February 2021

5 Keys to Simple Project Management

Project Managers are presented with some challenging tasks which can hinder the success of the project. Some of the most prevalent challenges that keep project managers on the ball involve making sure the project is on track, within the assigned budget, keeping up with the project's pace, and managing resources.

Avoiding the Most Common Business Mistakes When Scaling Your Small Business

Scaling and generating more revenue without necessarily increasing costs is a good sign for your small business. But with the potential to scale by increasing sales volume comes the challenge of keeping the company’s operations and profitability stable. This is why companies emphasize the importance of operational efficiency.

6 Tech Tools to Streamline Your Remote Workflow

‍ Thrust into the unfamiliarity of remote work, a huge number of industries around the globe have had to adapt to life away from the office. COVID-19 has prompted a surge in remote work like we have never seen before, with much of the American workforce being left with no choice but to work from home. In fact, the pandemic has ensured that tech priorities shifted for 95% of companies.

Getting started with Raygun Crash Reporting using Raygun4Android

Building native mobile apps can be a daunting challenge. Even if you ignore the choice of building separate iOS/Android apps or using cross-platform technology, writing native apps is hard. The development process of native apps involves a lot of testing and debugging. While the app is still under initial development this usually happens on test devices of the developers or dedicated testers. When problems arise or the app crashes, these incidents are often observable and can be debugged.

Security operations center, Part 2: Life of a SOC analyst

In the first part of this blog series, we saw a brief overview of what a security operations center (SOC) is and how it operates. In this part, we’ll take a look at the typical activities that SOC analysts carry out every day to protect their organization from constantly evolving cyber threats and the skill sets that come in handy in effectively carrying out their duties.

12 Best Docker Container Monitoring Tools

Monitoring systems help DevOps teams detect and solve performance issues faster. With Docker and Kubernetes steadily on the rise, it’s important to get container monitoring and log management right from the start. This is no easy feat. Monitoring Docker containers is very complex. Developing a strategy and building an appropriate monitoring system is not simple at all.

Preparing to Fail Fast so You can Recover Faster

The principle of fail fast is either the best thing since the transistor or nothing but hot air. It depends on the size of your organization and the cohesiveness of your teams. If your team members have a strong working relationship, and dev is well integrated with everyday work company-wide, you already have a good foundation for this particular agile thinking. Most companies that have grown beyond startup-size, and even some startups, may find this idea a bit jarring.

Increasing limits for three key Cloud Monitoring features

Cloud Monitoring is one of the easiest ways you can gain visibility into the performance, availability, and health of your applications and infrastructure. Today, we’re excited to announce the lifting of three limits within Cloud Monitoring. First, the maximum number of projects that you can view together is now 375 (up from 100). Customers with 375 or fewer projects can view all their metrics at once, by putting all their projects within a single workspace.

Integration with 3rd Party Systems

Integrations of third-party systems with Enterprise Alert, what is possible? In my work with new and existing customers, I keep coming across the assumption that Enterprise Alert is not able to be integrated with certain third-party systems in order to receive and process events and fault messages from this system. Basically, first of all, we have to say: We can integrate everything that communicates digitally in any way.

Getting Started with Change Tracking

Changes are both inevitable and necessary when you are running a business. As customer expectation and the market landscape keeps changing, you will have to take up the necessary measures to implement corresponding digital solutions and technology changes. But managing changes can be a tricky process. Some changes can be as simple as changing the folder organization in your data. But if you have not tracked it properly, you will soon run into confusing folder hierarchies and problems in data sharing.

What is virtualisation? The basics

Virtualisation plays a huge role in almost all of today’s fastest-growing software-based industries. It is the foundation for most cloud computing, the go-to methodology for cross-platform development, and has made its way all the way to ‘the edge’; the eponymous IoT. This article is the first in a series where we explain what virtualisation is and how it works. Here, we start with the broad strokes.

Announcing Updated Analytics Filters to Dive Even Deeper into your Historic Incident Data

After successfully implementing a conditional evaluation engine into Runbooks, we started looking at other places in FireHydrant that would be improved with this engine. After hearing a lot of feedback from you, we’ve implemented conditions into our Analytics page. Let’s dive in and see what new things are possible with this new filtering.

Build Trust with a Custom Domain

Security in software is now everyone’s problem. We can no longer simply rely on InfoSec teams or your equivalent Gary “he-likes-security” to handle security-related processes and issues. All software, tools, infrastructure, and services need to be trusted. It is important to us at Cloudsmith to provide you with the ability to build that trust within your teams or with your customers. Cloudsmith allows you to use your own domain name for your repositories.

How To - Monitor Your Email Service with Catchpoint

Today, we’re going to continue diving into Catchpoint’s wealth of synthetic tests with a brief overview of network protocols and a look at some helpful use cases specifically around monitoring your email service. I’ll be sharing a hands-on demo, illustrating how this data shows up in Catchpoint – focusing on a pair of protocol tests we’ll be running against our email service.

Microsoft Skype End User Experience

When Skype was first released in 2003, it quickly became one of the world’s most well-known Voice over Internet Protocol (VoIP) and video chat tools. The original free program is still available today and is designed for individual use and small teams of less than 20 employees. When Microsoft purchased Skype in 2012, it aimed to transform the offering into a complete business communications platform.

Finance: Why Getting Answers From Engineering About Your AWS Bill Is So Difficult

It’s no secret that AWS bills are confusing. But it’s particularly difficult for the team who actually writes the check to Amazon for hundreds of thousands or millions of dollars — yet has never personally seen what the inside of the AWS portal looks like (and probably never will).

2021 Secure Consumer Cyber Report: Protecting the Everywhere Workplace

The 2021 Secure Consumer Cyber Report provides one of the industry’s most comprehensive studies about the shift in consumer behavior as a result of increased work-from-home initiatives. With the influx of unsecured personal devices and high-risk employee behavior, what does the threat landscape look like today? The newly released report found that, with the dramatic increase in remote work due to the pandemic, the threat to enterprise data is higher than ever.

How to Monitor Network and Zoom Performance & Fix "Your Internet Connection is Unstable" on Zoom

Laggy video, packet loss, and jitter make it difficult to have a clear and coherent conversion over Zoom - which is why it’s important to identify these issues before your next call. In this article, we’re teaching you how to monitor network performance and Zoom performance to help you have the clearest Zoom experience, and avoid the “Your Internet Connection is Unstable” message of doom.

How to Identify the Zoom Data Center Location on AWS Infrastructure

Zoom leverage AWS’s global infrastructure, storage, content distribution, and security to deliver its service and store information securely in AWS data centers around the world. This means that when you’re looking to monitor your Zoom performance, it’s important to know how to identify which AWS data center location your Zoom application is using. Keep reading to find out how.

Why you should use Central Error Logging Services

Logs are vital for every application that runs in a server environment. Logs provide essential information which points to whether the current system is operating properly. Looking through logs, you will gather data on system issues, errors, and trends. However, it is not feasible to manually look up errors on various servers across thousands of log files. The solution? Central errors logging services.

The Future of InfluxDB OSS: More Open, Permissive with Complementary Closed Source

I was recently on the Changelog Podcast talking about Elastic’s recent change away from open source licensing. I’m at 1:02:45 to 1:24:03, but the whole thing is pretty interesting if you have time to listen. This is where #InfluxDB is headed. No more open core, we're going to a combination of cloud offering, or if on-premise, a complementary offering to the open source. It'll take us time to get there, but that's the vision. Commercial complements the open source rather than replace.

Cloud Data Retention & Analysis: Unlocking the Power of Your Data

Enterprise data growth is accelerating rapidly in 2021, challenging organizations to adopt cloud data retention strategies that maximize the value of data and fulfill compliance needs while minimizing costs. To meet this challenge, organizations are adopting or refining their cloud data retention strategies. In this blog post, we’ll take a closer look at the state of data retention and analytics in the cloud.

Troubleshooting services on Google Kubernetes Engine by example

Applications fail. Containers crash. It’s a fact of life that SRE and DevOps teams know all too well. To help navigate life’s hiccups, we’ve previously shared how to debug applications running on Google Kubernetes Engine (GKE). We’ve also updated the GKE dashboard with new easier-to-use troubleshooting flows. Today, we go one step further and show you how you can use these flows to quickly find and resolve issues in your applications and infrastructure.

With SRE, failing to plan is planning to fail

People sometimes think that implementing Site Reliability Engineering (or DevOps for that matter) will magically make everything better. Just sprinkle a little bit of SRE fairy dust on your organization and your services will be more reliable, more profitable, and your IT, product and engineering teams will be happy. It’s easy to see why people think this way. Some of the world’s most reliable and scalable services run with the help of an SRE team, Google being the prime example.

Monitoring Node.js Application With AppOptics on DigitalOcean - Better Together

Many teams take advantage of the convenience of deploying their apps to the platform as a service (PaaS) providers such as DigitalOcean. Cloud solutions like this are an easy way for teams to deploy and scale their applications without worrying about the details. However, even in these managed environments, poorly written apps can cause issues. If your pages load too slowly, users will likely leave your site and look for another.

Will Azure Blob Storage Rule the Unstructured Data Storage Space?

2020 was indeed challenging for Kovai.co still had great learning! One of them is what I am sharing with the community through this blog. For enterprises like us, worldwide work from anywhere became the new reality. We had to move towards a cloud-native world where secure data storage and effective remote management of IT infrastructure were of supreme importance.

Product Updates: Creating a New Runbook Just Got Easier with Templates

Starting out with runbooks can be daunting, we've built a way to implement our best practices into a runbook that can be implemented in a single click. On top of this, there's now even more ways to attach runbooks to your incidents and a much easier way to test out the runbook that you're currently working on.

The Best Software Deployment Tools For 2021

Software deployment tools allow developers to ensure that software is properly installed with it’s required packages and implementation steps conducted in the correct order. Using these tools is a vital requirement for any business that creates its own software in-house. There is a variety of software that can assist developers in launching their latest code with new ones (such as GitHub Actions) arriving to the forefront of many growing consideration lists.

10 Ways to Protect Your Mission-Critical Database

As Werner Vogels says: “Everything fails all the time.” Data is the new oil. We rely on it not only to make decisions but to operate as a business in general. Data loss can lead to significant financial consequences and damaged reputation. In this article, you can find ten actionable methods to protect your most valuable resources.

How Mixed Reality Transform Retail Store Experience?

Digital transformation is driving industries to evolve to new dimensions. Mixed reality is one of the key components in the digital reality trends that business sectors a rapidly capitalizing into. It is reshaping almost every conventional way that retailers do business. Many industrial trajectories are responding immediately to give more experiential customer experience with reality technologies such as Augmented Reality, Virtual Reality and Mixed Reality.

How DevOps Practices Strengthen Security & Compliance?

Companies worldwide these days make use of DevOps with a view to attain better profit and progress. Despite its increased use, DevOps can lead to higher risks if not properly handled. There should be an integration of security and development process form the beginning in order to have a risk-free progress. The entire organization will be at risk if proper security check is not practiced in each stage, as cyberattacks are increasing each day.

Guidelines to help you avoid losing your domain

Imagine you're sitting in your office, and you start noticing emails coming in asking if you'd like to buy your domain. "Huh, that's weird, I already own that domain" you think to yourself. A few more emails come in, and they're getting past the spam filter, so you decide to double check your domain manager. Doubt starts creeping into your mind, you start panicking, and you frantically scroll down to where the domain should be, and... It's gone.

Migrating between WordPress hosts without downtime

Sometimes you'll want to migrate WordPress hosts - maybe it's time for renewal, and you found a better deal elsewhere, or your hosting provider isn't as reliable as they promised. Which is great for you, but your site's readers don't care that it's a better deal - they just want to see your content. So minimising downtime when transferring hosts is a pretty big deal. Let's learn how to avoid downtime.

OpenTelemetry automatic instrumentation: a deep dive

OpenTelemetry can be an overwhelming project to take in - understanding the interactions between the API, SDK, and various tools and protocols is a lot. One particularly interesting and important part of the project, though, is the "automatic instrumentation" components. What is automatic instrumentation, and why is it important to OpenTelemetry? How can you use it? How does it help? We’ll answer these questions, and more, so read on!

Improved Content Monitoring!

Two new features in TWO DAYS.. what is this new year NEW ME? When we launched custom content extraction in 2017, I was always a bit annoyed by the ‘pain in the arse’ it was to use, sure it was an excellent feature but we made the user load up a tab and copy the xPath manually. Since that launch we’ve had ‘make content extraction less shi of a pain to do’ but as things tend to do, other features and improvements got in the way. BUT NOT TODAY… BOOM!

Why Your Local Workstation Can't Mimic the Cloud

If there is one thing developers love, it’s control. This makes sense—if you build something as complex as a software system, you need to understand what’s happening at every level. But absolute control can be a liability when it becomes the main goal of the development process. Many developers go to great lengths to get the same system replicated locally that they run on a remote server with the hope of catching every error before it’s deployed. This is a pipedream.

What is MEC ? The telco edge.

MEC, as ETSI defines it, stands for Multi-access Edge Computing and is sometimes referred to as Mobile edge computing. MEC is a solution that gives content providers and software developers cloud-computing capabilities which are close to the end users. This micro cloud deployed in the edge of mobile operators’ networks has ultra low latency and high bandwidth which enables new types of applications and business use cases.

DFI and Canonical offer risk-free system updates and reduced software lead times for the IoT ecosystem

Feb. 25, 2021 – DFI and Canonical signed the Ubuntu IoT Hardware Certification Partner Program. DFI is the world’s first industrial computer manufacturer to join the program aimed at offering Ubuntu-certified IoT hardware ready for the over-the-air software update. The online update mechanism of and the authorized DFI online application store combines with DFI’s products’ application flexibility, to reduce software and hardware development time to deploy new services.

Auditing your network, without credentials.

Now that I have your attention, how can we possibly audit a network and find all the juicy details about the devices upon it, without having high level credentials to talk to those devices? Well, it’s a bit of a mistruth. Or a caveat. Or whatever you want to call it. We definitely can do this, but for devices such as routers, printers and switches you will need a minimal set (read only, minimum access level) of SNMP credentials.

