Book Image

Storm Blueprints: Patterns for Distributed Real-time Computation

Book Image

Storm Blueprints: Patterns for Distributed Real-time Computation

Overview of this book

Table of Contents (17 chapters)
Storm Blueprints: Patterns for Distributed Real-time Computation
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Running the log analysis topology


To run the analysis topology, first make sure that ZooKeeper, Kafka, and OpenFire are all up and running by using the procedures outlined earlier in the chapter. Then, run the main() method of the topology.

When the topology activates, the storm XMPP user will connect to the XMPP server and trigger a presence event. If you are logged into the same server with an XMPP client and have the storm user in your buddy list, you will see it become available. This is shown in the following screenshot:

Next, run the RogueApplication class and wait for a minute. You should receive an instant message notification indicating that the threshold has been exceeded, which will be followed by one indicating a return to normal (below threshold), as shown in the following screenshot: