Tagged articles
217 articles
Page 1 of 3
MaGe Linux Operations
MaGe Linux Operations
May 13, 2026 · Operations

Solve System Issues Fast with Linux Log Analysis

This guide walks Linux operators through the core log architecture, essential log files, powerful command‑line tools such as grep, awk, sed and journalctl, and step‑by‑step troubleshooting scenarios—including SSH connectivity, service failures, disk space, memory leaks, security incidents, and application logs—while providing ready‑to‑run scripts and advanced techniques for automated and centralized log analysis.

GrepLinuxSecurity
0 likes · 41 min read
Solve System Issues Fast with Linux Log Analysis
MaGe Linux Operations
MaGe Linux Operations
Apr 26, 2026 · Operations

Double Your Linux Efficiency with Practical grep, sed, and awk Tricks

This guide shows how Linux power users can dramatically speed up log analysis, configuration management, and data processing by mastering grep, sed, and awk, offering concrete command examples, performance benchmarks, and best‑practice patterns that turn these three classic tools into a productivity powerhouse.

GrepLinuxShell scripting
0 likes · 57 min read
Double Your Linux Efficiency with Practical grep, sed, and awk Tricks
Selected Java Interview Questions
Selected Java Interview Questions
Apr 12, 2026 · Operations

How nginxpulse Turns Nginx Logs into Insightful Dashboards

nginxpulse is an open‑source Nginx access‑log analyzer that parses logs, stores them in PostgreSQL, and visualizes PV/UV trends, IP locations, status‑code distribution, client types, and real‑time traffic through a Vue 3/ECharts dashboard, with flexible Docker‑based deployment options.

GolangNginxPulselog analysis
0 likes · 12 min read
How nginxpulse Turns Nginx Logs into Insightful Dashboards
IT Services Circle
IT Services Circle
Apr 3, 2026 · Operations

Turn Millions of Log Lines into Actionable Data with 6 Python Tools in 10 Minutes

This article shows how to replace manual grep searches on massive log files with six Python libraries—pygrok, drain3, datasketch, rapidfuzz, duckdb, and adtk—providing structured parsing, automatic clustering, near‑duplicate detection, fuzzy matching, SQL querying, and time‑series anomaly detection, all illustrated with real code examples and practical tips.

DuckDBPythonadtk
0 likes · 12 min read
Turn Millions of Log Lines into Actionable Data with 6 Python Tools in 10 Minutes
DeWu Technology
DeWu Technology
Apr 1, 2026 · Backend Development

How AI‑Powered /log‑diagnosis Skill Automates Bug Tracing in Backend Logs

This article explains how the /log‑diagnosis Skill, built on Claude Code and the Model Context Protocol (MCP) log platform, creates a closed‑loop workflow that automatically fetches logs, extracts key information, maps it to source code, diagnoses root causes, and generates remediation suggestions, dramatically speeding up backend debugging.

AI debuggingClaude CodeMCP
0 likes · 17 min read
How AI‑Powered /log‑diagnosis Skill Automates Bug Tracing in Backend Logs
Data STUDIO
Data STUDIO
Mar 27, 2026 · Operations

Struggling with Log Files? 6 Python Libraries That Turn Logs into Actionable Data

This article introduces six Python libraries—pygrok, drain3, datasketch, rapidfuzz, duckdb, and adtk—that transform massive, unstructured log streams into structured, searchable, and analyzable data, showing concrete code examples, performance gains, and practical tips for real‑world troubleshooting.

DuckDBPythonadtk
0 likes · 12 min read
Struggling with Log Files? 6 Python Libraries That Turn Logs into Actionable Data
SpringMeng
SpringMeng
Mar 3, 2026 · Operations

A Lightweight Nginx Log Analyzer Worth Trying

NginxPulse is a lightweight, Docker‑friendly Nginx log analysis panel that offers real‑time PV/UV, IP lookup, multi‑site support, custom log formats, remote log pulling, and access control, with simple deployment via Docker, Docker‑Compose, or a single binary.

DockerGoNGINX
0 likes · 7 min read
A Lightweight Nginx Log Analyzer Worth Trying
Top Architect
Top Architect
Feb 22, 2026 · Operations

Deploy NginxPulse for Real‑Time Nginx Log Analytics in Minutes

This guide introduces NginxPulse, a lightweight Nginx log analysis panel, explains its key features, shows how to run it with Docker or Docker‑Compose, configure multiple sites, customize log formats, pull remote logs, and troubleshoot common issues, all with concrete commands and examples.

NGINXVuelog analysis
0 likes · 8 min read
Deploy NginxPulse for Real‑Time Nginx Log Analytics in Minutes
Ops Community
Ops Community
Feb 2, 2026 · Operations

How to Process 10GB Logs in 30 Seconds with Grep, Sed, and Awk

This comprehensive guide shows how to use the GNU tools grep, sed, and awk to quickly analyse massive Nginx access logs, covering their streaming design, optimal command parameters, real‑world examples, performance tricks, security safeguards and step‑by‑step scripts for fault isolation and reporting.

GrepSREShell scripting
0 likes · 38 min read
How to Process 10GB Logs in 30 Seconds with Grep, Sed, and Awk
java1234
java1234
Jan 24, 2026 · Operations

A Lightweight Nginx Log Analyzer That Actually Works

NginxPulse is a lightweight, Docker‑ready Nginx log analysis panel built with Go‑Gin backend and Vue3 frontend, offering real‑time PV/UV, IP geolocation, multi‑site support, custom log formats, remote log fetching, and easy deployment via a single command or Compose file.

DockerGoNGINX
0 likes · 7 min read
A Lightweight Nginx Log Analyzer That Actually Works
Xiao Liu Lab
Xiao Liu Lab
Jan 8, 2026 · Operations

Unlock Fast Log Analysis: 10 Essential awk Commands Every Sysadmin Should Know

This tutorial shows how awk, the built‑in Linux text‑processing tool, can dramatically speed up log analysis and routine data extraction by explaining core concepts, common patterns, real‑world examples such as Nginx, system monitoring and MySQL slow‑query logs, and providing a ready‑to‑run script.

LinuxShell scriptingawk
0 likes · 17 min read
Unlock Fast Log Analysis: 10 Essential awk Commands Every Sysadmin Should Know
Code Ape Tech Column
Code Ape Tech Column
Jan 7, 2026 · Operations

Is Syslog Still the Best Choice for Simple, Low‑Cost Log Collection?

This article explains why the decades‑old Syslog protocol remains relevant in modern microservice and cloud‑native environments, detailing its structure, advantages, typical use cases, step‑by‑step server setup with rsyslog, command‑line analysis techniques, integration with Java applications, and a comparison with ELK/Loki solutions.

log analysislog collectionrsyslog
0 likes · 20 min read
Is Syslog Still the Best Choice for Simple, Low‑Cost Log Collection?
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Jan 6, 2026 · Backend Development

Master Nginx: Essential Commands for Starting, Stopping, Reloading and Debugging

This guide provides a comprehensive cheat‑sheet of Nginx command‑line operations—including how to start, stop, reload, check configuration, view logs, inspect processes, query version information and perform common debugging tasks—helping administrators manage Nginx efficiently in production and development environments.

DebuggingLinuxNGINX
0 likes · 6 min read
Master Nginx: Essential Commands for Starting, Stopping, Reloading and Debugging
IT Services Circle
IT Services Circle
Dec 24, 2025 · Operations

Master Real‑Time Log Analysis with tail, less, grep, sed & awk

This article teaches backend engineers how to efficiently inspect large production logs using Linux commands such as tail, less, grep, sed, and awk, covering real‑world scenarios like service startup monitoring, bug reproduction, trace‑ID tracing, error frequency counting, noise filtering, time‑window extraction, and malicious IP detection.

GrepLinuxawk
0 likes · 7 min read
Master Real‑Time Log Analysis with tail, less, grep, sed & awk
Su San Talks Tech
Su San Talks Tech
Dec 19, 2025 · Operations

Master Log Debugging with grep, tail, and less: Real‑World Tips

This guide walks you through practical techniques for quickly locating Java NullPointerException traces in plain, rotating, and compressed log files using grep, tail, less, and related options, covering context display, real‑time monitoring, compressed‑log searching, and occurrence counting.

DebuggingGrepLinux
0 likes · 7 min read
Master Log Debugging with grep, tail, and less: Real‑World Tips
Efficient Ops
Efficient Ops
Dec 14, 2025 · Information Security

Detect and Respond to Linux Server Intrusions with Log Analysis

This guide walks you through using Linux log tools such as last, lastb, grep, and sshd_config to identify suspicious logins, trace malicious IPs, and apply immediate remediation steps for compromised servers, targeting ops engineers and developers.

ForensicsLinuxSSH
0 likes · 8 min read
Detect and Respond to Linux Server Intrusions with Log Analysis
Wu Shixiong's Large Model Academy
Wu Shixiong's Large Model Academy
Nov 18, 2025 · Artificial Intelligence

How to Make LLM Agents’ Function Calls Stable and Accurate: 5 Proven Strategies

This article breaks down why function‑call reliability is the biggest bottleneck for LLM agents and presents a systematic five‑step loop—schema quality, prompt context, sampling, training data, and runtime defenses—plus concrete optimization techniques such as dynamic tool routing, plan‑execute, validation layers, memory injection, and log‑driven tuning, illustrated with real‑world cases.