AIOps for Managed Service Providers: modernize and monetize your monitoring offering

Legacy monitoring tools weren’t built for visibility into the cloud and can obstruct your ability to compete and grow your business. Interlink Software works with MSPs to define, monetize and deliver AIOps monitoring solutions that meet the requirement for high-performing business services and hybrid cloud infrastructures that digital enterprises rely on.

How to monitor your API in just 2 simple steps?

In this video, you’re going to learn exactly how to monitor your API in just 2 simple steps! To be clear: Monitoring an API is a lot of hassle. But with this video tutorial, you’ll know how you can monitor your API in just 2 simple steps while saving a lot of time. Think of Components like folders that contain other Fyipe resources and one of the resources it has is called "Monitors". An API monitor will basically test your API to gain visibility into performance, availability, and functional correctness.

Guest Blog: Airbrake & LogicMonitor = Awesome News

“On Tuesday, we announced some big news: LogicMonitor has acquired Airbrake — a developer-centric application error and performance monitoring platform. This acquisition represents the latest step in our company’s journey towards becoming an end-to-end infrastructure monitoring and observability platform. As part of the acquisition, I am thrilled to welcome the Airbrake team into the fold!

Ruby and Python clients for Elastic Enterprise Search now generally available

Back in our 7.10 release of the Elastic Stack, we announced the beta of our Ruby and Python clients for Elastic Enterprise Search. Now, with 7.11, both the Ruby and Python clients are generally available. We’ve also begun work on a PHP client. All client source code for both enterprise-search-ruby and enterprise-search-python is available on GitHub. Documentation on how to get started with each client is available on elastic.co.

Troubleshoot problems using GitLab activity data with the new plugin for Grafana

GitLab is one of the most popular web-based DevOps life-cycle tools in the world, used by millions as a Git-repository manager and for issue tracking, continuous integration, and deployment purposes. Today, we’re pleased to announce the first beta release of the GitLab data source plugin, which is intended to help users find interesting insights from their GitLab activity data.

What Tools Does a DevOps Engineer Actually Use?

“DevOps” is a recently coined term that combines the realm of “development” with that of “operations.” So in theory, a DevOps engineer is someone who is proficient in both of these areas and understands how they interact with each other. In reality, however, most DevOps engineers work on the “operations” side of things on a day-to-day basis.

3 Ways IT Can Unblock Mergers & Acquisitions Problems in the Pandemic Era

Even when businesses are functioning as usual, mergers and acquisitions are intense and demanding transitions for companies to pull off. From the constant communication required in the preparation phase, to the technical demands of integrating two teams, a merger or acquisition forces companies to exhaust resources in order to make the transition a smooth success. Then the pandemic hit.

Want to be an Effective IT Leader? You Need to Care About Experience Management

What is more important – time saved or time well spent? How you think about this problem and how you’d go about measuring it is an important consideration for managers who aspire to be leaders in today’s digital workplace. In IT and beyond, focusing on experience over service is the difference between managing the status quo and leading a change that pushes an organization forward.

Only Autonomous Anomaly Detection Scales

Say you’re looking for a smart product to detect anomalies in your organization’s IT environment. A sales rep drops by and shows you all kinds of great artificial intelligence (AI) features with fancy-sounding algorithms. It sounds very impressive and seems like there is a lot of very valuable AI in the product. But, in fact, the opposite is true. This is a manual AI product wrapped in a deceiving jacket. Let me tell you more.

The Top 5 Benefits of Temperature Server Monitoring Solutions

Your servers generate heat—this is a fact common with any type of electronic device. The amount of heat they generate will vary, depending on where they are located and the number of servers in use. For example, a small business may have only one or two servers that are stored in a small server room. On the other hand, a large corporation could have hundreds of servers in a massive data center.

How to make remote meetings work during lockdown

Many people think because we’re an online business, with technology at the heart of everything we do, we’d be better placed than many to make the transition from in-person meetings to virtual meetings during the pandemic. Whilst we have made that leap and made it work well, it’s not because we’re au fait with tech and the latest tools, it’s quite the opposite.

Coralogix - On-Demand Webinar: Drive DevOps with Machine Learning

DevOps has become the de facto method of developing and maintaining software, but it comes with its own challenges. Keeping track of change in a complex, fluid environment is a serious hurdle to overcome. In this webinar, we explained how machine learning can be employed within a DevOps team to improve operational performance, optimize mean time to recovery and create a better service for your customers.

Microservices Asynchronous Communication and Messaging | JFrog Xray

Microservices have changed the way we build applications. Software design has moved from large monolithic applications (which are not really adaptable to changes and improvements) to a collection of small, independent processes infrastructure which is far more suited to adapt to changes in today’s agile world.

Manual Monitors: Everything you need to know

In this post, I will explain what are manual monitors? Manual monitors are monitors that do not actively monitor any resources. You can use them if you are using an external monitoring tool and can ping Fyipe API to create incidents. They can also be helpful to create manual incidents for your customers and show them on status page. Manual monitors can be created in just 2 simple steps.

Frequently Asked Questions | Vol 2

In an industry where technological evolution is commonplace, it’s easy to get lost in a sea of terminology and acronyms. It’s important to establish a solid foundation of understanding. In the second installment of our ‘Frequently Asked Questions’ series, we tackle issues related to effective monitoring, speed, and performance related to Microsoft 365 services.

Is Your Cloud Cost Report Missing Critical Information?

Worldwide end-user spending on public cloud services is forecast to grow 18.4% in 2021, with the cloud projected to make up 14.2% of the total global enterprise IT spending market in 2024, up from 9.1% in 2020, according to Gartner. Enterprises are, therefore, rightly concerned about controlling their public cloud costs—to ensure they’re getting all the value they’re paying for.

6 Ways Retailers Can Maximise Value With Creative Engineers

“Engineering” and “creativity” aren’t often considered synonymous. However, in today’s world, where the online experience is at the forefront of virtually all business transactions and experiences, the creative engineer is finally getting the recognition they deserve. These individuals are quite literally building the virtual world we live in.

Key benefits of advanced HTML5 that accelerate performance and simplify secure remote desktop access

What does it mean to securely access remote desktops from any device and from anywhere? 2020 was a game changer for the future of business operations and how, when and where people work. To enable secure remote access across an enterprise means making the Everywhere Workplace possible. Here’s how.

What are Manual Monitors?

In this video, I'll explain what are Manual Monitors? You’re also going to learn exactly how to create a Manual Monitor in just 2 simple steps while saving a lot of time. Think of Components like folders that contain other Fyipe resources and one of the resources it has is called "Monitors". Manual Monitors are monitors that do not actively monitor any resources. You can use them if you are using an external monitoring tool and can ping Fyipe API to create incidents.

Introduction to the ImGui C++ Library with Conan

The Conan team provides an introduction and demonstration for the open-source C++ graphics library known as ImGui. To show the basics of ImGui, we will create a simple application with some controls like buttons, scrollbars, color editors, and more. We will show how easily and quickly you can create a graphical user interface using this library. Finally, we will show how to a simple way to build ImGui using packages with Conan, the package manager for C and C++.

Be Proactive! Never be Surprised by End User Issues on Citrix or VMware Horizon

Learn how with Goliath you can automatically test availability from multiple locations, monitor logon performance and failures with a centralized dashboard, and quickly troubleshoot, resolve, and document initial stages of the logon process.

