Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's also worth taking into account the size of the software and its relative CPU utilization. Log shippers do require CPU cycles and memory that would otherwise be available to run the other workloads on the host.

As for the multitudes of inputs/outputs, covering the 95% most-used sources and sinks is a great starting point. I think Vector got that list right in this case.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: