SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
import allegro.tech.internal.*; 
...czyli budowa zaplecza technicznego w korporacji 
Adam Dubiel
POWIEM O..
ZMIANY
Zmiana środowiska
Zmiana środowiska
Zmiana trybu pracy
SKĄD SIĘ WZIĘŁY?
Szybkość
Odpowiedzialność
ZWALCZAMY SPAGHETTI
Jeśli każdy rozmawia z każdym..
Hermes
Hermes 
model pub-sub 
tysiące req/sec 
niskie opóźnienia 
odporny na awarie
Hermes
Hermes: Kafka ++ 
interfejs REST 
POST /topics/my_topic_name
Hermes: Kafka ++ 
łatwe zarządzanie
Hermes: Kafka++ 
wysyłamy do każdego 
http:// 
jms:// 
ws:// 
service://
Hermes: Kafka++ 
dbamy o odbiorców 
polityka ponowień 
limity wysyłania 
automatyczne zawieszanie subskrypcji 
cofamy czas
Hermes: Kafka++ 
wiemy co się dzieje 
z dokładnością do eventu
Hermes 

MIERZYMY I 
MONITORUJEMY
Skystats 
Graphite + Tessera + Cabot + Skyline + ...
Skystats 
metryki aplikacyjne mówią najwięcej 
więc monitorujmy je z automatu
NIE ZACZYNAMY OD ZERA
axion 
If axions exist and have low mass within a 
specific range, they are of interest as a 
possible component of cold dark matter.
axion 
wsparcie dla budowania
axion + commons 
wsparcie dla developmentu
axion + commons 
wystarczy zakodować wymagania biznesowe :)
HERMES 
SKYSTATS 
AXION
allegrotech.io 
 allegrotechblog

Contenu connexe

En vedette

JDD2015: Thorny path to Data Mining projects - Alexey Zinoviev
JDD2015: Thorny path to Data Mining projects - Alexey Zinoviev JDD2015: Thorny path to Data Mining projects - Alexey Zinoviev
JDD2015: Thorny path to Data Mining projects - Alexey Zinoviev PROIDEA
 
PLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpecPLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpecPROIDEA
 
JDD2014: Effective refactoring - Włodek Krakowski
JDD2014:  Effective refactoring - Włodek KrakowskiJDD2014:  Effective refactoring - Włodek Krakowski
JDD2014: Effective refactoring - Włodek KrakowskiPROIDEA
 
CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? ...
CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? ...CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? ...
CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? ...PROIDEA
 
JDD2015: Forgetting Java: Why Java Should Die in Flames and Take its Develope...
JDD2015: Forgetting Java: Why Java Should Die in Flames and Take its Develope...JDD2015: Forgetting Java: Why Java Should Die in Flames and Take its Develope...
JDD2015: Forgetting Java: Why Java Should Die in Flames and Take its Develope...PROIDEA
 
JDD2014: Systematyczny architekt na drodze ku postarzaniu produktu - Jarosław...
JDD2014: Systematyczny architekt na drodze ku postarzaniu produktu - Jarosław...JDD2014: Systematyczny architekt na drodze ku postarzaniu produktu - Jarosław...
JDD2014: Systematyczny architekt na drodze ku postarzaniu produktu - Jarosław...PROIDEA
 
JDD2014: Agile transformation - how to change minds, deliver amazing results ...
JDD2014: Agile transformation - how to change minds, deliver amazing results ...JDD2014: Agile transformation - how to change minds, deliver amazing results ...
JDD2014: Agile transformation - how to change minds, deliver amazing results ...PROIDEA
 
PLNOG15: Personal data - new opportunities and threats - Agata Kowalska
PLNOG15: Personal data - new opportunities and threats - Agata KowalskaPLNOG15: Personal data - new opportunities and threats - Agata Kowalska
PLNOG15: Personal data - new opportunities and threats - Agata KowalskaPROIDEA
 