AgentLLMTool Routing
0 likes · 12 min read
How to Make LLM Agents’ Function Calls Stable and Accurate: 5 Proven Strategies
Advanced AI Application Practice
Advanced AI Application Practice
Nov 8, 2025 · Fundamentals

Masked Testing: Why Ignoring System Logic Turns Tests into Guesswork

The article explains how relying solely on black‑box testing hides critical business‑logic bugs, illustrates three concrete failure scenarios, and offers four practical steps—asking targeted questions, visualizing workflows, designing focused test cases, and monitoring logs and databases—to transition toward gray‑box testing.

Software Testingblack-box testinggray-box testing
0 likes · 8 min read
Masked Testing: Why Ignoring System Logic Turns Tests into Guesswork
Architect
Architect
Oct 29, 2025 · Big Data

Master Kibana: Install, Configure, and Visualize Elasticsearch Data

This guide walks you through installing Kibana, configuring its connection to Elasticsearch, exploring data via Discover, creating visualizations and dashboards, and monitoring cluster health, while also covering advanced query syntax, time filters, and practical tips for effective data analysis and visualization.

Data visualizationElasticsearchKibana
0 likes · 13 min read
Master Kibana: Install, Configure, and Visualize Elasticsearch Data
Alibaba Cloud Big Data AI Platform
Alibaba Cloud Big Data AI Platform
Oct 29, 2025 · Artificial Intelligence

How AI Powers Proactive Risk Detection in Massive Cloud Platforms

This article outlines Alibaba Cloud's AI‑driven "Smart Sentinel" system, which tackles the three major challenges of large‑scale cloud operations—hard‑to‑detect anomalies, alarm storms, and difficult root‑cause analysis—by deploying multi‑layered detection, intelligent alarm grading, and an end‑to‑end automated response loop.

anomaly detectioncloud computingintelligent monitoring
0 likes · 11 min read
How AI Powers Proactive Risk Detection in Massive Cloud Platforms
dbaplus Community
dbaplus Community
Oct 27, 2025 · Operations

30 Essential Linux Command Combinations to Supercharge System Administration

This guide presents 30 practical Linux command pipelines—organized into system monitoring, log analysis, file management, process control, network troubleshooting, and security auditing—that let administrators quickly diagnose resource bottlenecks, extract key log data, automate batch operations, and secure servers without writing complex scripts.

LinuxSecurity AuditingShell Commands
0 likes · 33 min read
30 Essential Linux Command Combinations to Supercharge System Administration
Liangxu Linux
Liangxu Linux
Oct 21, 2025 · Operations

Build an Efficient Nginx Log Analysis System to Slash Troubleshooting Time 80%

This guide walks through configuring custom Nginx log formats, implementing log rotation, analyzing performance, status codes, and traffic with shell and awk tools, automating real‑time monitoring via Python and Bash scripts, integrating ELK for deep analytics, and applying best‑practice security and optimization recommendations to dramatically reduce troubleshooting time.

AutomationELKPython
0 likes · 17 min read
Build an Efficient Nginx Log Analysis System to Slash Troubleshooting Time 80%
Java Tech Enthusiast
Java Tech Enthusiast
Oct 14, 2025 · Backend Development

How to Build a High‑Performance MyBatis Log Analyzer with Spring Boot

This article describes the design and implementation of a high‑performance log‑analysis system for massive MyBatis logs, covering problem analysis, technology selection, architecture, multithreaded parsing, flexible regex templates, performance monitoring, pitfalls, optimization practices, results, and future plans.

JavaMyBatisPerformance Optimization
0 likes · 13 min read
How to Build a High‑Performance MyBatis Log Analyzer with Spring Boot
ITPUB
ITPUB
Oct 12, 2025 · Operations

30 Powerful Linux Command Combos for System Monitoring, Log Analysis & Security

This guide presents 30 practical Linux command combinations organized into six high‑frequency scenarios—system monitoring, log analysis, file management, process control, network troubleshooting, and security auditing—each with clear explanations, real‑world examples, and cautionary notes to help administrators quickly diagnose and resolve common operational issues.

LinuxSystem Administrationcommand-line
0 likes · 33 min read
30 Powerful Linux Command Combos for System Monitoring, Log Analysis & Security
ITPUB
ITPUB
Sep 8, 2025 · Operations

12 Essential grep Command Combinations to Supercharge Log Analysis

This guide presents twelve practical grep command-line patterns—including case‑insensitive search, line‑number highlighting, keyword counting, multi‑keyword regex, context display, real‑time filtering, and integration with find—each illustrated with exact syntax and brief explanations to help Linux administrators and developers troubleshoot logs more efficiently.