Sweetening Your Honey

Are you looking for a better way to troubleshoot, debug, and really see and understand what weird behavior is happening in production? Service-level objectives (SLOs) and observability can help you do all that—but they require collecting and storing the right data. If we’re naive with our telemetry strategy, we spend a lot of money on storing data without seeing adequate return on investment in the form of insights.

What Is Metasploit?

In this quick guide for cybersecurity professionals, we’ve invited some of our favourite security experts who have previously worked with Metasploit to explain why this tool is so valuable for conducting effective penetration tests and network reconnaissance tasks. Our first expert Michael Roninson, Security Expert at Cerber Tech gives a brief overview of this tool and how to use it in his response below;

Build a Solid Foundation for the Cloud's Shifting Sands

Becoming cloud-native promises speed, flexibility, better products, and lower costs. But here’s the rub: for many companies, the reality isn’t nearly so rosy. Most digital transformation projects aimed at making companies more cloud-native actually drive up costs. Why? Well, there are many reasons; if you’re interested in root-cause analysis, Cloud FinOps by J. R. Storment is an excellent read.

How to embed Grafana visualization in SquaredUp

In our previous post on Grafana and SquaredUp, we compared the two tools across various benchmarks like ease of deployment, time to value, dashboard creation, dashboard sharing, and more. Both tools have their specific advantages over the other, but since the ultimate goal is to give you a single place to look – why not leverage Grafana for the visualizations and data sources it offers, but give them meaning by embedding them in SquaredUp?

Introducing, Dashbird's serverless Well-Architected Insights

Dashbird now scans your serverless infrastructure for industry best practices. It’s the antidote for chaos. We’re excited to introduce the Dashbird Well-Architected Insights – a continuous insights scanner combined with Well-Architected reports. The new feature provides serverless developers with insights and recommendations to continually improve their applications and keep them secure, compliant, optimized, and efficient.

The Complete Guide to Java String Replace

One of the most commonly used functionalities for String objects in Java is String replace. With replace(), you can replace an occurrence of a Character or String literal with another Character or String literal. You might use the String.replace() method in situations like: In Java, keep in mind that String objects are immutable, which means the object cannot be changed once it’s created.

Streamline project management with advanced analytics for Jira Software

Managing projects isn’t an easy task, particularly if you’re managing parallel projects with inter-team dependencies. Lack of visibility coupled with difficulty in obtaining the right metrics on time can make it nearly impossible for project teams to track issues, action items, and risks, often resulting in projects running behind schedule, overshooting budgets, or worse, getting stalled due to unforeseen problems.

Announcing Support for GKE Autopilot

Google Kubernetes Engine (GKE) is the preferred way to run Kubernetes on Google Cloud as it removes the operational overhead of managing the control plane. Earlier today, Google Cloud announced the general availability of GKE Autopilot, which manages your cluster’s entire infrastructure—both the control plane and worker nodes—so that you can spend more time building your applications.

Observability is transforming ITOM landscape as next generation monitoring

First things first. Observability is inherent as a principle to a system and not something that is instilled. Here, we are addressing observability as an open source based solution in the context of insightful monitoring within the ITOM landscape. ITOM is now in the middle of addressing the needs of the expanding and dynamic nature of IT infrastructure as a function. It is no longer about being a monolithic computing stack. It is now beyond monitoring discrete infrastructure elements.

What is Application Performance Monitoring (APM)?

Application performance monitoring (APM) solutions can help your business enhance its IT and grow its operations. To understand why, let’s answer some of the key questions surrounding APM. APM involves the use of technologies and tools to maintain consistent application availability, performance, and response times. So, your business can use APM solutions to monitor apps across its operations.

Sysdig contributes Falco's kernel module, eBPF probe, and libraries to the CNCF

Today, I’m excited to announce the contribution of the sysdig kernel module, eBPF probe, and libraries to the Cloud Native Computing Foundation. The source code of these components will move into the Falco organization and be hosted in the falcosecurity github repository. These components are at the base of Falco, the CNCF tool for runtime security and de facto standard for threat detection in the cloud.

Kubernetes Cluster Automated Upgrade in Jelastic PaaS

Flexibility, accelerated development and delivery, improved scalability and high availability are the main reasons companies are adopting Kubernetes (K8s) technology. But managing and keeping the system up to date can be so complex for organizations that they need to hire a separate department just to handle everything properly. With Jelastic’s Kubernetes automation you can improve DevOps productivity and focus on your business aims rather than fighting infrastructure complexity.

Monitoring DigitalOcean Billing with InfluxDB

I’ve always had a good experience using DigitalOcean, a cloud infrastructure provider which offers developers cloud services that help deploy and scale applications that run simultaneously on multiple computers. I’ve used DigitalOcean a lot for my personal projects — for example, to host my personal blog, its stats, and a NextCloud instance, all running in Kubernetes.

Why Monitoring Should be a Part of Your DevOps Strategy

DevOps came about as a result of ever-growing lags between development and operation. It’s a framework that deals with communication bottlenecks, allowing for smooth change management. DevOps monitoring is a crucial element and a necessity for this framework to succeed. Monitoring plays a vital role in realizing the underlying goals of DevOps. DevOps is all about eliminating technical inefficiencies and improving the speed of the whole cycle from development to deployment.

Enhance your secrets management strategy with Puppet + HashiCorp Vault

Security is paramount in today's digital world. Bad actors can use sensitive data to wreak havoc across thousands of machines in minutes if organizations do not have a solid cybersecurity strategy. Compliance requirements and regulations are increasingly calling for key management and strong encryption as part of a business's cybersecurity strategy. These are no longer optional but mandatory security requirements as DevOps also gains in popularity for agile development and application deployment.

Tanzu Tuesdays - Modern Application Configuration in Tanzu with Craig Walls

Historically, application configuration has been managed internal to an application deployment, in environment variables, or in files placed in the filesystem of the running application. As applications evolved into microservices, however, that approach become inadequate. Centralized configuration, including application-specific and shared configuration, versioning and rollback capabilities, and auditing became necessary. As more applications and microservices are becoming containerized and deployed in Kubernetes, configuration continues to be challenging. While Kubernetes offers configuration via ConfigMaps and Secrets, there’s no clear way to manage the properties going into those resources. In this Tanzu Tuesday session, we’ll explore the Tanzu Configuration Service, a means of managing configuration in a Kubernetes-native way using ConfigMaps, but that also offers the benefits afforded in a centralized configuration option.

Jaeger Persistent Storage With Elasticsearch, Cassandra & Kafka

Running systems in production involves requirements for high availability, resilience and recovery from failure. When running cloud native applications this becomes even more critical, as the base assumption in such environments is that compute nodes will suffer outages, Kubernetes nodes will go down and microservices instances are likely to fail, yet the service is expected to remain up and running.

Kaptain Is Aboard: v. 1.0 Is GA!

AI and Machine Learning (ML) are key priorities for enterprises, with a recent survey showing that 72% of CIOs expect to be heavy or moderate users of the technology. Unfortunately, other research has found that the vast majority—87%—of AI projects never make it into production. And even those that do often take 90 days or more to get there. Why this disconnect between intent and outcome? What are the roadblocks to enterprise ML? And what can be done about them?