PLNOG15 :CPE in cloud: first cases of CPE deployment in Data Center, Piotr Ja...
PLNOG15 :CPE in cloud: first cases of CPE deployment in Data Center, Piotr Ja...PLNOG15 :CPE in cloud: first cases of CPE deployment in Data Center, Piotr Ja...
PLNOG15 :CPE in cloud: first cases of CPE deployment in Data Center, Piotr Ja...PROIDEA
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPROIDEA
 
Atmosphere Conference 2015: Bottoms-up and back DevOps
Atmosphere Conference 2015: Bottoms-up and back DevOpsAtmosphere Conference 2015: Bottoms-up and back DevOps
Atmosphere Conference 2015: Bottoms-up and back DevOpsPROIDEA
 
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...PROIDEA
 
Atmosphere 2014: Scalable and under control - open cloud architecture conside...
Atmosphere 2014: Scalable and under control - open cloud architecture conside...Atmosphere 2014: Scalable and under control - open cloud architecture conside...
Atmosphere 2014: Scalable and under control - open cloud architecture conside...PROIDEA
 

En vedette (14)

JDD2015: Thorny path to Data Mining projects - Alexey Zinoviev
JDD2015: Thorny path to Data Mining projects - Alexey Zinoviev JDD2015: Thorny path to Data Mining projects - Alexey Zinoviev
JDD2015: Thorny path to Data Mining projects - Alexey Zinoviev
 
PLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpecPLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpec
 
JDD2014: Effective refactoring - Włodek Krakowski
JDD2014:  Effective refactoring - Włodek KrakowskiJDD2014:  Effective refactoring - Włodek Krakowski
JDD2014: Effective refactoring - Włodek Krakowski
 
CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? ...
CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? ...CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? ...
CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? ...
 
JDD2015: Forgetting Java: Why Java Should Die in Flames and Take its Develope...
JDD2015: Forgetting Java: Why Java Should Die in Flames and Take its Develope...JDD2015: Forgetting Java: Why Java Should Die in Flames and Take its Develope...
JDD2015: Forgetting Java: Why Java Should Die in Flames and Take its Develope...
 
JDD2014: Systematyczny architekt na drodze ku postarzaniu produktu - Jarosław...
JDD2014: Systematyczny architekt na drodze ku postarzaniu produktu - Jarosław...JDD2014: Systematyczny architekt na drodze ku postarzaniu produktu - Jarosław...
JDD2014: Systematyczny architekt na drodze ku postarzaniu produktu - Jarosław...
 
JDD2014: Agile transformation - how to change minds, deliver amazing results ...
JDD2014: Agile transformation - how to change minds, deliver amazing results ...JDD2014: Agile transformation - how to change minds, deliver amazing results ...
JDD2014: Agile transformation - how to change minds, deliver amazing results ...
 
PLNOG15: Personal data - new opportunities and threats - Agata Kowalska
PLNOG15: Personal data - new opportunities and threats - Agata KowalskaPLNOG15: Personal data - new opportunities and threats - Agata Kowalska
PLNOG15: Personal data - new opportunities and threats - Agata Kowalska
 
PLNOG15 :CPE in cloud: first cases of CPE deployment in Data Center, Piotr Ja...
PLNOG15 :CPE in cloud: first cases of CPE deployment in Data Center, Piotr Ja...PLNOG15 :CPE in cloud: first cases of CPE deployment in Data Center, Piotr Ja...
PLNOG15 :CPE in cloud: first cases of CPE deployment in Data Center, Piotr Ja...
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
Power and politics
Power and politicsPower and politics
Power and politics
 
Atmosphere Conference 2015: Bottoms-up and back DevOps
Atmosphere Conference 2015: Bottoms-up and back DevOpsAtmosphere Conference 2015: Bottoms-up and back DevOps
Atmosphere Conference 2015: Bottoms-up and back DevOps
 
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
 
Atmosphere 2014: Scalable and under control - open cloud architecture conside...
Atmosphere 2014: Scalable and under control - open cloud architecture conside...Atmosphere 2014: Scalable and under control - open cloud architecture conside...
Atmosphere 2014: Scalable and under control - open cloud architecture conside...
 

JDD2014: Import Allegro.tech.internal* czyli budowanie zaplecza technologicznego w korporacji - Adam Dubiel