GrepLinuxcommand-line
0 likes · 5 min read
12 Essential grep Command Combinations to Supercharge Log Analysis
Wukong Talks Architecture
Wukong Talks Architecture
Sep 4, 2025 · Backend Development

How a ‘Broken Pipe’ Error Revealed Hidden Performance Bottlenecks in Production

An unexpected ‘Broken pipe’ error halted production, prompting a deep dive into logs, trace IDs, and monitoring tools like Kibana and SkyWalking, which uncovered Feign client timeouts, a costly SQL update, and redundant microservice calls, leading to targeted fixes that restored normal device operation.

MicroservicesPerformance OptimizationSQL Tuning
0 likes · 10 min read
How a ‘Broken Pipe’ Error Revealed Hidden Performance Bottlenecks in Production
Raymond Ops
Raymond Ops
Aug 15, 2025 · Operations

Mastering ELK: Step-by-Step Guide to Deploying a Full-Scale Log Analysis System

This article provides a comprehensive walkthrough of the ELK stack—Elasticsearch, Logstash, and Kibana—detailing its architecture, core concepts, and step-by-step deployment on a multi-node environment, including configuration, service setup, plugin installation, and troubleshooting tips for effective log analysis.

ELKElasticsearchKibana
0 likes · 16 min read
Mastering ELK: Step-by-Step Guide to Deploying a Full-Scale Log Analysis System
Volcano Engine Developer Services
Volcano Engine Developer Services
Aug 7, 2025 · Operations

How to Collect and Analyze JuiceFS Access Logs with Volcengine TLS

This article explains how to gather JuiceFS access logs using the LogCollector agent, parse and structure them with TLS, design index fields, build analytical dashboards, run advanced SQL queries for write‑IO distribution, sequential‑read ratios, overwrite detection, file‑lifecycle analysis, and set up real‑time monitoring and alerting for performance anomalies.

JuiceFSLogCollectorSQL
0 likes · 22 min read
How to Collect and Analyze JuiceFS Access Logs with Volcengine TLS
Alibaba Cloud Native
Alibaba Cloud Native
Jul 2, 2025 · Information Security

Tracing Malicious Attacks on Large Platforms with Alibaba Cloud SLS SQL

This article walks through a real‑world case where a large platform suffered a massive traffic‑based attack, showing how to extract high‑frequency IPs, join logs by trace_id, perform geographic analysis, and automate blacklist updates across Alibaba Cloud and AWS using SLS SQL and Python SDKs.

SLSSQLattack tracing
0 likes · 12 min read
Tracing Malicious Attacks on Large Platforms with Alibaba Cloud SLS SQL
Liangxu Linux
Liangxu Linux
Jun 2, 2025 · Fundamentals

Master Linux Inodes, Links, File Recovery, and Log Analysis

This guide explains Linux filesystem fundamentals—including inode structure, block allocation, hard and soft links, methods for recovering deleted EXT and XFS files, and practical techniques for analyzing system and application log files using common commands and tools.

File Recoveryinodelog analysis
0 likes · 12 min read
Master Linux Inodes, Links, File Recovery, and Log Analysis
MaGe Linux Operations
MaGe Linux Operations
May 21, 2025 · Information Security

Comprehensive Linux Intrusion Detection Checklist: Spot Hackers Fast

This guide walks you through a step‑by‑step Linux intrusion detection process, covering account audits, log analysis, process inspection, system file checks, scheduled task reviews, and historical command examinations, each illustrated with clear screenshots to help you quickly identify potential compromises.

Account AuditSecurityintrusion detection
0 likes · 5 min read
Comprehensive Linux Intrusion Detection Checklist: Spot Hackers Fast
IT Xianyu
IT Xianyu
Apr 24, 2025 · Databases

PostgreSQL DBA Guide: Permission Minimization, Log Analysis with pgBadger, and Security Hardening

This tutorial explains why DBAs need security hardening and log analysis, shows how to configure minimal‑privilege roles and precise permissions in PostgreSQL, demonstrates how to detect and revoke redundant privileges, and provides a step‑by‑step guide to installing and using pgBadger for log analysis and automated reporting.

DBADatabase SecurityPostgreSQL
0 likes · 8 min read
PostgreSQL DBA Guide: Permission Minimization, Log Analysis with pgBadger, and Security Hardening
Raymond Ops
Raymond Ops
Apr 19, 2025 · Operations

Essential Apache & Nginx Log Analysis Commands for Linux Ops

This guide compiles practical Linux shell commands for analyzing Apache and Nginx access logs, covering IP frequency, page request counts, status code distribution, traffic volume, crawler detection, subnet aggregation, and time‑based request rates to help administrators monitor web service health efficiently.

