• 0 Posts
  • 10 Comments
Joined 1 year ago
cake
Cake day: July 1st, 2023

help-circle





  • Yeah, ofc it is.

    I’m working in a system that generates 750 MILLION non-debug log messages a day (And this isn’t even as many as others).

    Good luck grepping that, or making heads or tails of what you need.

    We put a lot of work into making the process of digging through logs easier. The absolute minimum we can do it dump it into elastic so it’s available in Kibana.

    Similarly, in a K8 env you need to get logs off of your pods, ASAP, because pods are transient, disposable. There is no guarantee that a particular pod will live long enough to have introspectable logs on that particular instance (of course there is some log aggregation available in your environment that you could grep. But they actually usefulness of it is questionable especially if you don’t know what you need to grep for).

    These are dozens, hundreds, more problems that crop up as you scale the number of systems and people working on those systems.




  • They usually do yes however it’s all about prioritization.

    You may have hundreds or thousands or open requests and issues.

    With tens of thousands of closed issues that were either not reproducible, not actually problems, or largely indecipherable.

    There’s usually a feature roadmap which is where most of the development money and time is spent. If it’s an older business application then certain bugs might easily take weeks to find, fix, test, validate, go through user acceptance, A/B test, and then deploy. But fixing is expensive work, so if the bug isn’t severe it’s usually deprioritized next to higher priority work.


  • douglasg14b@lemmy.worldtoProgrammer Humor@lemmy.mlPoor guy
    link
    fedilink
    arrow-up
    112
    arrow-down
    11
    ·
    edit-2
    1 year ago

    So, essentially, really poorly written malware? Given the number of assumptions it makes without any sort of robustness around system configuration it’s about as good as any first-pass bash script.

    It’d be a stretch to call it malware, it’s probably an outright fabrication to call it a virus.