you can also find it referred to as ‘Application Performance Monitoring’ or simply ‘monitoring’. The other is log analytics and management or just ‘logging’.

JVM Tuning: How to Prepare Your Environment for Performance Tuning

When it comes to Java applications, to make sure they run at peak performance, it’s critical to close the resource gap between the code and the virtual machine it’s running on – if there is one. The way to do that is by peaking into and fine-tuning the Java Virtual Machine (JVM). However, that’s easier said than done. Many factors can influence JVM performance, and during tuning, you must consider all of them. Though, there are ways around that to make it not be such a pain.

SPA Tracking & Monitoring: How to Build Better Single-Page Applications Through RUM (Real User Monitoring)

Did you know roughly half of the users that visit your website leave if it takes more than 3 seconds to load? Optimizing your website or webapp for stellar performance is always a crucial goal for any software based business. But, the ecosystem has changed in recent years. Smartphones are taking over. Developers need to build websites and optimize for performance primarily targeting these smaller devices. It’s not solely about performance though.

Sematext Experience is here

Ever heard the expression “A picture is worth a thousand words”, well with Sematext Experience we want you to have a picture of the thousand words your customers want to tell you, but usually don’t. At Sematext, we’ve learned over time that we cannot count on customers or visitors on our website to tell us about issues they encounter while using our product or visiting our webpage.

Elasticsearch security: Authentication, Encryption, Backup

There’s no need to look outside the Elastic Stack for apps to ensure data protection. Basic Elasticsearch Security features are free and include a lot of functionality to help you prevent unauthorized access, preserve data integrity by encrypting communication between nodes, and maintain an audit trail on who did what to your stack and with the data it stores. From authentication to encryption and backup, Elasticsearch security covers everything that’s needed to safeguard your cluster.