We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Devroom intro

00:00

Formal Metadata

Title
Devroom intro
Title of Series
Number of Parts
561
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
10
58
80
111
137
Thumbnail
15:21
159
Thumbnail
18:51
168
Thumbnail
26:18
213
221
Thumbnail
15:22
234
Thumbnail
49:51
248
Thumbnail
23:06
256
268
283
Thumbnail
28:38
313
Thumbnail
1:00:10
318
Thumbnail
21:35
343
345
Thumbnail
36:13
353
Thumbnail
18:44
369
370
373
Thumbnail
44:37
396
Thumbnail
28:21
413
Thumbnail
16:24
439
455
Thumbnail
25:10
529
Thumbnail
15:36
535
Thumbnail
28:04
552
Content (media)Image resolutionComputer networkMetric systemAugmented realityMathematical analysisInformation privacySystem programmingSinguläres IntegralScale (map)Data storage deviceData managementDependent and independent variablesSource codeRule of inferencePoint (geometry)BitMultiplication signFlow separationStaff (military)Row (database)State observerDependent and independent variablesExistenceMetric systemIncidence algebraInternet der DingePhysical systemOcean currentCellular automatonObject (grammar)Cartesian coordinate systemData storage deviceBinary codeLoginScaling (geometry)CAN busMatrix (mathematics)Game theoryInformationSynchronizationImage resolutionSoftwareAugmented realitySpacetimeMetadataAxiom of choiceRevision controlPfadanalyse2 (number)Moving averageData miningMetropolitan area networkPrimitive (album)Fluid staticsContent (media)Matching (graph theory)Point cloudWebsiteDifferent (Kate Ryan album)Drop (liquid)Computer animation
Computer animation
Transcript: English(auto-generated)
So welcome to def room We have the third monitoring def room in a row We've had the largest or second largest room every single year and I reduced myself from all def room assignments for obvious reasons
Still we managed to completely fill up this room several times during the day So this is just awesome and shows how much interest in that topic exists And also it goes to show that if you are interested in like say like 70% of those talks chances are you do not want to leave else. You might not get a space anymore, but that's your choice
So I'd like to especially thank Ben Kochi who is not yet here Carl who is also not here and Fabian Stata who is making sure that the door doesn't bang all the time You will be seeing us a few times around and seeing and and doing stuff
So let's quickly go through the content course. I know we have this online I know it just broke because we had to switch out a speaker last minute So penta bar broken I didn't manage to fix it yet Anyway, we'll start with Rosario who will be talking about civics and
Civics is kind of hopefully we'll start with him But in in my mind, this is like the best Last gen monitoring system on earth and it literally kept my sanity for almost a decade if I hadn't had civics I would probably be in jail or or something Then we have Simone minority. I hope I get those names, right?
With augmented network visibility and high resolution matrix. So we're talking like Second metric second resolution. So we're not or he's not delving into microburst but into birds So and this is also already really really useful to just see do you have
Like the full pipe for half a second or maybe two seconds, of course This can already massively hurt your your performance of pretty much any application and it at least gives you some Hopefully way to detect if you had microburst because those are even worse, especially when you have any storage system
Then we have JBD Yana Dogen critical path analysis I'd like to I like to say that there's only very few ways to actually think about what observability is and what matters in monitoring and Going through the critical path of your applications and of your user stories of what your users are actually trying to do is
One of the best one course, it identifies all those really really important bits and pieces Which might not be immediately obvious only obvious there's called he also gets a thank you Then we have myself. I'm standing in for Priyanka Sharma course She had visa issues, which just goes to show that visa sucks and
diversity also has some unseen challenges to it or unseen to to at least anyone who's white and European passport and no problem with all the things but others have issues. So yeah, that kind of sucks She couldn't make it so I'll be having a full talk initially
It was planned for me to open the staff room with just like a short version of this talk Now I'm doing the full one Then we have Tom Wilkie who's going to talk about Loki which basically takes the Metadata system and the label system of Prometheus and use it for logs Which is not full text search like for example, you would have with Splunk or elk stack
But on the other hand it scales way better and it costs way less So it's it's a good point to be in between and you should definitely have a look at that one Then we have someone with a really good surname
It's the same as mine about so if you want to do latencies Is the classical like 99 95 is this the correct thing to do? Is it always the correct thing to do? When do you want to do something differently and all these kinds of considerations come into play? Then we've got Rob Stillington who works at uber, so he did uber for for metrics
and 3db is their internal stuff which they've been working on for a few years now and It's quite interesting to be honest. It's it's similar to all the other Like current gen metric things, but it's pretty interesting in and out of itself
Then we have who I am there month, I hope that is somewhat correct at least Talking about how to do monitoring for Tor without exposing users To to surveillance course, obviously you kind of want to avoid
Identifying users on Tor networks on the other hand, especially as people are anonymous You need to kind of have good visibility into into how the system runs and this this this trade-off That's what he's going to talk about Then we have Peter Sytsef
Who's going to show us the eBPF exporter of cloudflare and also talk a little bit about what? eBPF does and how to get new information out of your Linux systems, of course This is kind of game changer within Linux. You just get in some places a lot deeper information than you could get before and a lot more consistent
Then we've got Bartek. He will be talking about Thanos which basically takes normal Prometheus, which normally is a single binary. It's It runs as one one single thing and basically it takes a storage and it puts out I put it's out into object storage which allows you to do all kinds of neat things And he'll be talking about that one
Then we've got metal matse and cell use overnight Talking about Kubernetes and how to how to do monitoring of Kubernetes with Prometheus for those who don't know Kubernetes and Prometheus Very wouldn't be as big if the other one didn't exist. Of course, they are in a very very tight interdependency
I mean Prometheus doesn't really depend on Kubernetes, but the rush of Kubernetes Propel Prometheus forward, but you couldn't really be running Kubernetes unless you had some monitoring which does labels So this is why they're really closely coupled and those two are really really good at what they do
So we'll be seeing a lot of that stuff Once more if the next speaker is here, you can come up and prepare. Of course We would like to switch over in like two minutes. Yes, exactly two minutes Then we have something about James Shubin about Trying to take your monitoring data and act on this automatically so get nearer to this to this holy goal of
self healing systems Then Hannah Suarez About why it makes sense to have centralized logs and not just have bits and pieces and Silos of your data and small islands of your data and then have fun with with trying to to discern anything
especially an incident response And I know that the second last we have Ilya enough on writing a synchronous SNMP agents SNMP for those who don't know is pure distilled pain. It sucks and you still have to use it then we have monitoring for Internet of Things and how you can tie MQTT and all those things into a monitoring story and
finally we have Make this journal how to how to do LDAP monitoring. There's a few things I'd like to say if you see trash don't care if it's yours Take it with you. Take it outside
Don't put it into these put it back in those trash cans not those because there was always full Please take it to those trash cans and also please respect the speakers They're doing this mostly their own free time some even travel on their own money to come here and speak We want to maximize well Q&A time not Q time, but whatever
So and for us to maximize Q&A, we really need you to be quiet You can you can enter you can leave no problem, but be quiet if you're not quiet. We will shout you down This is not because we're evil. This is because it's about respect for the people who invest their time to do this Thank you very much. And if we have the speaker then I'd like him to come up and if not, we have an issue