Tagged articles
217 articles
Page 2 of 3
Efficient Ops
Efficient Ops
Mar 14, 2023 · Artificial Intelligence

How NetEase Games Built an AIOps Platform to Transform IT Operations

This article explains how NetEase Games leveraged AI, big data, and machine learning to create an AIOps platform that automates anomaly detection, log analysis, and fault localization, improving quality assurance, cost management, and operational efficiency across complex gaming infrastructures.

IT Operationsaiopsanomaly detection
0 likes · 12 min read
How NetEase Games Built an AIOps Platform to Transform IT Operations
Liangxu Linux
Liangxu Linux
Mar 12, 2023 · Operations

Master Apache Log Analysis with Powerful AWK and Netstat Commands

This guide presents a comprehensive collection of AWK, grep, sed, and netstat one‑liners that let you count unique IPs, rank page visits, measure bandwidth, monitor TCP states, and extract detailed traffic patterns from Apache access logs on Linux systems.

ApacheLinuxNetwork Monitoring
0 likes · 11 min read
Master Apache Log Analysis with Powerful AWK and Netstat Commands
AntTech
AntTech
Mar 7, 2023 · Cloud Native

Introduction to HoloInsight: A Cloud‑Native Lightweight Observability Platform

HoloInsight is an open‑source, cloud‑native observability platform derived from Ant Group's AntMonitor, offering integrated log‑based monitoring, business metric analysis, and AI‑driven AIOps capabilities while providing a lightweight, modular architecture and extensive extensibility for modern software stacks.

Observabilityaiopscloud-native
0 likes · 13 min read
Introduction to HoloInsight: A Cloud‑Native Lightweight Observability Platform
Python Programming Learning Circle
Python Programming Learning Circle
Mar 6, 2023 · Operations

Intelligent Operations: AI‑Driven Anomaly Detection, Alarm Compression, and Log Analysis Techniques

This article presents an AI‑enhanced operations framework that combines metric anomaly detection, alarm compression, log anomaly detection, and intelligent analysis using machine learning methods such as DBSCAN clustering, SARIMAX modeling, Apriori association rules, and LSTM‑based log parsing to improve fault detection and reduce operational costs.

Operationsaiopsanomaly detection
0 likes · 15 min read
Intelligent Operations: AI‑Driven Anomaly Detection, Alarm Compression, and Log Analysis Techniques
ITPUB
ITPUB
Feb 13, 2023 · Databases

How Apache Doris Enables Cloud‑Native Real‑Time Data Warehousing for Log Analytics

Based on a DTCC2022 presentation, this article explains Apache Doris's high‑performance MPP architecture, its cloud‑native extensions in SelectDB, and how they solve large‑scale log storage and analysis with superior write throughput, storage efficiency, and interactive query speed.

Apache DorisMPPReal-time analytics
0 likes · 11 min read
How Apache Doris Enables Cloud‑Native Real‑Time Data Warehousing for Log Analytics
Su San Talks Tech
Su San Talks Tech
Dec 21, 2022 · Information Security

Block Malicious IPs on a Small Linux Site with iptables and Cron

This guide explains how to detect traffic attacks on a low‑traffic Linux website, split Nginx logs daily, identify IPs with excessive requests, and automatically block them using iptables rules scheduled via cron, complete with ready‑to‑run Bash scripts and common firewall commands.

BashDDoS mitigationLinux
0 likes · 9 min read
Block Malicious IPs on a Small Linux Site with iptables and Cron
Efficient Ops
Efficient Ops
Nov 20, 2022 · Information Security

How to Detect and Recover from Linux Server Intrusions: Essential Checks

This guide outlines eleven practical steps for Linux system administrators to identify signs of compromise—such as missing logs, altered password files, unusual login activity, abnormal traffic, and deleted files—and provides command examples for detection and recovery.

File RecoveryLinuxSecurity
0 likes · 7 min read
How to Detect and Recover from Linux Server Intrusions: Essential Checks
Tencent Cloud Developer
Tencent Cloud Developer
Nov 15, 2022 · Operations

Detecting and Resolving CCN Bandwidth Issues with CLS Log Analytics

This article walks through how an online education operator uses Tencent Cloud Log Service to monitor Cloud Connect Network flow logs, set reject‑traffic alerts, analyze regional, IP, and protocol distributions, track bandwidth trends, and finally expand bandwidth to eliminate service interruptions.

CCNCLSNetwork Monitoring
0 likes · 6 min read
Detecting and Resolving CCN Bandwidth Issues with CLS Log Analytics
Liangxu Linux
Liangxu Linux
Oct 30, 2022 · Operations

Essential Linux Commands for Analyzing Web Server Logs

A comprehensive collection of practical Linux one‑liners—using awk, grep, sort, uniq, and netstat—to count unique IPs, track page visits, rank URLs, monitor connection states, and measure traffic from Apache access logs for effective server operations.

GrepLinuxServer Monitoring
0 likes · 13 min read
Essential Linux Commands for Analyzing Web Server Logs
LOFTER Tech Team
LOFTER Tech Team
Oct 26, 2022 · Operations

Efficient Nginx Log Analysis Using GoAccess and Practical Case Studies

This article explains why Nginx logs are critical, compares various log‑analysis tools, provides detailed installation and configuration steps for GoAccess, discusses selection criteria, and shares real‑world case studies that demonstrate how to extract valuable system and business insights from massive access logs.

NGINXgoaccesslog analysis
0 likes · 20 min read
Efficient Nginx Log Analysis Using GoAccess and Practical Case Studies
Open Source Linux
Open Source Linux
Oct 19, 2022 · Backend Development

From Monolith to Microservices: A Practical Evolution Guide

This article walks through the step‑by‑step transformation of a simple online supermarket from a monolithic web app to a fully‑featured microservice architecture, covering common pitfalls, component choices, monitoring, tracing, logging, service discovery, fault‑tolerance, testing, and deployment strategies.

MicroservicesService Meshcircuit breaker
0 likes · 22 min read
From Monolith to Microservices: A Practical Evolution Guide
Liangxu Linux
Liangxu Linux
Oct 19, 2022 · Operations

Essential Linux Commands for Analyzing Web Server Logs

This guide compiles practical Linux shell commands for extracting IP counts, page visit frequencies, time‑range queries, bandwidth usage, HTTP status distribution, and TCP connection states from Apache or Nginx access logs, helping administrators quickly spot traffic patterns, bottlenecks, and potential attacks.

ApacheLinuxNetwork Monitoring
0 likes · 12 min read
Essential Linux Commands for Analyzing Web Server Logs
Efficient Ops
Efficient Ops
Oct 8, 2022 · Operations

Master Server Log Analysis: 30 Essential Linux Commands for Monitoring Traffic

This guide compiles a comprehensive set of Linux command‑line techniques—using awk, grep, netstat, and other tools—to help you count unique IPs, track page visits, identify heavy‑traffic files, monitor connection states, and extract performance metrics from Apache and other web server logs.

Server Monitoringawklog analysis
0 likes · 14 min read
Master Server Log Analysis: 30 Essential Linux Commands for Monitoring Traffic
Baidu Geek Talk
Baidu Geek Talk
Sep 20, 2022 · Mobile Development

APP Speed Evaluation Methods and the LazyPerf Tool

The article reviews log‑based, manual, and automated app speed evaluation methods, highlights their trade‑offs, and introduces LazyPerf—a platform that records real‑device interactions, uses resilient widget addressing and built‑in frame detection to dramatically cut automation scripting and calibration effort while improving scalability of performance testing.

Speed Testingapp performancelazyperf
0 likes · 14 min read
APP Speed Evaluation Methods and the LazyPerf Tool
NetEase Game Operations Platform
NetEase Game Operations Platform
Sep 19, 2022 · Artificial Intelligence

Applying AIOps to Game Operations: Roadmap, Anomaly Detection, and Fault Localization

This article describes NetEase's AIOps journey for game operations, explaining the Gartner definition of intelligent operations, the implementation roadmap, detailed anomaly‑detection techniques for business, performance, and log data, and a comprehensive fault‑localization workflow that combines resource, code, and historical analysis.

Fault Localizationaiopsanomaly detection
0 likes · 12 min read
Applying AIOps to Game Operations: Roadmap, Anomaly Detection, and Fault Localization
Aikesheng Open Source Community
Aikesheng Open Source Community
Sep 5, 2022 · Databases

Investigation of DBLE "no handler" Log Entries and MySQL Connection‑Timeout Error Handling

This article investigates why DBLE repeatedly logs "no handler" messages by analyzing DBLE and MySQL logs, using Arthas to trace the call chain, reproducing the scenario with timeout settings, capturing network traffic, and explaining the MySQL 8.0.24 error‑packet behavior that leads to the observed logs.

ArthasBackend DevelopmentDBLE
0 likes · 12 min read
Investigation of DBLE "no handler" Log Entries and MySQL Connection‑Timeout Error Handling
JD Tech
JD Tech
Aug 26, 2022 · Information Security

API Security Governance and Authentication Practices in JD Logistics Sorting Platform

This article examines security challenges encountered in JD Logistics' sorting platform, details the investigative process for abnormal API requests, proposes a SHA‑256 based authentication scheme with digital signatures, compares industry‑wide API protection methods, and shares practical insights from the author's experience in financial API gateway design.

API SecurityAuthenticationdigital signature
0 likes · 15 min read
API Security Governance and Authentication Practices in JD Logistics Sorting Platform
Efficient Ops
Efficient Ops
Aug 17, 2022 · Operations

Master System Monitoring with the USE Method and Prometheus

This article explains how to build a comprehensive monitoring system using the concise USE (Utilization, Saturation, Errors) method, outlines key system and application metrics, and demonstrates practical implementation with Prometheus, Grafana, full‑link tracing, and ELK for observability and performance troubleshooting.