NGINXOperationslog analysis
0 likes · 15 min read
Essential Apache & Nginx Log Analysis Commands for Linux Ops
Test Development Learning Exchange
Test Development Learning Exchange
Mar 28, 2025 · Mobile Development

How to Read and Analyze Monkey Test Log Files

This guide explains the structure of Android Monkey test logs, highlights key information such as event counters and exception details, and provides practical solutions for common errors like ANR, crashes, OutOfMemoryError, and SecurityException, along with best practices for effective log analysis.

AndroidMobile Developmentlog analysis
0 likes · 5 min read
How to Read and Analyze Monkey Test Log Files
Open Source Linux
Open Source Linux
Feb 26, 2025 · Operations

Master Apache Log Analysis with 30 Essential Shell Commands

This guide presents a comprehensive collection of shell and awk commands for analyzing Apache access logs, covering IP counting, page request statistics, traffic filtering, performance metrics, connection states, and bandwidth usage, enabling administrators to efficiently monitor and troubleshoot web server activity.

ApacheOperationsShell scripting
0 likes · 14 min read
Master Apache Log Analysis with 30 Essential Shell Commands
Alibaba Cloud Native
Alibaba Cloud Native
Feb 7, 2025 · Information Security

How DeepSeek’s Attack Highlights the Need for Robust Cloud‑Native Security Observability

The article examines DeepSeek’s rapid rise, the large‑scale malicious attacks it suffered, and then provides a detailed, cloud‑native security observability guide using Alibaba Cloud services such as DDoS protection, WAF, CLB, SAS, and SLS for logging, monitoring, anomaly detection, and alert response.

AI securityAlibaba CloudCloud Native
0 likes · 15 min read
How DeepSeek’s Attack Highlights the Need for Robust Cloud‑Native Security Observability
DataFunSummit
DataFunSummit
Jan 31, 2025 · Artificial Intelligence

LLMOps: Building a Prompt‑Driven Engine for AI Operations

This article presents the concept of LLMOps—applying large language models to AIOps—by analyzing prompt challenges, introducing the LogPrompt engine for log analysis, describing a prompt‑learning data flywheel with CoachLM optimization, reporting experimental results, and outlining future multi‑modal directions.

CoachLMData FlywheelLLMOps
0 likes · 16 min read
LLMOps: Building a Prompt‑Driven Engine for AI Operations
MaGe Linux Operations
MaGe Linux Operations
Jan 29, 2025 · Operations

Deploy ELK Stack: Complete Guide to Elasticsearch, Logstash & Kibana Setup

This guide walks through the ELK log analysis system—explaining its components, core concepts, log processing workflow, and step‑by‑step deployment of Elasticsearch, Logstash, Kibana, and supporting plugins on a multi‑node environment, including configuration, startup commands, and troubleshooting tips.

ELKElasticsearchKibana
0 likes · 15 min read
Deploy ELK Stack: Complete Guide to Elasticsearch, Logstash & Kibana Setup
dbaplus Community
dbaplus Community
Jan 6, 2025 · Backend Development

How Alibaba’s Xianyu Team Automates Exception Log Tracking and Bug Assignment

The Xianyu team built an automated pipeline that scans pre‑release exception logs, extracts stack‑trace details with regex, maps them to Git file paths and commit authors, and instantly distributes precise bug tickets to the responsible developers, dramatically cutting debugging cost and time.

Exception HandlingGitbug tracking
0 likes · 8 min read
How Alibaba’s Xianyu Team Automates Exception Log Tracking and Bug Assignment
Alibaba Cloud Developer
Alibaba Cloud Developer
Nov 28, 2024 · Backend Development

How Xianyu Automates Exception Log Tracking to Pinpoint Bugs Instantly

The Xianyu team built an automated exception‑log tracking system that scans pre‑release logs, extracts stack information with regex, maps errors to Git file paths and commit authors, and automatically assigns precise bug tickets to developers, dramatically cutting debugging time and cost.

Exception HandlingGit integrationautomated debugging
0 likes · 7 min read
How Xianyu Automates Exception Log Tracking to Pinpoint Bugs Instantly
Programmer DD
Programmer DD
Nov 13, 2024 · Information Security

How I Stopped a Sudden CDN Traffic Surge with Quick Security Tweaks

After receiving unexpected CDN usage alerts, I investigated the spike, identified a malicious IP, and applied access‑control blacklists, anti‑leech settings, UA blocking, and usage‑cap limits, which instantly reduced bandwidth and traffic, illustrating effective CDN security measures.

