Page 186 - Building Big Data Applications
P. 186
Chapter 10 Building the big data application 185
Vagrant is a DevOps tool. It allows building and managing virtual machine envi-
ronments in a single workflow. It offers easy-to-use workflow and focuses on auto-
mation. Vagrant lowers development environment setup time and increases
production parity.
Features:
- Vagrant integrates with existing configuration management tools like Chef,
Puppet, Ansible, and Salt
- Vagrant works seamlessly on Mac, Linux, and Window OS
- Create a single file for projects to describe the type of machine and software
users want to install
- It helps DevOps team members to have an ideal development environment
PagerDuty is a DevOps tool that helps businesses to enhance their brand reputa-
tion. It is an incident management solution supporting continuous delivery strat-
egy. It also allows DevOps teams to deliver high-performing apps.
Features:
- Provide real-time alerts
- Reliable and rich alerting facility
- Event grouping and enrichment
- Gain visibility into critical systems and applications
- Easily detect and resolve incidents from development through production
- It offers real-time collaboration system and user reporting
- It supports platform extensibility
- It allows scheduling and automated escalations
- Full-stack visibility across development and production environments
- Event intelligence for actionable insights
Ganglia is a DevOps tool that offers teams with cluster and grid monitoring capa-
bilities. This tool is designed for high-performance computing systems like clusters
and grids.
Features:
- Free and open-source tool
- Scalable monitoring system based on a hierarchical design
- Achieves low per-node overheads for high concurrency
- It can handle clusters including 2000 nodes
Snort is a very powerful open-source DevOps tool that helps in the detection of in-
truders. It also highlights malicious attacks against the system. It allows real-time
traffic analysis and packet logging.
Features:
- Performs protocol analysis and content searching
- It allows signature-based detection of attacks by analyzing packets
- It offers real-time traffic analysis and packet logging
- Detects buffer overflows, stealth port scans, and OS fingerprinting attempts,
etc.