Software Telemetry: Reliable Logging and Monitoring by Jamie Riedesel
Author:Jamie Riedesel [Riedesel, Jamie]
Language: eng
Format: epub
Tags: computers, Software Development & Engineering, General, Systems Analysis & Design, Quality Assurance & Testing
ISBN: 9781617298141
Google: BEY6EAAAQBAJ
Publisher: Simon and Schuster
Published: 2021-08-31T23:39:22.717520+00:00
Figure 10.12 Two workflows for our Booking and Passenger Manifest department: one for accepting reservations and a second for checking in passengers to generate a flight manifest. This airline operates three regional clusters of web servers supporting reservations in North America, Europe, and Singapore. There is a gate computer at each airport gate loading passengers. The reservation servers and the gate computer talk to up to three APIs hosted on a central mainframe in Europe. The flight manifest is created as a batch job after all passengers are checked in. We will be looking at this production environment in later figures.
Figure 10.13 gives us the flow of logging data out of the Booking and Passenger Manifest departmentâs production servers and into the telemetry pipeline. A lot is going on here, so letâs step through it:
Events are emitted by the three production systems.
Globally located reservation web servers ship events by way of webhook to webhook receivers hosted in the Paris data center, using emitter/shipper functions in the backend application code. (See section 3.1.3 for an example of sending telemetry by way of HTTP POSTs.)
API servers running in LPARs on the Paris mainframe ship events directly into a Kafka-based stream on the logging_raw topic, also using emitter/shipper functions. (See section 3.1.2 for an example of sending telemetry into streams.)
The Create Flight Manifest batch job on the Paris mainframe emits job output into the mainframe systemâs console.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Exploring Deepfakes by Bryan Lyon and Matt Tora(8284)
Robo-Advisor with Python by Aki Ranin(8238)
Offensive Shellcode from Scratch by Rishalin Pillay(6384)
Microsoft 365 and SharePoint Online Cookbook by Gaurav Mahajan Sudeep Ghatak Nate Chamberlain Scott Brewster(5613)
Ego Is the Enemy by Ryan Holiday(5294)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4527)
Python for ArcGIS Pro by Silas Toms Bill Parker(4459)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(4177)
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(4176)
Liar's Poker by Michael Lewis(3368)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(3333)
Speed Up Your Python with Rust by Maxwell Flitton(3277)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(3250)
Extreme DAX by Michiel Rozema & Henk Vlootman(3235)
Agile Security Operations by Hinne Hettema(3160)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(3151)
Essential Cryptography for JavaScript Developers by Alessandro Segala(3122)
Cryptography Algorithms by Massimo Bertaccini(3057)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(3021)