As did for the last year edition, our DevOps team participated at InfluxDays, a conference organized by InfluxData and focused on time series data. We were really looking at the event with excitement, for all the new features InfluxData is putting into the new InfluxDB 2.0. So, apart from grabbing a very nice t-shirt, we attended a lot of interesting talks.
Talk: Kubernetes Monitoring with InfluxDB 2.0 and Flux
Gianluca Arbezzano from InfluxData spoke about how to monitor a Kubernetes based infrastructure using InfluxData technology. In the case of Kubernetes, we need to be sure to monitor not only the hardware on which all the K8s infrastructure is running on, but also any service, ingress, and pod that has been deployed. To solve the first issue, Telegraf can be deployed as DeamonSet to gain visibility on every host that compose our K8s cluster. The Telegraf agent monitors resources like iops, network, cpu, memory, disk and other services from the host. To solve the second issue, we can resort again to Telegraf, but this time in sidecar mode. Telegraf can then installed as sidecar in the pods to monitor, guaranteeing that our monitoring configuration is very close to each application. At this point, all your container and cluster data can be stored in InfluxDB and manipulated via Flux with almost zero pain.
Luca Deri from NTOP gave us a cool insight into network traffic monitoring in the era of containers. Traditionally, tools analyze each incoming and outgoing packet. In an architecture based on containers, packet analysis like was in the past is no longer sufficient to have visibility on how services can interact inside a system. Luca explained to us how open source tools developed by NTOP can provide the capability of monitoring containers. This can be done with the help of InfluxDB: events and network interaction between services and containers retrieved by the various NTOP tools are stored as time series into InfluxDB.
Loving understanding of how things work, how things can be automated, and how to apply new technologies when needed. Passionate about technology, open-source software, and security. I found Würth Phoenix the right place for this.
In the past, I co-founded a cybersecurity startup that produces security solutions for mobile apps and blockchain.
Previously, I worked as researcher at Fondazione Bruno Kessler of Trento. My research was mainly focused on web and mobile app security and testing.
I got my PhD in Computer Science at the University of Trento.
Author
Andrea Avancini
Loving understanding of how things work, how things can be automated, and how to apply new technologies when needed. Passionate about technology, open-source software, and security. I found Würth Phoenix the right place for this.
In the past, I co-founded a cybersecurity startup that produces security solutions for mobile apps and blockchain.
Previously, I worked as researcher at Fondazione Bruno Kessler of Trento. My research was mainly focused on web and mobile app security and testing.
I got my PhD in Computer Science at the University of Trento.
Hello everyone, I’m back to discuss Ansible and Ansible Execution Environments. In my previous blog, we talked about why and how execution environments are critical for a successful Ansible implementation. I hope my guide was easy to follow, but as Read More
Right now, at Würth Phoenix, we are investing in automating most of our operations using Ansible. You're probably already familiar with what Ansible does, but to summarize, Ansible is an open-source, command-line IT automation application written in Python. I've talked Read More
As you may know, I do ntopng consulting, and support companies in their implementation of ntop solutions. For some time now, ntopng users have noticed a high amount of QUIC traffic in their respective networks. Most people don't really know Read More
Every now and then I like to keep you up to date about news in the ntop environment. This time it's not news about analysis methods or software, but about a new hardware solution. If you're someone looking for a Read More
Over the course of the last few years, we've introduced more and more features in NetEye 4. This fact has had a side effect that's not directly visible to customers, namely that we keep adding more and more tests to Read More