Let’s Encrypt has announced that it will no longer send certificate expiration notification emails. What now?

Blog

Read how we approach engineering here at Sematext

Apache Kafka Consumer Lag Monitoring: How to Check and Fix It to Stream Data Smoothly

The world lives by processing the data. Humans process the data - each sound we hear, each picture we see - everything is data for our brain. The same goes

What Is Log Aggregation: A Complete Guide to Best Practices & Tools You Need to Know

Every developer's worst nightmare is digging through a huge log file, trying to pinpoint problems. The troubleshooting most likely won't stop there. They'll have to follow the trail to multiple

How to Use Docker to Containerize Java Web Applications: Tutorial for Beginners

Containers are no longer a thing of the future - they are all around us. Companies use them to run everything - from the simplest scripts to large applications. You

Understanding Memory Leaks in Java: Common Causes & How to Detect Them

There are multiple reasons why Java and the Java Virtual Machine-based languages are very popular among developers. A rich ecosystem with lots of open-source frameworks that can be easily incorporated

Debugging Node.js Memory Leaks: How to Detect, Solve or Avoid Them in Applications

In this article, you'll learn how to understand and debug the memory usage of a Node.js application and use monitoring tools to get a complete insight into what is happening

How to Handle Java Lang OutOfMemoryError Exceptions

All the applications that you're trying to execute require memory. It doesn't matter if the application was developed using assembly language. Or if you used a low-level programming language like

Solr vs Elasticsearch: Performance Differences & More. How to Decide Which One Is Best for You

“Solr or Elasticsearch?”…well, at least that is the common question we hear from Sematext’s consulting services clients and prospects. Which one is better, Solr or Elasticsearch? Which one is faster?

Log4Shell: How We Protect Sematext Users

On December 9, 2021, a vulnerability was reported that could allow a system running Apache Log4j 2 version 2.14.1 or below to be compromised and allow an attacker to execute

Real User Monitoring (RUM) vs. Synthetic Monitoring Comparison

Three seconds is all it takes before your customer decides to leave. Would you imagine that! The audacity of some people! But, can you really blame them? We live in

Understanding Apache Logging: How to View, Locate and Analyze Access & Error Logs

Apache - the technology that powers the web. I'm not sure if that is correct, but I think that we wouldn't see the world wide web in its current shape