CDNaccess controlanti-leech
0 likes · 5 min read
How I Stopped a Sudden CDN Traffic Surge with Quick Security Tweaks
vivo Internet Technology
vivo Internet Technology
Oct 30, 2024 · Operations

Troubleshooting TiKV Disk Space Issues: Causes, Diagnosis, and Solutions

This guide explains how to diagnose and fix TiKV disk‑space problems by identifying oversized log files, redundant space‑placeholder files, and excessive RocksDB/Titan data, offering command‑line checks, configuration tweaks such as enabling log rotation, disabling reserve space, and tuning GC and Titan discardable‑ratio to restore balanced storage.

ConfigurationTiKVdisk space
0 likes · 16 min read
Troubleshooting TiKV Disk Space Issues: Causes, Diagnosis, and Solutions
Alibaba Cloud Big Data AI Platform
Alibaba Cloud Big Data AI Platform
Oct 23, 2024 · Cloud Computing

How Elasticsearch Serverless Cuts Log Analysis Costs by 50%

At the 2024 Cloud Xi Conference, Alibaba Cloud expert Jia Xinyu detailed how Elasticsearch Serverless addresses core log‑analysis pain points with out‑of‑the‑box, high‑performance, pay‑as‑you‑go capabilities, delivering significant cost savings and eliminating operational overhead.

Cost OptimizationElasticsearchServerless
0 likes · 14 min read
How Elasticsearch Serverless Cuts Log Analysis Costs by 50%
Test Development Learning Exchange
Test Development Learning Exchange
Oct 22, 2024 · Operations

Comprehensive Guide to Collecting Information, Reproducing Issues, Analyzing Logs and Code, Narrowing Problem Scope, and Team Communication

This guide outlines systematic steps for gathering environment and error details, reproducing bugs across different setups, analyzing logs and source code, narrowing down problem areas, and effectively communicating with developers, product managers, testers, on‑site staff, and customers to resolve software issues.

DebuggingSoftware Testingbug troubleshooting
0 likes · 6 min read
Comprehensive Guide to Collecting Information, Reproducing Issues, Analyzing Logs and Code, Narrowing Problem Scope, and Team Communication
Java Architecture Stack
Java Architecture Stack
Oct 15, 2024 · Backend Development

How to Build Powerful Search, Log, and Recommendation Solutions with Elasticsearch

This guide walks through five real‑world Elasticsearch use cases—including full‑text product search with highlighting, centralized log collection and analysis, personalized video recommendation, price‑range aggregation for e‑commerce, and geo‑location restaurant search—detailing index design, query syntax, Docker setup, and front‑end integration.

Backend DevelopmentElasticsearchFull‑Text Search
0 likes · 35 min read
How to Build Powerful Search, Log, and Recommendation Solutions with Elasticsearch
DevOps Operations Practice
DevOps Operations Practice
Jul 8, 2024 · Operations

Common Linux Log Files and Useful Commands for Log Analysis

This article introduces common Linux log files, essential command‑line utilities such as cat, less, tail, grep, awk, and sed for viewing logs, and powerful analysis tools like logrotate, journalctl, logwatch, and goaccess, providing practical examples for effective system log management.

Log ManagementSystem Administrationlog analysis
0 likes · 7 min read
Common Linux Log Files and Useful Commands for Log Analysis
Liangxu Linux
Liangxu Linux
Jun 2, 2024 · Operations

Essential Shell Commands for Analyzing Apache Access Logs

A comprehensive collection of awk, grep, sort, and netstat one‑liners that help you count unique IPs, rank pages by hits, filter by time ranges, identify slow requests, and monitor connection states directly from Apache log files.

ApacheNetwork MonitoringShell Commands
0 likes · 11 min read
Essential Shell Commands for Analyzing Apache Access Logs
Liangxu Linux
Liangxu Linux
May 6, 2024 · Operations

Master Fast Log Error Detection with Tail, Grep, and Sed Commands

This guide shows how to quickly locate errors in massive log files using Linux commands such as tail, head, grep, and sed, offering multiple techniques—including line‑number extraction, time‑range queries, match counting, colored highlights, and pagination—to streamline debugging and log analysis.

DebuggingGrepLinux
0 likes · 12 min read
Master Fast Log Error Detection with Tail, Grep, and Sed Commands
Alibaba Cloud Native
Alibaba Cloud Native
Apr 16, 2024 · Operations

Unlocking Log Insights: How SPL Brings Interactive Pipe‑Style Queries to Cloud‑Native Observability

This article explains how the SLS Processing Language (SPL) enables interactive, pipeline‑based log analysis in cloud‑native environments, covering the challenges of unstructured log data, Unix‑inspired exploration, SPL syntax, key commands, and practical examples for efficient querying and transformation.

