Posts tagged IT Ops

6 min Log Management

Taking a Message-Based Approach to Logging

当您考虑它时,日志条目实际上只不过是一个消息 describes an event. As such, taking a message-based approach to logging by utilizing messaging technologies makes sense. Messaging creates the loose 耦合使得日志系统能够适应当前的需求 extensible over time. Understanding a Standard Logging Architecture 通常,日志记录是在使用日志记录器的应用程序中实现的 [http://docs.oracle.com/javase/7/docs/api/java/util/log

5 min IT Ops

6 Best Practices for Effective IT Troubleshooting

System monitoring and troubleshooting [http://iaoc.syria-events.com/fundamentals/system-monitoring-and-troubleshooting/)可以 be a time-consuming and frustrating activity. It’s not unusual for IT folks to 花几个小时去寻找和解决原本10个小时就能解决的问题 分钟已经有了更好的故障排除工具和流程. 改进IT故障排除和监控并不需要花费昂贵的成本 undertaking. 很多时候,这只是在全公司范围内实施一些规则的问题

5 min Log Management

3 Steps to Building an Effective Log Management Policy

You’re on Call Duty. 你会在半夜被手机吵醒 in the throes of an SMS frenzy. You’re getting hundreds of messages from your 公司的日志服务:记录正在被写入数据库,代码正在被写入 在执行过程中,一个新的容器被旋转起来,以此类推. None of these messages matter to you. You just turn off your phone and go back to sleep. 第二天,你走进办公室,却发现你的衣架里有一半 datacenter went offline durin

9 min InsightOps

现代IT运营经理的核心职责

In the good old days, IT operations [http://www.rapid7.经理们所负责的 维护基础设施,满足服务水平协议,坚持 budget, and keeping employees happy. Life was not easy, but at least it was familiar. You knew your hardware, your software, your employees. You determined 服务等级取决于你能看到和触摸到的东西. You told people what to do and they did it. While IT was perceived to be an expensive

7 min IT Ops

Logging in a Software Defined Network

Background 本博客将概述软件定义网络(SDN),并介绍一些 关于登录SDN的建议,最后给出一些概述 research work we are doing on SDN logging. 如果我们把软件定义网络(SDN)范式看作是一个赛马场,那么SDN controllers are race cars. Networking vendors especially those in the 电信领域如德国电信、Orange、沃达丰等使用自己的 SDN控制器来管理自己设备的编排

4 min IT Ops

网络管理员审计生存指南:准备

迟早,您的组织可能会成为IT审计的对象. 尽管这听起来很不吉利,但它并不需要让人害怕. If 你是一名网络管理员,你将在审计中扮演特定的角色. Since 审计很少是小项目,您可能会与其他人一起工作 throughout the process. The best way to fulfill your specific role well is to be prepared for an audit before it happens. Simply put, an audit is an examination to determine if controls are suff

4 min IT Ops

Log Analysis for System Troubleshooting

所有类型的系统都会不断地产生大量的日志数据. In searching 为了找出挖掘和分析这些数据的最令人信服的理由,我们编制了一份 list of seven reasons that usually drive such activity. In this blog post we tackle the first of those 7, which include: 1. System troubleshooting 2. Security incident response 3. Security troubleshooting 4. Performance troubleshooting 5. Understanding user behavior or activities 6. Compliance with security policies 7. Complianc

8 min IT Ops

Roots and Culture: Logging and the Telephone Bill

在因特网出现之前,电话系统就是因特网. Think about it. 到1920年,数百万人通过互联网在全球网络上交换数据 device that connected on demand. Sounds like the Internet to me. 但与现在的互联网不同,电话系统需要花钱使用. Alexander Graham Bell’s investors wanted it that way. That’s why they gave him the money. 因此,使用电话系统的人必须付费. So going as far back as 1877, every mont

6 min IT Ops

5 Rules of Pair Programming Etiquette

I like Pair Programming [http://en.wikipedia.org/wiki/Pair_programming]. I’ve been doing it episodically for about 10 years. Whenever I’ve pair programmed, at 在会议结束时,我总是能比之前更出色地离开 started. 然而,当两人一起编程时,这种做法可能代价高昂 are not efficient. When a lot of friction exists between the two coders 所涉及的成本可能超过单个程序员尝试散列的两倍 things out on his or her ow

2 min IT Ops

Java 8 - Lazy argument evaluation

Overview “I will always choose a lazy person to do a difficult job. Because he will find an easy way to do it” – Bill Gates Lazy evaluation is an evaluation strategy [http://en.wikipedia.org/wiki/Evaluation_strategy] which delays the evaluation of an expression until its value is needed. The opposite of this is eager 在这种情况下,表达式一旦绑定到 variable.[wikipedia [http://en.wikipedia.org/wiki/Lazy_evaluation]] Like most imperative programming l

4 min IT Ops

Logs To Understand User Activity and Behavior

记录用户活动是了解用户正在做什么以及如何做的好方法 they are using network and computing resources. Collecting data from the 立场的用户身份或登录是一个伟大的方式来关联各种 信息也包括客户机或工作站活动、网络和服务器 access, and application usage. This provides a unique opportunity to make use of Logentries’ [http://logentries.com/centralize-log-data-automatically/?le_trial=user_activity_and_behav

6 min IT Ops

The Value of Correlation IDs

在过去,当事务行为发生在单一领域时,在 一步一步的过程,跟踪请求/响应行为很简单 undertaking. 然而,今天一个对特定域的请求可能涉及一个 无数从起始域到其他域的后续异步请求. 例如,你向Expedia发送请求,但在幕后,Expedia是 forwarding your request as a message to a message broker. Then that message is consumed by a hotel, airline

5 min IT Ops

思想的慷慨:开源社区的关怀和分享

I want to share something with you that is pretty amazing. But, before I do, allow me to provide the backstory. The Backstory 我使用开源软件(OSS)已经有一段时间了. I started with the big ones, Apache [http://apache.org/], Maven [http://maven.apache.org/], MySQL [http://www.mysql.com/], etc…. But, as time went on and my work became more specialized, I started using smaller projects. When you use the big projects 比如Maven和Apache,还有大量的书籍和视频

5 min IT Ops

Solving the expression problem

如果您查看任何基于oo的非平凡代码库,您将[希望] 找到很好理解的行为形式和封装通过有效的 使用多态性——或者通过接口将调用代码从对象中解耦 类型的实现,或通过子类型共享多个类型的公共代码. 以静态类型语言(如Java)为例,让我们看一下 Map接口及其在标准库中的一些实现: A receiving method which

3 min InsightOps

宣布InsightOps -领先的端点可见性和日志分析

我们在Rapid7的使命是解决复杂的安全和IT挑战 simple, innovative solutions. Late last year Logentries joined the Rapid7 family to help to drive this mission. The Logentries technology itself had been 旨在向世界展示日志数据的力量,并建立了一个社区 5万用户的基础上,我们的实时,易于使用,但功能强大 log management [http://iaoc.syria-events.com/fundamentals/what-is-log-management/] and analytics engine. Today we are