APM Integrated Experience

We’ve been listening to our customers. Whether you’re a SolarWinds® Loggly®, SolarWinds AppOptics™, or SolarWinds Pingdom® user, we’ve been working hard to make your life easier. We’re happy to announce a brand-new experience designed to bring together real user monitoring, synthetic transactions, metrics, traces, and logs in a single platform, making it faster and easier to identify, triage, and troubleshoot application issues.

Can enterprises move fast without breaking IT?

In one of our recent webinars we discussed a challenge in digital transformation that is top of mind for many IT Ops leaders: how to actually transform with the least amount of pain… No matter how tired people are of the term “digital transformation”, it still represents an imperative strategy for enterprises wishing to survive in today’s dynamic business environment, let alone see growth and increased market value.

You should know about... transformations in Grafana

Transformations were introduced in Grafana v7.0, and I’d like to remind you that you can use them to do some really nifty things with your data. All performed right in the browser! Transformations process the result set of a query before it’s passed on for visualization. They allow you to join separate time series together, do maths across queries, and more. My number one use case is usually doing maths across multiple data sources.

Defense Department Cybersecurity: All Ahead on Zero Trust

With the Defense Department’s quick and successful pivot to a remote workforce last Spring via its Commercial Virtual Remote (CVR) environment, it proved that the future to fully operate from anywhere in the world is now. Gone are the days of thousands of civilian employees heading into the Pentagon or other installations everyday. However, with this new disparate workforce comes increased risks for network security. As my colleague Bill Wright expertly noted last Summer.

Get more insights into your organization's mobile device posture information by using the Cortex XSOAR Pack for MobileIron (acquired by Ivanti) Core and Cloud

More than 52% of organizations now offer their employees, contractors and frontline workers the ability to work securely from any endpoint of their choice. This modern workplace includes diverse endpoints such as iOS, macOS, Android, Windows 10 devices, as well as other immersive and rugged devices such as HoloLens, Oculus, Zebra and more - and IT teams need a scalable solution to secure and manage them.

Human in the Loop (HITL) and the Move to AIOps

Implementing DevOps practices for application development has generated an incredible acceleration in code velocity and reliability, and that is just on the Dev side. As the infrastructure that runs applications is increasingly treated as code, similar benefits are being seen in the operations (Ops) side that deploy and run those applications.

SolarWinds Web Performance Monitor - Product Walk-Through

Web application availability is crucial for your organization. Whether your applications are accessed inside or outside the firewall, your business depends on them being up, available, and performing optimally. Watch this short video and learn how WPM allows you to constantly monitor availability and response time from one location or locations around the globe. Find problems before your users do. WPM is the easiest to use, most affordable application in this space.

Out of the box GRC Processes - How two companies prospered

At first glance, AltaGas Ltd. and Align Technology don’t have much in common. AltaGas Ltd. is a North American energy infrastructure business with a focus on owning and operating assets to provide clean and affordable energy to its customers. Align Technology is a leading manufacturer of 3D digital scanners and clear aligners used in orthodontics. However, the two companies share similar stories when it comes to the technology they use to manage governance, risk, and compliance (GRC) issues.

What Is Ticketing Software?

When something goes wrong with a user’s device, who do they turn to for help? Maybe an employee walks up to their favorite IT team member’s desk or sends them a Slack message. They may even try to find a DIY solution by browsing the web. Though these methods may ultimately give the user the result they’re looking for, they aren’t necessarily the most effective way to handle technology issues.

Product Update: Netreo On-prem Version 12.2.26 and Netreo SaaS Upgrade

With the recent release of Netreo On-prem v12.2.26, your premiere solution for full-stack IT management and AIOps is even better! Your latest release includes powerful new features and enhancements that simplify IT management with a single source of truth about the status of your entire infrastructure.

The OpsRamp Monitor: February

Don’t stop thinking about tomorrow: For enterprise IT leaders everywhere, it’s no longer enough to lead well today and have teeth in the business. You must now be prepared for all manner and scope of uncertainty and change, and according to Accenture, very few organizations are there yet. In a recent report, the consultancy reports that only 7% of organizations are “future-ready”.

How to get your first green build on CircleCI

In this video we'll help you set up your first CircleCI build, run your first CircleCI build, break that build, use workflows to build our configuration file, and then advance workflows by fanning in and fanning out. We’ll then be adding some changes to use workspaces. And finally, we will conclude this learning activity by SSH’ing into your build.

Is my CI pipeline vulnerable?

Your continuous integration (CI) pipelines are at the core of the change management process for your applications. When set up correctly, the CI pipeline can automate many manual tasks to ensure that your application and the environments it runs in are consistent and repeatable. This pipeline can be an integral part of your security strategy if you use it to scan applications, containers, and infrastructure configuration for vulnerabilities.

The path to production: how and where to segregate test environments

Bringing a new tool into an organization is no small task. Adopting a CI/CD tool, or any other tool should follow a period of research, analysis and alignment within your organization. In my last post, I explained how the precursor to any successful tool adoption is about people: alignment on purpose, getting some “before” metrics to support your assessment, and setting expectations appropriately.

Using the CircleCI API to build a deployment summary dashboard

The CircleCI API provides a gateway for developers to retrieve detailed information about their pipelines, projects, and workflows, including which users are triggering the pipelines. This gives developers great control over their CI/CD process by supplying endpoints that can be called to fetch information and trigger processes remotely from the user’s applications or automation systems.

NiCE VMware Management Pack 5.3

Virtualization is part of many IT environments and a very effective way to reduce expenses while boosting efficiency and flexibility. The NiCE VMware Management Pack enables advanced health and performance monitoring for VMware to leverage your existing investment, reduce costs, save time, and build efficiencies that will help shape a future-proof business.

Use Datadog geomaps to visualize your app data by location

Being able to track and aggregate data by region is important when monitoring your application. It can provide visibility into where errors and latency might be occurring, where security threats might be originating, and more. Now, you can use Datadog geomaps to visualize data on a color-coded world map. This helps you understand geographic patterns at a glance, including where users are experiencing outages, app revenue by country, or if a surge in requests is coming from one particular location.

Four ways to send SCOM alerts to ServiceNow

If you work with Microsoft System Center Operations Manager (SCOM) and ServiceNow then you will be familiar with the fear of missing a critical infrastructure alert! But fear no more, we have just the ticket! Imagine if you could get these two tools working together, to fully synchronize your alerts and incidents for the lifetime of an issue – you’d be living the ITSM dream, right! So, here are our top four methods for making this dream a reality.

Single-Tenant Cloud vs Multi-Tenant Cloud

In this article, we shall talk about the advantages and disadvantages of single-tenant cloud and multi-tenant cloud. So let us get started! In the past decade adoption of cloud computing has been off the charts. For a long time most companies (primarily enterprises) managed their own IT infrastructure and they could reap the benefits of isolation, privacy and greater management control. This is what is known as a single tenant cloud architecture i.e.