Cloud NativeObservabilityPipeline
0 likes · 12 min read
Unlocking Log Insights: How SPL Brings Interactive Pipe‑Style Queries to Cloud‑Native Observability
Sohu Tech Products
Sohu Tech Products
Jan 31, 2024 · Operations

Logstash Grok Filter: Complete Guide for Log Data Parsing and ETL

This guide explains Logstash’s Grok filter plugin, detailing how its 120 built‑in and custom patterns transform unstructured logs—such as Apache, MySQL, or HiveServer2—into structured fields through named regex captures, supporting type conversion, cleaning, debugging, and efficient ETL for analysis and monitoring.

ETLGrok filterLogstash
0 likes · 8 min read
Logstash Grok Filter: Complete Guide for Log Data Parsing and ETL
Open Source Linux
Open Source Linux
Dec 28, 2023 · Operations

Master Logwatch: Install and Analyze Linux Logs Efficiently

This guide explains why manual log review is tedious, introduces Logwatch as an automated solution, walks through installing it on CentOS, configuring its core settings, running it manually, and interpreting its concise email reports to simplify Linux system log management.

CentOSLinuxlog analysis
0 likes · 7 min read
Master Logwatch: Install and Analyze Linux Logs Efficiently
Liangxu Linux
Liangxu Linux
Nov 15, 2023 · Operations

How to Install and Use Logwatch for Automated Linux Log Analysis

This guide explains why manual log inspection is tedious, introduces Logwatch as a solution, and provides step‑by‑step commands to install it on CentOS, configure its settings, run analyses instantly, and interpret the generated reports.

CentOSSystem Administrationcron
0 likes · 9 min read
How to Install and Use Logwatch for Automated Linux Log Analysis
Aikesheng Open Source Community
Aikesheng Open Source Community
Nov 8, 2023 · Databases

Analyzing OceanBase Freeze Dump Process via Log Parsing

This article explains how to parse OceanBase logs to trace the tenant freeze dump workflow, detailing the roles and log sequences of the freeze check thread, LSFreeze, Flush, DagScheduler, and MiniMerge threads, and illustrating each step with actual log excerpts and code snippets.

DAGFreeze ProcessOceanBase
0 likes · 16 min read
Analyzing OceanBase Freeze Dump Process via Log Parsing
DataFunTalk
DataFunTalk
Oct 21, 2023 · Operations

Implementing Nginx Operations Management with the Honghu Platform: A Practical Case Study

This article presents a detailed, end‑to‑end case study of how Yanhuang Data leveraged the Honghu data‑analysis platform to build a complete Nginx operations‑management solution, covering data ingestion, parsing, modeling, visualization, alerting, third‑party integration, and best‑practice recommendations.

AlertingNGINXOperations Management
0 likes · 15 min read
Implementing Nginx Operations Management with the Honghu Platform: A Practical Case Study
Huolala Tech
Huolala Tech
Sep 19, 2023 · Information Security

How to Detect and Block Malicious Bot Traffic Using Log Analysis

This guide explains how to identify and differentiate malicious bot traffic from legitimate requests by analyzing web server logs, leveraging fields such as IP, user‑agent, referer, and parameters, and then applying WAF rules, automation, and security platforms to mitigate attacks and improve operational metrics.

AutomationWAFWeb Security
0 likes · 31 min read
How to Detect and Block Malicious Bot Traffic Using Log Analysis
Open Source Linux
Open Source Linux
Sep 6, 2023 · Operations

Master Logwatch: Install and Automate Linux Log Analysis on CentOS

Logwatch, a built‑in CentOS log analysis tool, can be installed via yum, configured by copying the default config, and scheduled through cron to automatically email root daily summaries of system logs, simplifying server monitoring and reducing manual log inspection.

cronlog analysislogwatch
0 likes · 7 min read
Master Logwatch: Install and Automate Linux Log Analysis on CentOS
Liangxu Linux
Liangxu Linux
Sep 5, 2023 · Operations

How to Install and Use Logwatch for Automated Linux Log Analysis

This guide explains how to install Logwatch on CentOS, configure its settings, run it manually or via daily cron, and interpret the sample email output that summarizes system logs, SSH activity, installed packages, and disk usage.

System Administrationcronlog analysis
0 likes · 8 min read
How to Install and Use Logwatch for Automated Linux Log Analysis
Efficient Ops
Efficient Ops
Aug 28, 2023 · Operations

How to Build a Real‑Time ELK Log Analysis Platform for Scalable Operations

This article explains why centralized logging is essential for modern micro‑service systems, outlines an ELK‑based architecture with Filebeat, Kafka, Logstash, Elasticsearch and Kibana, and provides detailed configuration examples for both file‑based and Kubernetes‑based log collection, plus visualization techniques.