Full‑Link TracingObservabilityPrometheus
0 likes · 13 min read
Master System Monitoring with the USE Method and Prometheus
Ctrip Technology
Ctrip Technology
Aug 4, 2022 · Backend Development

Design and Evolution of Ctrip Ticket Frontend Trace System for Efficient Debugging

The article describes how Ctrip built and continuously improved a Trace system for its ticket‑front‑end microservices, detailing the challenges of distributed logs, the architecture of the solution, and the functional features such as friendly search, multi‑platform aggregation, page replay, and one‑click mock that together boost debugging efficiency for both developers and non‑technical operators.

BackendMicroserviceslog analysis
0 likes · 13 min read
Design and Evolution of Ctrip Ticket Frontend Trace System for Efficient Debugging
Liangxu Linux
Liangxu Linux
Jul 26, 2022 · Fundamentals

7 Practical Shell Script Examples to Boost Your Linux Automation Skills

This article presents seven ready‑to‑use Bash scripts that demonstrate parallel host querying, process statistics gathering, file renaming, directory management, log analysis, network request monitoring, and file size sorting, each with complete code and step‑by‑step explanations.

AutomationShell scriptingSysadmin
0 likes · 8 min read
7 Practical Shell Script Examples to Boost Your Linux Automation Skills
Laravel Tech Community
Laravel Tech Community
Jul 18, 2022 · Operations

Common Linux Commands for Analyzing Web Server Logs and Network Connections

This article presents a collection of practical Linux shell commands—primarily using awk, grep, sort, uniq, netstat, and tcpdump—to count unique IPs, identify most‑visited pages, filter logs by time or URL, monitor connection states, and calculate traffic statistics for Apache or other web servers.

Network MonitoringShell scriptingawk
0 likes · 10 min read
Common Linux Commands for Analyzing Web Server Logs and Network Connections
Dada Group Technology
Dada Group Technology
Jun 20, 2022 · Information Security

Design and Implementation of JD Daojia Security Operations Center (SOC) Platform

This article details the challenges, design choices, deployment steps, detection model creation, data processing, visualization, and future plans of JD Daojia's security operations platform, highlighting the use of Graylog, Elasticsearch, and MongoDB to achieve scalable, real‑time threat detection and response.

Data visualizationGraylogSOC
0 likes · 16 min read
Design and Implementation of JD Daojia Security Operations Center (SOC) Platform
Open Source Linux
Open Source Linux
Jan 17, 2022 · Information Security

Mastering Incident Response: A Step‑by‑Step Guide for Security Professionals

This comprehensive guide walks security engineers through every phase of an incident response—from initial information gathering, containment, and vulnerability scanning to detailed log, process, and account analysis, culminating in recovery steps and post‑incident hardening recommendations.

ForensicsSecurity OperationsSystem Hardening
0 likes · 28 min read
Mastering Incident Response: A Step‑by‑Step Guide for Security Professionals
Efficient Ops
Efficient Ops
Dec 14, 2021 · Operations

20 Essential Linux Commands for Server Log Analysis and Threat Detection

This guide compiles a comprehensive set of Linux shell commands that let you examine web server logs, count unique IPs, identify top‑requested pages, filter bots, monitor connection states, and spot performance or security anomalies, helping you keep your site secure and performant.

ApacheNetwork MonitoringShell Commands
0 likes · 13 min read
20 Essential Linux Commands for Server Log Analysis and Threat Detection
Baidu Geek Talk
Baidu Geek Talk
Nov 24, 2021 · Operations

How Baidu’s Fengjing Uses Holographic Logs to Debug Massive Microservices

Baidu’s Fengjing monitoring platform tackles the daunting challenge of pinpointing failures in its massive Java‑based microservice ecosystem by employing a non‑intrusive probe that captures log metadata, stores it in a database, and reconstructs full request‑level logs with minimal storage overhead.

Distributed TracingJavaMicroservices
0 likes · 9 min read
How Baidu’s Fengjing Uses Holographic Logs to Debug Massive Microservices
Tencent Cloud Developer
Tencent Cloud Developer
Aug 17, 2021 · Big Data

Elasticsearch Technical Event in Shenzhen

The Shenzhen Elasticsearch technical event, co‑hosted by the Elastic Chinese community and Tencent Cloud, presented practical sessions on optimizing the Elastic Stack for search, real‑time analytics, logging, security and APM, featuring compression encoding, MongoDB fusion, ByteDance extensions, cost‑effective log storage, Lucene indexing, cross‑cluster replication, vector engine integration, and large‑scale case studies from Tencent, Tiptop Data and vivo.