How to Find Memory Leaks in Websites and Web Applications

Knowing how your users interact with your web application and how they experience it is crucial to provide the best possible experience. So what do you need to know? Start with metrics such as page load times, HTTP request times, and core Web Vitals – time to the first byte, first contentful paint. If you use Sematext Experience you’ll see a number of other useful metrics for your web applications and websites there. However, metrics themselves are only a part of the whole picture.

Dear CISO

As security practitioners, we all have things we want to be able to tell our CISO’s. We need to tell them we need more money, more headcount, we need to be able to tell them their baby (security program) is ugly. Everyone wants the ear of a CISO for the dollars they control. We just want their ear to help them understand what’s really going on in the industry and in their organization.

It Came From The Clouds

Beware that which lives amongst the Clouds. Or, ya know, just attack them mercilessly. One of the best parts about having such talented security pros at Splunk, is they also make amazing products. And some are even free. Enter the Cloud Attack Range, a detection development platform written/maintained by Splunkers Jose Hernandez and Mike Haag and open-sourced to everyone. Joining us will be Co-Founder of Red Canary Keith McCammon. Red Canary integrates with Attack Cloud to help generate attack data. It’s a true community project and we’re going to chat about it.

I Wish Someone Had Squished That Phish

It’s long since been established that it’s not if a breach will occur in your enterprise, it’s when. Are you prepared for that response? As Dave Kennedy, CEO of TrustedSec once asked a Brrcon audience, “If all you had was Sysmon, could you still do a successful IR?” Best practices are only best if you actually practice them. Along with Robert Wagner, Staff Security Specialist at Splunk, we’ll talk about ways to get your teams to their fighting weight when the bad guys sneak in through the basement.

Security Spotlight: Ryan Kovar

Splunk is home to some of the best security minds that this industry has to offer. Once a month we’ll take a deep dive and have a chat with one of those minds. First up, Distinguished Security Strategist and co-creator of the Boss Of The SOC, Ryan Kovar. With 20 years of experience in the security space, we’ll have a lot to chat about over the course of an hour.

Introduction to Azure Service Bus | Serverless360

We are back with a discussion on Azure Service Bus, the most popular messaging service from Microsoft Azure. In this video, we throw light on the Queues and Topics, along with guidance on choosing the right service for your business scenario. Also, discover the significance of topic subscription rules using Serverless360.

Accelerating support to Microsoft Azure Serverless resources | Serverless360 #webinar

Discover how Serverless360 could efficiently complement the Azure portal in managing and Monitoring all your Azure resources under one roof. Also, our experts will provide solutions to mitigate the challenges in supporting your Azure applications. This video elaborates on how to achieve Proactive Monitoring, Holistic Application View & End-to-End tracking to accelerate support to Azure Serverless Services which eventually reduces the Total Cost of Ownership.

Ebbs and Flows Of DevOps Debugging PART 2

This piece is the second part of a two-part series on how focusing on cloud debugging practices can accelerate our DevOps intentions. In part 1, we explored how an increased move to the cloud pushed for the adoption of DevOps practices. However, throughout the past decade or so, since we have been looking at DevOps with the advent of the cloud, we have hit a glass ceiling in our DevOps practices.

Overview of Incident Lifecycle in SRE

Incidents that disrupt services are unavoidable. But every breakdown is an opportunity to learn & improve. Our latest blog is a deep dive into best practices to follow across the lifecycle of an incident, helping teams build a sustainable and reliable product - the SRE way As the saying goes, “Every problem we face is a blessing in disguise”.

SaaS vs Hosted Solutions: Which Should You Choose and Why?

A key decision that must be made in a product’s lifecycle is SaaS vs Hosted. Should we be only employing the use of hosted solutions, or are we going to utilize SaaS offerings? Hosted solutions are services from providers like AWS and Azure, that take away the operational burden from some well-known pieces of tech, like Kafka or Grafana. SaaS solutions on the other hand are platforms like Coralogix, that offer proprietary value. They each offer benefits and drawbacks. Let’s get into it.

Key Differences Between Observability and Monitoring - And Why You Need Both

Observability and Monitoring are viewed by many as interchangeable terms. This is not the case. While they are interlinked, they are not interchangeable. There are actually very clear and defined differences between them. Monitoring is asking your system questions about its current state. Usually these are performance related, and there are many open source monitoring tools available. Many of those available are also specialized.

InfluxDB C Client Library for Capturing Statistics

Currently, there is no official InfluxDB C language client library. Fortunately, I wanted to do exactly that for capturing Operating System performance statistics for AIX and Linux. This data capturing tool is called “njmon” and is open source on Sourceforge. So having worked out how and developing a small library of 12 functions for my use to make saving data simple, I thought I would share it. I hope it will prove useful for others.

11 Network Traffic Terms to Know

Every industry loves its terms and jargon. Stop me if you’ve heard this one before: “I’ve always said that one of my core competencies is getting the most bang for my buck out of the sweat equity I put in during my 9-to-5.” Sure, the sentence doesn’t really make any sense, but it sounds good enough when you say it. And that’s just the point jargon tends to make. The IT industry is no different.

What's new in Sysdig - February 2021

Welcome to another monthly update on what’s new from Sysdig. Our team continues to work hard to bring great new features to all of our customers, automatically and for free! We hope you all managed to make it through January, and happy Lunar New Year! February welcomes the launch of our always-popular fourth annual Sysdig Container Security and Usage report, which looks at how global Sysdig customers of all sizes and industries are using and securing container environments.

Sysdig achieves Red Hat Vulnerability Scanner Certification

Image vulnerability scanning is a critical first line of defense for security with containers and Kubernetes. Today, Red Hat recognized Sysdig as a certified Red Hat security partner based on our work to standardize on Red Hat’s published security data with Sysdig Secure.

VMware Spring Cloud Gateway for Kubernetes, the Distributed API Gateway Developers Love, Is Now GA

For all the talk of digital transformation, there’s one workflow that tends to hinder release velocity: changes to API routing rules. But while—much to the consternation of enterprise developers everywhere—this process has historically remained stubbornly ticket-based, Spring Cloud Gateway removes this bottleneck. The open source project provides a developer-friendly way to route, secure, and monitor API requests.

Applying the Roles and Profiles Method to Compliance Code

Most of you are familiar with the roles and profiles method of writing and classifying Puppet code. However, the roles and profiles method doesn’t have to exist only in your control repository. In fact, as I’ve been developing Puppet code centered around compliance, I’ve found that adapting the roles and profiles method into a design pattern to Puppet modules makes the code more auditable, reusable, and maintainable!

The State of EdTech 2021: Education Software Usage Analyzed

Today we will share our list of the most popular software tools used by education institutions. Why is this important? If you are managing technology in education you need to make the best choice from among many available tools. Discovering the most popular tools used by other education professionals can help you make an informed choice. After reading the report you’ll know which tools are relied upon by primary and secondary schools, colleges, and universities in the United States.

LogicMonitor Welcomes Airbrake

“Today’s an exciting day for LogicMonitor. But before I share our news, I want to sincerely thank our customers for your business. The Covid-19 pandemic has been a terrible experience for the world, and yet we @ LogicMonitor are fortunate and thankful to be counted on every day by thousands of organizations. I — and our team of over 650 employees worldwide — are grateful for the chance to serve your organizations during these turbulent times”

4 Reasons Why Organizations are Ditching the Microsoft 365 SLA for an XLA

Written by Nick Cavalancia, Microsoft Cloud & Datacenter MVP The increase in reliance upon Office 365 as an organization’s digital workspace has led many organizations to measure Office 365 against how well users interact with it rather than if it’s running.

Container Monitoring: Essential Tools + Best Practices

In the Modern era of application development, businesses move towards building highly available, fault-tolerant, zero downtime applications to make the user experience and performance smoother and better. One of the essential steps in that process is containerization and orchestration of an application. A Container Monitoring process is as vital as containerizing your application.

How to monitor NVIDIA GPU metrics with Elastic Observability

Graphical processing units, or GPUs, aren’t just for PC gaming. Today, GPUs are used to train neural networks, simulate computational fluid dynamics, mine Bitcoin, and process workloads in data centers. And they are at the heart of most high-performance computing systems, making the monitoring of GPU performance in today's data centers just as important as monitoring CPU performance.

7 Reasons Engineering and DevOps Teams Love CloudZero

CloudZero is a cloud cost intelligence solution that puts engineering in control of cloud cost. We set out to disrupt the cost management and optimization space by building a solution that was designed around the way engineers work — so cost becomes a tradeoff during the software development process, rather than a massive disruption. We often get asked what actually makes us such an engineering-friendly solution? Well, here are seven reasons why engineering and DevOps teams love CloudZero.

How to monitor Nginx

How to monitor Nginx? Let us first read what Nginx monitoring is all about and how it can together work with MetricFire’s Hosted Prometheus. Nginx, pronounced like “engine-ex”, is an open-source web server that, since its initial success as a web server, is now also used as a reverse proxy, HTTP cache, and load balancer. In the case of web applications, it is not prudent to just run a single web server for your application.

3 Ways to Improve JavaScript Applications

In January we brought Release Health to JavaScript. This month we’ve been thinking about the overall experience for JavaScript developers, some could call it JavaScript Jebruary. Think back to your last frustrating experience. It was probably caused by slow page loads or getting dizzy from staring at the ever-ending spinner. One survey showed that the average desktop load time on a webpage was 10.3 seconds and on mobile, it was 27.3 seconds.

Run private cloud and on-premises jobs with CircleCI runner

CircleCI has released a new feature called CircleCI runner. The runner feature augments and extends the CircleCI platform capabilities and enables developers to diversify their build/workload environments. Diversifying build environments satisfies some of the specific edge cases mentioned in our CircleCI runner announcement.

Mattermost and moderation: Managing access for a more welcome experience

One of the greatest values Mattermost provides to users is the ability to create a space for discussion, issue tracking, and succinct communication, which is made possible by administrators managing access. Our goal is to create a safe and secure communication platform for all of our users. This often comes with the need for tools to help ensure users are communicating in line with the culture of the organization or community to ensure a welcoming and inclusive experience for all.

Windows network monitoring made easy with OpManager

Network administrators are responsible for the day-to-day operation of computer networks at organizations of any size and scale. Their primary duty is to manage, monitor, and keep a close watch on the network infrastructure to prevent and minimize downtime. Managing a network includes monitoring all the network components, including Windows devices. In any Windows network, the desktops, servers, virtual servers, and virtual machines (VMs), like Hyper-V, run on the Windows operating system.

All You Need To Know About Cloud Interconnection

Many enterprises today have a range of assets residing in a mixture of both public and private clouds. As a result, there is a need to connect not just site-to-cloud but also cloud-to-cloud - use cases we would term Data Centre Interconnection (DCI) and Cloud Interconnection.

A Quick Guide to Log Shipping To Logz.io: Collectors, Code, and Clouds

One of the great things about Logz.io Log Management is that it’s based on the most popular open source logging technology out there: the ELK Stack (click here to view our thoughts and plans on the recent Elastic license). This means Logz.io users get to leverage log shipping and collector options within the rich ELK ecosystem. So how do you know which log shipping technology to use?

What does the future hold for supply chain processes?

Global supply chains have been under immense pressure over the past year, fighting to keep up with unprecedented demand for online goods and critical healthcare supplies while battling stock shortages around the world. However, businesses on the whole came out swinging, managing to scale quickly and competently adapt to the restrictive working procedures necessary to fulfil orders and keep customers happy.

Webinar - Step Up Your DevOps Game with 4 Key Integrations for Jira & Bitbucket

Atlassian’s Ian Buchanan discusses how to integrate third-party DevOps tools with Atlassian’s robust DevOps ecosystem. You’ll learn about the benefits of an integrated tool stack, an introductions to 4 key DevOps practices, and examples of how those practices can integrate with Jira and/or Bitbucket.

Top Benefits of Cloud-Based Log Management

In the ultracompetitive times in which we live, organizations must leverage every asset at their disposal if they’re to survive and thrive. Log data is undoubtedly valuable, so having a proper log management strategy in place is vital for any tech team . Unfortunately, implementing a great log management strategy isn’t as easy as it sounds. It involves many factors, including the selection of an adequate tool.

Monitoring Microservices-based Environments Using Epsagon

Microservices are great to run in cloud-native environments and provide the flexibility to adapt to businesses’ ever-changing needs. Organizations have the opportunity to gain competitive advantages using these microservices-based environments. The environments, such as various cloud providers (AWS) and Kubernetes, used to run or orchestrate the microservices have thus become a critical part of an organization’s architecture.

QA Engineers, This is How SRE will Transform your Role

When implementing SRE, almost every role within your IT organization will change. One of the biggest transformations will be in your Quality Assurance teams. A common misconception is that SRE “replaces” QA. People believe SLOs and other SRE best practices render the traditional role of QA engineering obsolete, as testing and quality shift left in the SDLC. This leads to QA teams resisting SRE adoption.

Customizing Containers during App Modernization using CloudHedge

CloudHedge Transform provides the user with the option of modifying the data that goes into the container. It uses the data gathered from the X-Ray, a part of the CloudHedge Discover module that has been performed on the process. Using the Transform Platform, the user can currently: The Edit Dockerfile feature can be used to: And the File Selection feature can be used to.

A Partnership Between InfluxData and Ockam Brings Trust to Time Series Data

This article is a re-post of the article written by Matthew Gregory and published on the Ockam blog. Let’s investigate how to build applications with trusted time series data in a zero trust environment! To trust an application we need to trust the data that feeds into it. Increasingly, applications rely on time series data from outside the datacenter, at the edge, or in IoT. This means we need to think of trust and data in new ways.

Troubleshooting Large Queues in RabbitMQ

If you’re a RabbitMQ user, chances are that you’ve seen queues growing beyond their normal size. This causes messages to get consumed long after they have been published. If you’re familiar with Kafka monitoring, you’ll call it consumer lag, but in RabbitMQ-land it’s often called queue length or queue depth.

Top 5 New Relic Competitors and Alternatives to Try

New Relic is one popular for SaaS-based Application Performance Management capable of providing you with a flexible and dynamic approach to monitoring. It is considered to be effective but some may feel it is not cost-effective for small-meidum-size businesses and comes with a very high learning curve. If you want an APM that you can get started quickly, requiring minimal training or experience, New Relic may not be for you.

