Kibana is an awesome tool in the Elastic Stack that aims to solve the problem of what to do with all the data that you collect and how to use it in a meaningful way. Kibana does that by letting you easily visualize the data that arrives into Elasticsearch. In this article, I will give you a brief introduction to the tool and how to set up your first visualization.
Sometimes it’s nice to be able to provide output by speech rather than via the traditional console or some type of GUI. Text-to-speech with Python is actually a lot easier than you might expect.
We are getting closer to the release of Java 10 and in this article, we are going to explore a couple of new interesting features that will be new in Java 10 OpenJDK.
It is easy to get started with Apache Kafka using Spring Kafka. A lot is abstracted away and left configurable for our convenience. In this article, we are going to write code to display how easy it is to get started with Spring Kafka.
Elasticsearch is a powerful search engine developed in Java with clients available for many of the major languages. Data is stored as JSON documents and are easily and quickly searched via an HTTP interface. Elasticsearch is popular to run together with Logstash for data-collecting and processing logs, and Kibana for visualizing the data. This is referred to as the Elastic Stack, and Elasticsearch functionality in the stack is to store the data and make it searchable.
When dealing with multiple servers, and especially in a high availability environment handling logs can get quite complex. It can become difficult to debug with logs spread out over multiple servers and this is one of the problems that Logstash attempts to address. Logstash is also part of the ELK (ElasticSearch, Logstash, and Kibana) Stack, lately referred to as the Elastic Stack, which together form a very powerful tool for managing, reading and visualizing logs and data. In the Elastic Stack series, we are going to have a look at each of the tools and go through some best practices.
Spring Security makes it easy to implement OAuth2 as your protocol for authentication. In this article, we are going to implement an authentication server using Spring Security OAuth2. We are also going to implement a very basic client which will make use of the authentication server.
Docker Swarm enables us to easily scale up and down our servers with containers, but how do we take advantage of all of our containers? Preferably we would want to spread out the load across the multiple containers. With a HAProxy this becomes possible.
Spring Boot 2.0 is just around the corner, but what is actually new in Spring Boot 2.0? As expected, it comes with new features and improvements, and in this article, I will try to summarize the key parts of the release.