ElasticsearchMongoDBVector Computing
0 likes · 4 min read
Elasticsearch Technical Event in Shenzhen
GrowingIO Tech Team
GrowingIO Tech Team
Jul 22, 2021 · Databases

How to Diagnose and Fix Common HBase RegionServer Crashes

This article examines frequent HBase RegionServer failures caused by long GC pauses, oversized scans, and HDFS decommissioning, outlines step‑by‑step troubleshooting procedures—including log searches, GC tuning, scan size limits, and monitoring strategies—and provides practical solutions to prevent and resolve these issues.

HBaseRegionServergc
0 likes · 14 min read
How to Diagnose and Fix Common HBase RegionServer Crashes
Yuewen Technology
Yuewen Technology
Jul 16, 2021 · Operations

Mastering Log Aggregation: From LogID Generation to Powerful Analysis Tools

This article explores the challenges of log aggregation in micro‑service architectures, introduces a globally unique log identifier (logid) with its required properties, compares various logid generation schemes, and presents end‑to‑end solutions for log distribution, aggregation, and analysis using custom tools such as ylog and watcher.

Distributed Systemslog aggregationlog analysis
0 likes · 26 min read
Mastering Log Aggregation: From LogID Generation to Powerful Analysis Tools
macrozheng
macrozheng
Jul 7, 2021 · Operations

Query Linux Logs with SQL Using the ‘q’ Command-Line Tool

The article introduces the command‑line utility q, explains how to install it on Linux and Windows, and demonstrates using familiar SQLite‑style SQL queries to search, filter, join, and aggregate log files and command output, offering a convenient alternative to traditional shell tools.

LinuxSQLcommand-line
0 likes · 10 min read
Query Linux Logs with SQL Using the ‘q’ Command-Line Tool
Liangxu Linux
Liangxu Linux
Jun 23, 2021 · Operations

Query Linux Logs with SQL Using the ‘q’ Tool – A Practical Guide

This article introduces the command‑line utility q, explains how to install it on Linux and Windows, and demonstrates using full SQLite‑compatible SQL syntax to query, filter, join, and aggregate plain‑text log files, offering a database‑style alternative to traditional shell tools.

LinuxSQLcommand-line
0 likes · 10 min read
Query Linux Logs with SQL Using the ‘q’ Tool – A Practical Guide
Efficient Ops
Efficient Ops
Jun 23, 2021 · Backend Development

Why Can’t Elasticsearch Find My Logs? Uncovering Full‑Text Search Pitfalls and Tokenizer Tweaks

This article explains why large‑scale Elasticsearch clusters may miss log entries during keyword searches, dives into the fundamentals of inverted indexes and tokenization, and demonstrates practical index‑time and query‑time tokenizer optimizations—including custom analyzers for English and Chinese—to dramatically improve search recall and precision.

ElasticsearchFull‑Text SearchTokenizer
0 likes · 13 min read
Why Can’t Elasticsearch Find My Logs? Uncovering Full‑Text Search Pitfalls and Tokenizer Tweaks
Efficient Ops
Efficient Ops
Apr 26, 2021 · Information Security

Deploying WAF-FLE: A Step‑by‑Step Guide to Managing ModSecurity Logs

This article walks you through installing and configuring the open‑source WAF‑FLE console—written in PHP—to collect, search, and visualize ModSecurity logs on Apache or Nginx, covering environment setup, database creation, sensor configuration, and troubleshooting common integration issues.

ModSecurityNGINXPHP
0 likes · 8 min read
Deploying WAF-FLE: A Step‑by‑Step Guide to Managing ModSecurity Logs
FunTester
FunTester
Mar 16, 2021 · Operations

How to Capture Per‑API Response Times in Load Tests with Groovy Scripts

This article explains how to extend a performance testing framework to record and visualize individual HTTP interface latencies by parsing consolidated logs, grouping timings by URL, and using a Groovy script with StatisticsUtil to generate response‑time charts.

BackendGroovyLoad Testing
0 likes · 5 min read
How to Capture Per‑API Response Times in Load Tests with Groovy Scripts
MaGe Linux Operations
MaGe Linux Operations
Feb 10, 2021 · Operations

Master Server Log Analysis with Powerful Bash One‑Liners

This guide presents a comprehensive set of Bash and AWK one‑liners for analyzing web server logs, counting unique IPs, tracking page visits, sorting traffic by time, identifying heavy‑weight requests, monitoring Apache processes, and examining network connection states, helping you detect anomalies and optimize performance.

ApacheBashNetwork Monitoring
0 likes · 13 min read
Master Server Log Analysis with Powerful Bash One‑Liners
Liangxu Linux
Liangxu Linux
Jan 28, 2021 · Operations

Essential Linux Commands for Analyzing Web Server Logs

This guide compiles a series of practical Linux one‑liners—using awk, grep, sort, netstat, and related tools—to count unique IPs, rank page requests, filter bots, monitor connection states, and measure bandwidth, enabling quick forensic analysis of Apache or Nginx access logs.

