Tagged articles
217 articles
Page 3 of 3
Qunar Tech Salon
Qunar Tech Salon
Sep 18, 2016 · Operations

Analyzing Nginx Access Logs for Traffic, Performance, and Optimization

This article explains how to extract valuable performance and traffic insights from Nginx access logs using shell commands and awk, covering request volume, peak rates, bandwidth usage, slow‑query detection, URL normalization, and practical optimization recommendations for web operations.

OperationsPerformance MonitoringShell scripting
0 likes · 13 min read
Analyzing Nginx Access Logs for Traffic, Performance, and Optimization
dbaplus Community
dbaplus Community
Jul 5, 2016 · Operations

How to Transform Operations Monitoring with Big Data Thinking

This article explains how to apply big‑data concepts and platforms to operations monitoring, covering data sources, metric extraction from logs, architectural design with Flume, Spark Streaming and HBase, implementation steps, and the resulting benefits for scalability and rapid metric development.

Spark Streaminglog analysis
0 likes · 11 min read
How to Transform Operations Monitoring with Big Data Thinking
AI Cyberspace
AI Cyberspace
Jul 4, 2016 · Information Security

Master Linux Auditing: Essential Commands and Log Analysis Techniques

This guide explains essential Linux audit commands, log‑viewing techniques, user and process inspection methods, and additional checks such as file integrity, network monitoring, cron jobs, and backdoor detection, providing a comprehensive toolkit for system security and operations.

Securityauditlog analysis
0 likes · 9 min read
Master Linux Auditing: Essential Commands and Log Analysis Techniques
Efficient Ops
Efficient Ops
Jun 19, 2016 · Operations

How Real‑Time Log Analysis Is Revolutionizing IT Operations

This article summarizes a 2016 Global Operations conference talk that explains the concept of IT Operations Analytics (ITOA), its four data sources, the evolution of log management from databases to real‑time search engines, and real‑world case studies demonstrating how fast, large‑scale log analysis improves monitoring, security, and business insight.

Big DataIT Operationslog analysis
0 likes · 25 min read
How Real‑Time Log Analysis Is Revolutionizing IT Operations
dbaplus Community
dbaplus Community
Mar 6, 2016 · Databases

Sudden Daily Accounting Lag: DBA Forensics Reveal Oracle RAC Log I/O Bottleneck

On February 10, 2016 a provincial accounting database experienced severe daily‑batch delays despite other applications running normally; a senior DBA collected alert logs, AWR snapshots, ASH dumps, and OSW metrics, uncovered log‑file‑sync and redo‑IO degradation, increased rollbacks, and a faulty SAN link, pinpointing the root cause.

AWRDBAOracle
0 likes · 8 min read
Sudden Daily Accounting Lag: DBA Forensics Reveal Oracle RAC Log I/O Bottleneck
21CTO
21CTO
Jan 9, 2016 · Big Data

How We Scaled Real‑Time Log Analysis to 2 TB Daily with ELK

This article shares the author's practical experience building a real‑time log analysis platform at Sina, covering service scope, ELK architecture, performance optimizations, usability improvements, new features, common pitfalls, and a concise Q&A for engineers handling massive log streams.

ELKElasticsearchKafka
0 likes · 12 min read
How We Scaled Real‑Time Log Analysis to 2 TB Daily with ELK
ITPUB
ITPUB
Nov 16, 2015 · Information Security

5 Hidden Signs Your Web Application Is Compromised and How to Respond

The article outlines five subtle indicators of a web application breach—abnormal behavior, irregular logs, unexpected processes or users, file modifications, and warning messages—while offering practical monitoring and remediation steps to help security teams detect and mitigate attacks early.

Web Securityapplication monitoringincident response
0 likes · 7 min read
5 Hidden Signs Your Web Application Is Compromised and How to Respond
Qunar Tech Salon
Qunar Tech Salon
Oct 31, 2014 · Operations

Simple Testing Can Prevent Most Critical Failures: Findings from an Analysis of Five Open‑Source Distributed Systems

A recent study of five major open‑source distributed systems reveals that most failures can be triggered and reproduced with simple, multi‑event tests, highlighting the importance of systematic testing, deterministic error handling, and concise logging for reliable system operation.

Bug AnalysisDistributed SystemsReliability
0 likes · 6 min read
Simple Testing Can Prevent Most Critical Failures: Findings from an Analysis of Five Open‑Source Distributed Systems