This document discusses use cases for logging distributed web applications using Graylog2. It recommends composing structured and meaningful log messages to allow for easy analysis and searching. Several example use cases are provided, including monitoring applications from inside, creating developer-specific logs, notifications for failed processes, live tailing during releases, and activity logging. The document stresses the importance of using structured, meaningful messages according to logging guidelines.
Webinar usando graylog para la gestión centralizada de logsatSistemas
De la mano de atSistemas, descubrirás cómo implantar esta solución en entornos complejos: desde la definición de la arquitectura y dimensionamiento de los sistemas que más se ajusta a las necesidades del cliente, hasta la configuración de los recolectores de mensajes y posterior trasformación para la localización de problemas.
Graylog proporciona un sistema unificado y centralizado de mensajes procedentes de diferentes fuentes: sistema operativo, servidores de aplicación, sistemas de información, etc. Dispone de un sistema de alertas y de búsqueda de histórico de logs usando ElasticSearch como base de datos de índices.
Why Are Amazon, Apple, Facebook and Google The Gang Of 4? Who Are Their Victi...Dr. William J. Ward
Why Are Amazon, Apple, Facebook and Google The Gang Of 4? Who Are Their Victims And What Strategies Will Lead Them To A Trillion Dollar Market Cap? Scott Galloway, who is a professor of Marketing and Brand Strategy at the NYU Stern School of Business, speaking at the DLDConference, January 18, 2016, discusses “The Gang of Four” (Google, Facebook, Apple, and Amazon), their victims, and the strategies that led them onto a path to a trillion dollar market cap. Watch the DLDConference video here: https://www.youtube.com/watch?v=jfjg0kGQFBY
Scott is a great speaker, has tons of great information and talks super fast. He has over 90+ slides in his 16 minute talk at the DLDConference. I created a slideshow of his talk because there is too much information to take in as he speeds through his wonderful analysis and shares his great insights.
Webinar usando graylog para la gestión centralizada de logsatSistemas
De la mano de atSistemas, descubrirás cómo implantar esta solución en entornos complejos: desde la definición de la arquitectura y dimensionamiento de los sistemas que más se ajusta a las necesidades del cliente, hasta la configuración de los recolectores de mensajes y posterior trasformación para la localización de problemas.
Graylog proporciona un sistema unificado y centralizado de mensajes procedentes de diferentes fuentes: sistema operativo, servidores de aplicación, sistemas de información, etc. Dispone de un sistema de alertas y de búsqueda de histórico de logs usando ElasticSearch como base de datos de índices.
Why Are Amazon, Apple, Facebook and Google The Gang Of 4? Who Are Their Victi...Dr. William J. Ward
Why Are Amazon, Apple, Facebook and Google The Gang Of 4? Who Are Their Victims And What Strategies Will Lead Them To A Trillion Dollar Market Cap? Scott Galloway, who is a professor of Marketing and Brand Strategy at the NYU Stern School of Business, speaking at the DLDConference, January 18, 2016, discusses “The Gang of Four” (Google, Facebook, Apple, and Amazon), their victims, and the strategies that led them onto a path to a trillion dollar market cap. Watch the DLDConference video here: https://www.youtube.com/watch?v=jfjg0kGQFBY
Scott is a great speaker, has tons of great information and talks super fast. He has over 90+ slides in his 16 minute talk at the DLDConference. I created a slideshow of his talk because there is too much information to take in as he speeds through his wonderful analysis and shares his great insights.
Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...Caktus Group
Keeping users happy after your site launches is easier if you know about problems before users complain. This presentation by Caktus developer Dan Poirier, delivered at PyTennessee 2018, lays out which problems you may want to be notified about and a number of tools that can help.
In Onebip we developed a reporting system based on CQRS (Command Query Responsibility Segregation) and Event Sourcing using MongoDB.
In this talk I will introduce CQRS and Event Sourcing concepts, I will talk about our path and technical and conceptual challenges we faced, the strenght of our solution and the parts where there's room for improvement.
This presentation contains the content of what was presented at the beta presentation for a project entitled ' the Digital Demise'. The project is a collaborative work, which forms part of a Masters degree in digital arts at the University of the Witwatersrand. This project aims to document hacker activity, and ultimately the demise of a web sever as a result of hacker activity.
Polyline download and visualization over terrain modelsgraphitech
The project implements a number of optimizations to allow
better performance in the visualization of the height model. A client-server architecture allows different themes to be stored within a server, and downloaded using the terrain viewer. Realized using JOGL library.
This is the simple guide which helps even the beginners to develop an android app which gets the attention of the market. Build your basic app in few steps
An introduction to the Docker concept. Experiences with ASP.NET Core and Docker, How Docker can help produce modular deployments for ASP.NET web applications. Presented at Vermont Code Camp #8, UVM, Burlington VT, September 17, 2016
Bug Tracking System is a web-based application that is designed to help quality assurance and programmers keep track of reported software bugs in their work. Bugs will be assigned to a person with a bug id, flag, description, project name.
Technology Used
Operating System : Windows XP or above
User Interface : HTML, CSS
Client-side Scripting : PHP
Back End : MySQL
Web Server : Apache Tomcat 7.0.22
IDE : NetBeans 7.1
Presented at SF SlackDevs Meetup on April 11, 2016
[Record of presentation]
http://www.ustream.tv/recorded/85566064 (0:26:00~)
[GitHub page of slacktee]
https://github.com/course-hero/slacktee
Teach Your Sites to Call for Help: Automated Problem Reporting for Online Ser...Caktus Group
Keeping users happy after your site launches is easier if you know about problems before users complain. This presentation by Caktus developer Dan Poirier, delivered at PyTennessee 2018, lays out which problems you may want to be notified about and a number of tools that can help.