GrepNetwork MonitoringWeb server
0 likes · 12 min read
Essential Linux Commands for Analyzing Web Server Logs
Efficient Ops
Efficient Ops
Jan 20, 2021 · Operations

Log vs Network Data: Which Wins Full‑Link Monitoring in Modern Distributed Systems?

With the shift from monolithic to distributed architectures, this article compares log‑based and network‑data‑based monitoring across data sources, precision, monitoring paths, and implementation methods, concluding that network‑data monitoring offers superior real‑time insight, lower cost, and faster deployment for full‑link observability.

full‑linklog analysismonitoring
0 likes · 11 min read
Log vs Network Data: Which Wins Full‑Link Monitoring in Modern Distributed Systems?
Xianyu Technology
Xianyu Technology
Dec 22, 2020 · Operations

Comprehensive Message Traceability and Real-Time Log Processing for Xianyu

Xianyu’s new Message Quality Platform links client, API, and server logs by a unique messageId, cleans and clusters real‑time telemetry, correlates user behavior, and visualizes abnormal nodes, giving end‑to‑end traceability that cuts incident investigation time by over 90 % and can be applied to other pipelines.

Message TracingOperationsbackend reliability
0 likes · 8 min read
Comprehensive Message Traceability and Real-Time Log Processing for Xianyu
Huolala Tech
Huolala Tech
Nov 11, 2020 · Information Security

How Red Team Techniques Uncover Phishing Attack Origins: A Step‑by‑Step Guide

This article demonstrates how red‑team methods can be applied to phishing traceability, detailing phishing classifications, email‑header extraction, malicious site analysis, web‑shell decryption, privilege‑escalation techniques, log mining, and attacker attribution to reconstruct the full attack chain.

Red TeamWebshellemail analysis
0 likes · 33 min read
How Red Team Techniques Uncover Phishing Attack Origins: A Step‑by‑Step Guide
System Architect Go
System Architect Go
Nov 7, 2020 · Operations

Request Log Analysis System: Collected Fields, Derived Data, and Metrics

This article outlines a request log analysis system that records core request fields, adds proxy‑related data, derives IP‑based ASN and geographic information, parses user‑agent details, and provides comprehensive metrics such as PV/QPS, UV, traffic, latency, status monitoring, and business‑specific insights, all visualized via an ELK‑Kafka architecture.

BackendELKKafka
0 likes · 5 min read
Request Log Analysis System: Collected Fields, Derived Data, and Metrics
Efficient Ops
Efficient Ops
Oct 27, 2020 · Information Security

How to Detect Account Security Threats Using Log Analysis and Alerts

This article explains practical methods for detecting account security threats—such as blacklisted, expired, or abnormal login behaviors—by analyzing Linux and Windows login logs, defining detection rules, and leveraging automated tools to generate timely alerts and reduce security risks.

Threat Detectionaccount securityincident response
0 likes · 27 min read
How to Detect Account Security Threats Using Log Analysis and Alerts
FunTester
FunTester
Jun 26, 2020 · Operations

How Testers Can Master Linux for Environment Setup and Debugging

This guide explains why Linux is essential for software testers, outlines how to build test environments, use key commands like tail, grep, top, and vmstat for log analysis and performance monitoring, and offers tips for deeper Linux learning and interview preparation.

Environment setupLinuxPerformance Monitoring
0 likes · 6 min read
How Testers Can Master Linux for Environment Setup and Debugging
Sohu Tech Products
Sohu Tech Products
Jun 17, 2020 · Backend Development

Practical Guide to Using ELK: Log Collection, Analysis, and Query with Logstash and Kibana

This tutorial walks backend engineers through real‑world scenarios of log collection, parsing, and analysis using the ELK stack—Logstash, Elasticsearch, and Kibana—showing configuration examples, Grok patterns, RESTful API queries, aggregations, and visualizations to boost operational efficiency.

Data visualizationELKElasticsearch
0 likes · 26 min read
Practical Guide to Using ELK: Log Collection, Analysis, and Query with Logstash and Kibana
WecTeam
WecTeam
Jun 16, 2020 · Frontend Development

Mastering Front‑End Error Logging: From BadJS Collection to Deep Analysis

This article explains why front‑end error logging is essential, how BadJS (JavaScript runtime errors) are captured, enriched, and reported, and provides practical strategies for analyzing logs, handling Script errors, dealing with hybrid WebView environments, and scaling the system with big‑data pipelines.

KibanaPerformance Monitoringbadjs
0 likes · 25 min read
Mastering Front‑End Error Logging: From BadJS Collection to Deep Analysis
Liangxu Linux
Liangxu Linux
Jun 13, 2020 · Operations

Mastering Monitoring: From Basics to Advanced Zabbix Practices

This comprehensive guide explains why monitoring is essential for operations, outlines monitoring goals and methods, reviews a wide range of open‑source tools, details a Zabbix‑based workflow, enumerates key metrics across hardware, system, application, network, security and business layers, and offers practical alerting and interview tips.

AlertingOperationsZabbix
0 likes · 21 min read
Mastering Monitoring: From Basics to Advanced Zabbix Practices
Liangxu Linux
Liangxu Linux
Apr 25, 2020 · Operations

Why Dumping Logs into a DB Fails and How Awk Solves the Problem

The article explains why loading all log data into a database is impractical, outlines three drawbacks—volatile requests, data bloat, and cost—and introduces the lightweight awk tool with concrete command examples to filter and analyze network logs efficiently without a database.

Sysadminawkdata-processing
0 likes · 6 min read
Why Dumping Logs into a DB Fails and How Awk Solves the Problem
ITPUB
ITPUB
Mar 9, 2020 · Operations

Step‑by‑Step Guide to Install and Configure SARG for Squid Proxy Log Analysis

This tutorial walks you through installing the GD library, building SARG from source, configuring its key parameters, running reports, using command‑line options, scheduling automated jobs with cron, and troubleshooting common installation and configuration issues for Squid log analysis.

ConfigurationLinuxProxy
0 likes · 8 min read
Step‑by‑Step Guide to Install and Configure SARG for Squid Proxy Log Analysis
MaGe Linux Operations
MaGe Linux Operations
Feb 17, 2020 · Operations

How to Efficiently Split and Merge Large Log Files on Linux

When log files grow massive, traditional tools like vim, cat, grep, and awk become slow and memory‑hungry, but Linux’s split command lets you divide a huge file by line count or size, process the pieces individually, and later recombine them, dramatically improving analysis efficiency.

Big DataShell scriptingfile-handling
0 likes · 8 min read
How to Efficiently Split and Merge Large Log Files on Linux
vivo Internet Technology
vivo Internet Technology
Nov 6, 2019 · Big Data

Elasticsearch Optimization Practices at Tencent: An Interview with Tencent Cloud Engineer Chen Xi

In an interview, Tencent Cloud senior engineer Chen Xi explains how Tencent optimizes Elasticsearch for massive log, monitoring, and document search workloads by prioritizing stability through kernel tweaks, boosting performance with scenario‑specific settings, cutting costs via redundant storage trimming and off‑heap indexing, and leveraging rich data‑pipeline components and robust distributed cluster management to lower operational overhead while anticipating future ecosystem growth and community collaboration.

Distributed SearchElasticsearchTencent Cloud
0 likes · 4 min read
Elasticsearch Optimization Practices at Tencent: An Interview with Tencent Cloud Engineer Chen Xi
Efficient Ops
Efficient Ops
Sep 19, 2019 · Information Security

How to Uncover Hidden Threats: Mastering Web Log Analysis with Secsoso

This guide explains why web log analysis is essential for security, demonstrates how to parse Apache logs, distinguishes normal from malicious requests, and provides practical Secsoso commands for business behavior statistics, traffic monitoring, and detecting attacks such as CC, SQL injection, file inclusion, and XSS.

Threat DetectionWeb Securitylog analysis
0 likes · 19 min read
How to Uncover Hidden Threats: Mastering Web Log Analysis with Secsoso
dbaplus Community
dbaplus Community
Jun 3, 2019 · Operations

Top 5 Open‑Source Log Analysis Tools Every Ops Team Should Try

Monitoring network activity and ensuring compliance requires effective log analysis, and this article reviews five open‑source tools—Graylog, Nagios, Elastic Stack, LOGalyze, and Fluentd—detailing their features, strengths, and use cases for operations and security teams.

log analysismonitoring
0 likes · 11 min read
Top 5 Open‑Source Log Analysis Tools Every Ops Team Should Try
dbaplus Community
dbaplus Community
May 6, 2019 · Mobile Development

How Ele.me’s Rider App Achieves End‑to‑End Business Availability Monitoring

This article details Ele.me Logistics' mobile‑app monitoring architecture—E‑Monitor, TimeBomb, Dogger, and EDW—explaining how each layer collects, visualizes, and analyzes business‑level availability data, and showcases a real‑world debugging case that leveraged the stack to resolve an HTTP/2 connectivity bug.

AndroidOkHttpPerformance Optimization
0 likes · 16 min read
How Ele.me’s Rider App Achieves End‑to‑End Business Availability Monitoring
Suning Technology
Suning Technology
Apr 28, 2019 · Big Data

Unlocking Real-Time Big Data Insights: Suning’s Elastic-Powered Smart Retail Journey

The April 27 Elastic Nanjing Technical Exchange, co‑hosted by Suning Technology and the Elastic Chinese community, showcased how Suning leverages Elasticsearch, Logstash, Kibana and Beats for real‑time search, log analysis, security, and smart‑retail applications, featuring expert case studies and future big‑data strategies.

SearchSmart Retailelastic
0 likes · 6 min read
Unlocking Real-Time Big Data Insights: Suning’s Elastic-Powered Smart Retail Journey
Liangxu Linux
Liangxu Linux
Mar 11, 2019 · Information Security

How to Detect and Recover From Linux Server Intrusions: Practical Steps

This guide outlines ten practical methods for Linux administrators to identify compromised machines on CentOS, including log inspection, checking /etc/passwd and /etc/shadow, analyzing login records, monitoring network traffic, and using lsof to recover deleted log files, with step‑by‑step commands and examples.

File Recoveryintrusion detectionlog analysis
0 likes · 7 min read
How to Detect and Recover From Linux Server Intrusions: Practical Steps
Alibaba Cloud Native
Alibaba Cloud Native
Feb 20, 2019 · Information Security

How to Leverage Kubernetes Audit Logs for Secure Monitoring and Analysis

This article explains the fundamentals of Kubernetes audit logs, their JSON format, recording stages and levels, and shows how to configure policies, analyze logs, and use Alibaba Cloud's integrated solution to create visual reports, custom alerts, and advanced queries for security monitoring.

Kubernetesaudit logslog analysis
0 likes · 13 min read
How to Leverage Kubernetes Audit Logs for Secure Monitoring and Analysis
Efficient Ops
Efficient Ops
Nov 18, 2018 · Operations

Master Server Log Analysis with Essential Linux Commands

This guide compiles a comprehensive set of Linux commands—using awk, grep, netstat, and more—to help you analyze web server logs, track traffic, identify top IPs, monitor connection states, and detect performance bottlenecks on an Alibaba Cloud ECS instance.

Server Monitoringawklog analysis
0 likes · 15 min read
Master Server Log Analysis with Essential Linux Commands
MaGe Linux Operations
MaGe Linux Operations
Jul 15, 2018 · Operations

Mastering Web Log Analysis: Spotting Anomalies and Boosting Performance

This guide explains how to set up a Python‑based log‑analysis tool for web servers, defines key terminology, outlines installation requirements, describes its abstract‑based aggregation features, and demonstrates usage of the accompanying command‑line utility for request, IP, distribution, and detail analysis.

MongoDBWeb serverlog analysis
0 likes · 17 min read
Mastering Web Log Analysis: Spotting Anomalies and Boosting Performance
UCloud Tech
UCloud Tech
Apr 18, 2018 · Big Data

How Elasticsearch Powers Billion‑Record Log Analysis and Full‑Text Search

This article explains how Elasticsearch and the ELK stack address challenges of storing, securing, retrieving, and analyzing massive data volumes by providing distributed real‑time search, log collection, visualization, and even serving as a NoSQL alternative for large‑scale applications.

Big DataELKElasticsearch
0 likes · 7 min read
How Elasticsearch Powers Billion‑Record Log Analysis and Full‑Text Search
MaGe Linux Operations
MaGe Linux Operations
Mar 23, 2018 · Operations

Build a High‑Performance Web Log Analyzer with Python and MongoDB

This article introduces a Python‑based log analysis tool for web servers that provides minute‑level aggregation, abstracted URI and argument patterns, and multi‑dimensional performance metrics, along with installation steps, core features, implementation details, usage commands, and deployment guidelines.

MongoDBPythonWeb Performance
0 likes · 17 min read
Build a High‑Performance Web Log Analyzer with Python and MongoDB
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Jan 30, 2018 · Operations

Can You Predict Switch Failures Before They Happen? Inside PreFix’s ML Approach

This article reviews the PreFix system, which uses machine‑learning on datacenter switch logs to predict hardware failures ahead of time, detailing its design, feature extraction, random‑forest model, experimental validation across multiple switch models, and its broader applicability to disk failure prediction.

Random Forestdatacenter networkslog analysis
0 likes · 12 min read
Can You Predict Switch Failures Before They Happen? Inside PreFix’s ML Approach
MaGe Linux Operations
MaGe Linux Operations
Jan 12, 2018 · Information Security

How to Detect If Your UNIX Server Has Been Compromised: 11 Practical Checks

This guide walks through eleven hands‑on techniques for uncovering UNIX or Solaris intrusions, from inspecting password files and processes to verifying daemon configurations, network sockets, logs, core dumps, hidden files, file integrity, kernel modules, and the limits of manual detection versus IDS solutions.

Network Monitoringintrusion detectionkernel integrity
0 likes · 14 min read
How to Detect If Your UNIX Server Has Been Compromised: 11 Practical Checks
MaGe Linux Operations
MaGe Linux Operations
Sep 11, 2017 · Big Data

How Big Data Can Revolutionize Operations Monitoring

This article explores applying big‑data thinking and platforms—such as Flume, Spark Streaming, and HBase—to operations monitoring, detailing data sources, metric categories, architecture design, implementation steps, and the benefits of a scalable, low‑code monitoring platform.

