Key metrics to monitor in Redis and optimization settings

Key metrics to monitor in Redis and optimization settings


Hi everyone in our last post we talked about Redis monitoring using Prometheus and Grafana. When I posted this on a few forums I got a suggestion that I should write about key metrics to watch while monitoring Redis. So let’s start the article Key metrics to monitor in Redis and optimization settings. Below are

Redis monitoring using Prometheus and Grafana

Redis monitoring using Prometheus and Grafana


We have seen in one of the past articles about Redis clustering and how we can take backup and restore it. In this, we are going to see how we can monitor Redis nodes using Prometheus and Grafana. If you don’t know about Prometheus and Grafana read about it here. Now let’s see how we

Redis Cluster backup and restore.

Redis Cluster backup and restore.


Redis is an in-memory cache or key-value store. You can save the keys and values and access them very fast as it resides in memory. You can also persist the data in the disk as it provides an option for the same. One of the most famous ways to use Redis is its clustering mode.

System Programming: Basic Copy program in C using low-level IO

System Programming: Basic Copy program in C using low-level IO


In this article, we are going to start learning system programming by first of all creating a copy program like cp using low-level IO functions and not the standard IO functions. Now first let’s see what is system programming and what is low-level IO functions in C. System Programming: System programming aims at producing software

What is eBPF and why is it called a superpower in Linux?

What is eBPF and why is it called a superpower in Linux?


BPF also known as Berkeley Packet Filters was introduced first in 1992 by Steven McCanne and Van Jacobson in their paper The BSD packet filter: A New architecture for user-level packet capture. In this paper, they presented about BPF architecture and how it interfaced with the rest of the system and a new mechanism for

How Kubernetes works on a reconciler pattern

How Kubernetes works on reconciler pattern.


Kubernetes is very hot right now in the industry and everyone wants to learn and use it. In this article, we will read about how Kubernetes works on a reconciler pattern. We have previously talked about the reconciler pattern and how you can use it. You can have a look at the writeup in the

How traceroute works

How traceroute works using ICMP error messages.


In this article, we will talk about how traceroute works using ICMP. ICMP stands for Internet Control Message Protocol. This is used in the network layer just above the IP because ICMP messages are also encapsulated in IP packets. Now let’s have a look at how traceroute works using ICMP. When you type traceroute destination

How containers isolate processes using Linux namespaces?

How containers isolate processes using Linux namespaces?


Containers work on the principle of isolating one process running in the container from the process running on hosts or any other container. Let us see how containers isolate processes using Linux namespaces? This is what provide containers to have a fresh runtime for any application irrespective of what other process are running on that

Monitor your unix system resources using HTOP.

What is blackbox monitoring? Automating with bash script


Monitoring is very important when you want your systems to work properly. Monitoring helps you identify the issues while they are happening or before them. So it is very important to implement your monitoring properly. Let’s see what is black box monitoring. Now when you see any issue how you should approach your debugging. First