Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
graphite-client
Advanced tools
Node.js client for Graphite
##Install
$ npm install graphite-client
###Create instance
var Graphite = require('graphite-client');
var graphite = new Graphite(serverHost, 2003, 'UTF-8', 3000, function() {
log.info("Graphite server connection timeout");
});
The client tries to reconnect on connection timeout
###Listen fot the underline socket events
graphite.on('end', function() {
log.info('Graphite client disconnected');
});
graphite.on('error', function(error) {
log.info('Graphite connection failure. ' + error);
});
###Connect to the graphite server
graphite.connect(function() { //'connect' listener
log.info('Connected to Graphite server');
});
###Write to the server
var metrics = {
'pre1' : {
'pre2' : {
'key1' : 'value1',
'key2' : 'value2',
},
},
'key3' : 'value3'
};
graphite.write(metrics, Date.now(), function(err) {
log.warn("Failed to write metrics to metrics server. err: " + err)
});
Assuming the current time is Jul 13 2015 00:00:00 UTC (1436745600 in sec Unix Epoch Time) The folliwng data will be send to the server
pre1.pre2.key1 value1 1436745600
pre1.pre2.key2 value2 1436745600
key3 value3 1436745600
FAQs
Node.js client for Graphite
We found that graphite-client demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.