Big DataOperationsSpark Streaming
0 likes · 10 min read
How Big Data Can Revolutionize Operations Monitoring
Qunar Tech Salon
Qunar Tech Salon
Aug 7, 2017 · Backend Development

Design and Implementation of a Log‑Based Service Pre‑warming Component for Java Applications

To mitigate startup latency spikes in Java-based query services caused by class loading, JIT warm‑up, and lazy resource loading, the article presents a generic, low‑cost pre‑warming component that parses local Dubbo and HTTP logs, filters, samples, and replays traffic, detailing its design, implementation, and performance optimizations.

BackendDubboJava
0 likes · 9 min read
Design and Implementation of a Log‑Based Service Pre‑warming Component for Java Applications
dbaplus Community
dbaplus Community
Jul 30, 2017 · Information Security

Building an Enterprise‑Grade Server Security Audit System: Design, Tools, and Implementation

This article outlines the motivation, design principles, architecture, component choices, and step‑by‑step implementation of a comprehensive server security audit system, covering server information collection, log gathering, access control checks, local vulnerability detection, abnormal traffic analysis, and integration with ELK, Hadoop, and open‑source tools like Lynis and OSSEC.

ELKLynisOSSEC
0 likes · 20 min read
Building an Enterprise‑Grade Server Security Audit System: Design, Tools, and Implementation
DevOps
DevOps
Apr 25, 2017 · Operations

Analyzing and Visualizing Docker Logs with the ELK Stack (Part Two)

This article explains how to analyze and visualize Docker container logs using the ELK stack, covering preparation, parsing tips, Kibana query techniques, and example visualizations to help monitor Dockerized environments effectively in production.

DockerELKKibana
0 likes · 7 min read
Analyzing and Visualizing Docker Logs with the ELK Stack (Part Two)
Efficient Ops
Efficient Ops
Jan 4, 2017 · Information Security

How Deep Defense and Log Analysis Can Thwart Intrusions

This article explains Google’s BeyondCorp concept, the need for deep defense of internal and perimeter networks, and provides practical Linux scripts for monitoring processes, ports, command usage, system events, file changes, and SFTP activity to detect and mitigate host intrusions.

Deep DefenseLinux monitoringhost intrusion detection
0 likes · 10 min read
How Deep Defense and Log Analysis Can Thwart Intrusions
Alibaba Cloud Developer
Alibaba Cloud Developer
Dec 26, 2016 · Operations

How Alibaba’s SunFire Powers Real‑Time Monitoring for Billion‑Scale Transactions

Alibaba’s SunFire platform delivers massive‑scale, real‑time log collection, processing, and visualization for e‑commerce spikes like Double 11, using low‑overhead agents, asynchronous Map/Reduce pipelines, fault‑tolerant task scheduling, and shared inputs to ensure accurate, low‑latency monitoring across billions of transactions.

AlibabaOperationsReal-Time
0 likes · 18 min read
How Alibaba’s SunFire Powers Real‑Time Monitoring for Billion‑Scale Transactions
Efficient Ops
Efficient Ops
Nov 20, 2016 · Operations

Why Most Log‑Analysis Features Are Overrated and What Really Matters

The article critiques popular but unnecessary log‑analysis features—such as sub‑second alerts, endless pagination, flashy maps, full SQL support, bulk downloads, and live tail—arguing that focusing on practical alert content, efficient querying, and proper architecture yields far more value for IT operations.

AlertingDSLData visualization
0 likes · 10 min read
Why Most Log‑Analysis Features Are Overrated and What Really Matters
Qunar Tech Salon
Qunar Tech Salon
Oct 17, 2016 · Information Security

Design and Implementation of a Cloud‑Based Web Application Firewall at Ctrip

This article describes Ctrip's challenges with web security, evaluates hardware and commercial cloud WAF shortcomings, and presents a low‑cost, low‑risk cloud‑based WAF solution that leverages DNS redirection, closed‑loop rule management, Lua/Tengine deployment, supervised machine‑learning log analysis, and big‑data streaming for real‑time threat detection and mitigation.

Big DataWAFWeb Security
0 likes · 9 min read
Design and Implementation of a Cloud‑Based Web Application Firewall at Ctrip
ITPUB
ITPUB
Sep 29, 2016 · Operations

Build a Log Analysis Platform in 30 Minutes with ELK, Ansible, and Vagrant

This tutorial shows how to quickly set up a log analysis platform using the ELK stack, OpenResty, Ansible, and Vagrant, covering architecture, required tools, server provisioning, deployment commands, testing procedures, and next‑step enhancements for real‑world use.

ELKElasticsearchKibana
0 likes · 10 min read
Build a Log Analysis Platform in 30 Minutes with ELK, Ansible, and Vagrant