Skip to main content

My Monitoring Journey: Cacti, Graphite, Grafana & Chronograf

I remember using Cacti at my first job over a decade ago. I’ve revisited it more than a few times since but it hasn’t been my go to monitoring tool for quite some time for a number of reasons, such as:

It’s not visually appealing when compared to Grafana and Chronograf.
It’s difficult to set up.
It’s difficult to maintain.

After Cacti I used Graphite for a short stint. My time with it was good while it lasted but I found it lacking in the following areas:

By the developers’ own admission, the Whisper database is slower than RRDtool (whch is used by Cacti).
It’s not visually appealing when compared to Grafana and Chronograf.
The first point made me feel like “upgrading” to Graphite is a two steps forward, one step back scenario. As a result of this, I went looking for a solution to this problem, and that is when I came across InfluxDB.

InfluxDB is a time series database. A TSDB “is a software system that is optimized for handling time series data, arrays of numbers indexed by time (a datetime or a datetime range)”. In other words, they lend themselves perfectly to monitoring tools such as the ones being discussed in this post.

Now that I had a solution to my gripe, it was time to find a solution to the second. It was at this time that I came across Grafana. When I found that I could use Graphite and InfluxDB as datasources for Grafana, I knew I was onto a winner.

However, as has been the theme of this post, it wasn’t long before I found myself wanting more. While Grafana does provide some alerting functionality, it isn’t to the depth that I’d like. It was at this point that I started reading about the TICK stack (Telegraf, InfluxDB, Chronograf and Kapacitor).

Given that these products were written by the InfluxDB developers, they had my vote from the start. Things only got better when I started using Telegraf (more on this in another post) and read about Kapacitor’s capabilities. Unfortunately though Chronograf just doesn’t cut the mustard at this point in time when compared to Grafana. It doesn’t come as much of a surprise though given that it is still a relatively young project. I think it has massive potential and will definitely be keeping a close eye on its progress.

The great news is that you don’t have to use the TICK stack in its entirety if you don’t want to. Therefore, at the time of writing I’m using Telegraf for the data collection, InfluxDB for the data storage and Grafana for data visualisation and alerting. Once I get a little more time on my hands though I will begin using Kapacitor for alerting instead of Grafana.

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...