In Onebip we developed a reporting system based on CQRS (Command Query Responsibility Segregation) and Event Sourcing using MongoDB.
In this talk I will introduce CQRS and Event Sourcing concepts, I will talk about our path and technical and conceptual challenges we faced, the strenght of our solution and the parts where there's room for improvement.
This presentation contains the content of what was presented at the beta presentation for a project entitled ' the Digital Demise'. The project is a collaborative work, which forms part of a Masters degree in digital arts at the University of the Witwatersrand. This project aims to document hacker activity, and ultimately the demise of a web sever as a result of hacker activity.
Polyline download and visualization over terrain modelsgraphitech
The project implements a number of optimizations to allow
better performance in the visualization of the height model. A client-server architecture allows different themes to be stored within a server, and downloaded using the terrain viewer. Realized using JOGL library.
This is the simple guide which helps even the beginners to develop an android app which gets the attention of the market. Build your basic app in few steps
An introduction to the Docker concept. Experiences with ASP.NET Core and Docker, How Docker can help produce modular deployments for ASP.NET web applications. Presented at Vermont Code Camp #8, UVM, Burlington VT, September 17, 2016
Bug Tracking System is a web-based application that is designed to help quality assurance and programmers keep track of reported software bugs in their work. Bugs will be assigned to a person with a bug id, flag, description, project name.
Technology Used
Operating System : Windows XP or above
User Interface : HTML, CSS
Client-side Scripting : PHP
Back End : MySQL
Web Server : Apache Tomcat 7.0.22
IDE : NetBeans 7.1
Presented at SF SlackDevs Meetup on April 11, 2016
[Record of presentation]
http://www.ustream.tv/recorded/85566064 (0:26:00~)
[GitHub page of slacktee]
https://github.com/course-hero/slacktee
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Graylog2 use cases for distributed web applications
1. Graylog2 use cases for
distributed web applications
Manage your logs in the dark and have lasers
going and make it look like you're from space
Lennart Koopmann, 2010
www.lennartkoopmann.net / www.graylog2.org
2. It's a DevOps thing.
Compose meaningful and structured log
messages to allow easy analysis and searching.
3. Bad:
- Could not repair image foo.jpg
- Could not repair image bar.jpg
- Could not repair image baz.jpg – Invalid header checksum.
- Missing POST param 'creditcardnumber'
- Payment of John Doe did not succeeed.
4. Good:
- [runner][repair-broken-images]Could not repair image
foo.jpg – File not found.
- [runner][repair-broken-images] Could not repair image
bar.jpg – File not found.
- [runner][repair-broken-images] Could not repair image
baz.jpg – Invalid header checksum.
- [payment][checkout] Missing POST param 'creditcartnumber'
CUSTOMER #1337
- [payment][backend] Payment of CUSTOMER #1337 did not
succeeed.
5. Which images were broken?
repair-broken-images.+repair images(.+.jpg)s.s(.+)
foo.jpg
File not found.
bar.jpg
File not found.
baz.jpg
Invalid header checksum.
6. Why did the payment fail in the
backend?
payment].+CUSTOMER #1337
[payment][checkout] Missing POST param 'creditcartnumber'
CUSTOMER #1337
[payment][backend] Payment of CUSTOMER #1337 did not
succeeed.
8. Define log guidelines
Just like your usual coding guidelines.
(slap everybody who does not follow them with a large trout )
9. Use case 0:
The usual stuff.
Use Graylog2 to monitor your applications from the inside. Analyze
your logs, see if something goes wrong, receive warnings when
messages rates climb over a given level. Check the logs regularly
to identify problems.
10. Use case 1:
Developer logs.
Use GELF and give every developer his own hostname like
yourapp-johndoe – Now create a stream for every developer. Voilá:
No more tail -f debug.log and Graylog2 sugar from the beginning of
your development cycle.
11. Use case 2:
Important messages
Imagine you do some kind of domain registration for customers.
This stuff likes to fail and you want to be informed when it does and
why it did. Create a stream that fetches all failed domain
registrations and subscribe to it by email (released in v. 0.9.4) to be
notified instantly.
12. Use case 3:
Streams of certain application parts.
You have some scripts searching for broken images, deleting or
repairing them that are running the whole day. Create a stream
that fetches all messages from a runner and get a live output of
what it is doing right now. You could also create a blacklist instead
of a stream if you don't want to bug others with the messages. Get
warnings like in use case 2 when something goes wrong.
13. Use case 4:
Live tail at release.
You are releasing a new version of your application today. Start the
live tail (released in v. 0.9.4) to see what is happening in your
system in real time.
14. Use case 5:
Activity log.
A user blames the support that you deleted all his content. How to
debug this? Would be not such a big problem if you had logged
every activity of your users to Graylog2. Blacklist [activitylog]
and Log messages like [activitylog] USER #45262 DELETED
image25526. Search for what you need with blacklist disabled.
(released in v. 0.9.4)
15. Important:
Use structured and meaningful messages.
Have logging guidelines. (and follow them)
Choose severity with care: You might be called in the night once
that EMERG message arrives.
Don't log useless messages. That will be the clutter that ruins your
analysis, statistics and warning levels.
Already think of what to log in your problem analysis steps.