ELKElasticsearchFilebeat
0 likes · 10 min read
How to Build a Real‑Time ELK Log Analysis Platform for Scalable Operations
Test Development Learning Exchange
Test Development Learning Exchange
Aug 23, 2023 · Operations

Server Monitoring Strategies and Tools Using Python

This article outlines key strategies and Python tools for server monitoring, including defining metrics, utilizing libraries like psutil and requests, log analysis, load testing with Locust and PyTest, and implementing automated alerts for high availability.

Load TestingPythonServer Monitoring
0 likes · 4 min read
Server Monitoring Strategies and Tools Using Python
MaGe Linux Operations
MaGe Linux Operations
Aug 23, 2023 · Operations

Master Logwatch: Install and Automate Linux Log Analysis on CentOS

This guide explains why log analysis is essential for Linux system health, walks through installing Logwatch on CentOS, configuring its core settings, automating daily runs via cron, and interpreting sample output for connections, SSH activity, package installs, and disk usage.

CentOSOperationsSystem Administration
0 likes · 8 min read
Master Logwatch: Install and Automate Linux Log Analysis on CentOS
DataFunSummit
DataFunSummit
Aug 17, 2023 · Artificial Intelligence

Research and Applications of Large Language Models in ICT Operations

This presentation explores the fundamental concepts of large language models, their evolution in natural language processing for ICT, practical applications in log‑driven operations, experimental results of models like BigLog and LogXXX, and future visions for AI‑driven autonomous operation.

AIICT operationslog analysis
0 likes · 10 min read
Research and Applications of Large Language Models in ICT Operations
Liangxu Linux
Liangxu Linux
Jul 2, 2023 · Operations

Master Server Log Analysis with Powerful Bash Commands

This guide presents a comprehensive collection of Bash one‑liners—using awk, grep, sort, uniq, netstat, and other utilities—to count unique IPs, rank page visits, filter bots, analyze traffic by time windows, compute bandwidth, and monitor connection states from Apache or Nginx access logs.

BashGrepServer Monitoring
0 likes · 12 min read
Master Server Log Analysis with Powerful Bash Commands
DataFunTalk
DataFunTalk
May 19, 2023 · Big Data

Log Analysis and Schema‑On‑Read: Design and Implementation of the Honghu Real‑Time Heterogeneous Data Platform

This article examines the challenges and value of log analysis, introduces the concepts of schema‑on‑read versus schema‑on‑write, and details how the Honghu platform implements real‑time, one‑stop heterogeneous data analytics with flexible storage, indexing, and SQL‑based query engines.

Real-time analyticslog analysisschema-on-read
0 likes · 24 min read
Log Analysis and Schema‑On‑Read: Design and Implementation of the Honghu Real‑Time Heterogeneous Data Platform
Open Source Linux
Open Source Linux
May 4, 2023 · Operations

Master Fast Log Error Detection with Tail, Grep, and Sed Commands

This guide shows how to quickly pinpoint errors in massive log files on Linux by using dynamic viewing commands such as tail and head, extracting line numbers with grep, searching within time ranges using sed, counting matches, highlighting results, and navigating logs with pagination tools like more and less.

GrepShell Commandslog analysis
0 likes · 12 min read
Master Fast Log Error Detection with Tail, Grep, and Sed Commands
ITPUB
ITPUB
Apr 26, 2023 · Information Security

Detecting CDK Attacks with Kubernetes Audit Logs: Practical Rules and Pitfalls

This article explains how to enable Kubernetes audit logging, analyzes CDK‑based attack behaviors captured in audit logs, provides concrete detection rules for information collection, exploitation, and privilege escalation, and shares practical lessons learned when deploying audit‑driven security in cloud‑native environments.

CDKContainerKubernetes
0 likes · 18 min read
Detecting CDK Attacks with Kubernetes Audit Logs: Practical Rules and Pitfalls
Liangxu Linux
Liangxu Linux
Mar 26, 2023 · Operations

Quick Techniques to Pinpoint Errors in Massive Log Files

Learn how to efficiently navigate, filter, and extract specific entries from large log files using tail, head, grep, sed, and pagination commands, with practical examples for locating error lines and time ranges.

GrepLinuxcommand-line
0 likes · 11 min read
Quick Techniques to Pinpoint Errors in Massive Log Files
Liangxu Linux
Liangxu Linux
Mar 19, 2023 · Operations

Master Log Analysis: Fast Linux Commands to Pinpoint Errors

This guide shows programmers how to quickly locate errors in massive server logs using essential Linux commands such as tail, cat, grep, sed, and pagination tools, providing step‑by‑step examples and tips for efficient debugging.

DebuggingLinuxOperations
0 likes · 12 min read
Master Log Analysis: Fast Linux Commands to Pinpoint Errors