Testing the new Elasticsearch cold tier of searchable snapshots at scale

The cold tier of searchable snapshots, previously beta in Elasticsearch 7.10, is now generally available in Elasticsearch 7.11. This new data tier reduces your cluster storage by up to 50% over the warm tier while maintaining the same level of reliability and redundancy as your hot and warm tiers.

The new Splunk Infrastructure Monitoring plugin brings the SaaS formerly known as SignalFx to your Grafana dashboards

Greetings! This is Mike reporting from the Solutions Engineering team at Grafana Labs. In previous posts, you might have read our beginner’s guide to distributed tracing and how it can help to increase your application’s performance. In this post, we are back to talk about metrics and showcase another one of our newest favorite Enterprise plugins: Splunk Infrastructure Monitoring (formerly known as SignalFx)!

AI Chihuahua! Part II

With build-or-buy decisions, it often comes down to an all-in-one platform or a mixture of best-of-breed technologies. With open-source technology companies can actually get the best of everything. So, why not roll your own platform based on top-notch technologies? The real question is whether enterprises can afford to. Open-source software is free to use, but teams have to invest quite a bit in selecting, introducing, using, and maintaining these technologies.

Bringing value to our members through automation using Ocean by Spot

Moving to Kubernetes gives applications the ability to scale, but it also introduces challenges to managing and operating cloud infrastructure. When giffgaff, a virtual mobile network, migrated to EKS, they needed to figure out how they would automatically scale their EC2 instances and how they would do so cost-efficiently. In this session, you’ll hear how giffgaff worked with Spot by NetApp to implement container-driven autoscaling for provisioning compute capacity and leverage spot instances to save big on their cloud bill.

Comprehensive Observability via Distributed Tracing on Node js | Node Congress

The benefits of Node.js to develop real-time applications at scale are very well known. As Node.js architectures get more and more complex, visualization of your microservice-based architecture is crucial. However, the visualization of microservices is incredibly complex given the scale and the transactions across them. You not only need to visualize your Node.js applications but also analyze the health, flow, and performance of applications to have a complete observability solution. In this talk, we'll go over the challenges of scaling your Node.js applications and tools (such as distributed tracing) available to you to scale with confidence.

The 50 Best DevOps Tools

DevOps has gained a lot of traction among the software development community for its ability to improve cycle times and application performance. DevOps methods are still being tested and perfected by development teams throughout the world, and there are many DevOps tools at their disposal to help them streamline processes, improve application performance, and address common issues faced in development and operations.

Splunking AWS ECS Part 2: Sending ECS Logs To Splunk

Welcome to part 2 of our blog series, where we go through how to forward container logs from Amazon ECS and Fargate to Splunk. In part 1, "Splunking AWS ECS Part 1: Setting Up AWS And Splunk," we focused on understanding what ECS and Fargate are, along with how to get AWS and Splunk ready for log routing to Splunk’s Data-to-Everything platform.

Show Your Query You Love It By Naming It

Honeycomb is all about collaboration: We believe that observability is a team sport, and we want to give you as many tools to help your team get the ball down the field (i.e., untangle knotty problems) as we can. We want you to be able to share the current state of your work so that others can follow and figure out what’s up, and we want you to leave breadcrumbs so the next time you’re stuck here, you can find your way back.

Maximize your Google Cloud Investment with LogicMonitor

LogicMonitor’s agentless architecture is designed for organizations adopting hybrid and multi-cloud environments to scale with ease. With an end-to-end view across important GCP services, IT Operations teams are equipped with real-time visibility into the health and performance of their entire distributed environments, maximizing value for GCP investments whether fully deployed or just getting started with cloud migration.

Building and running FIPS containers on Ubuntu Pro FIPS

Canonical provides customers Ubuntu Pro images AWS Marketplace. Ubuntu Pro for AWS is a premium AMI designed by Canonical to provide additional coverage for production environments running in the cloud. It includes security and compliance services, enabled by default, in a form suitable for small to large-scale Linux enterprise operations — with no contract needed.

Monitoring Node.js Health and CPU Usage

What’s the most wanted feature for a Node.js application? Well, high performance with no downtime is one of the top answers for this question. But how do you accomplish this? Monitoring is key to gain a better understanding of the health of your application. For example, by implementing monitoring, you can detect problems, such as a memory leak or long-running processes that block the Node.js event loop.

The True Cost of IT Failures (and What to Do Instead)

In this age of digital transformation, any issues with your IT infrastructure can cause major disruptions to your business. On top of this, IT environments that support critical business applications continue to get more complex and dynamic. As failures, outages, and incidents increase in volume and cost, the risk of an outage within your company becomes a very expensive one.

The next Big Thing in Azure Database Monitoring Landscape

Today’s applications are expected to be highly responsive and always online. Such circumstances excite the pressure on applications to respond in real-time to large changes in usage at peak hours, store ever-increasing volumes of data and make it available in milliseconds. Azure Database Services comes to rescue in such situations, and Azure supports many industry-standard databases and APIs.

Feature Spotlight: Golden Signals

As a team we have spent many years troubleshooting performance problems in production systems. Applications have gotten so complex you need a standard methodology to understand performance. Fortunately right now there are a couple of common frameworks we can borrow from: Despite using different acronyms and terms, they fortunately are all different ways of describing the same thing.

Remote Team Management: The Do's and Don'ts

Remote team management has always been different for team managers and leaders. Not just challenging, but different. Not having the luxury to rub shoulders often and not having the liberty to have the entire team under one roof has compelled leaders to acquire new and innovative approaches to remote leadership. And while leadership styles and management approaches are ever-evolving, there are some core principles of effective remote team management that team leaders can stick to.

Surveying the Tides of Cloud-Native & Open Source Observability

We can plausibly say the enterprise development market turned the tide on cloud-native development in 2020, as most net-new software and serious overhaul projects started moving toward microservices architectures, with Kubernetes as the preferred platform.

Hosted Prometheus vs. Hosted Graphite

In this article, we will discuss major features, differences, and similarities of the open-source monitoring tools known as Prometheus and Graphite. We will then dive into how you can benefit from MetricFire’s hosted Prometheus and Graphite. Lastly, we will explain why, given the choice, hosted Graphite could be a better monitoring option for you. MetricFire provides comprehensive monitoring solutions with Hosted Prometheus and Hosted Graphite.

Making CI/CD work with serverless

“Serverless computing is a cloud-computing execution model in which the cloud provider runs the server, and dynamically manages the allocation of machine resources. Pricing is based on the actual amount of resources consumed by an application.” — “Serverless Computing”, Wikipedia This mundane description of serverless is perhaps an understatement of one of the major shifts in recent years.

How to reduce your AWS bill up to 60%

Let’s face it. Once you have consumed your free credit, AWS costs an arm and a leg. This is the price to pay for high-quality services. But how can you reduce your costs without sacrificing quality? This post will show you how to reduce your bill by up to 60% by combining four built-in features in Qovery. There are three categories of costs on AWS. The “data transfer”, the “compute”, and the “storage” costs.

How to monitor your Website in just 2 simple steps?

In this video, you’re going to learn exactly how to monitor your Website in just 2 simple steps! To be clear: Monitoring a Website is a lot of hassle. But with this video tutorial, you’ll know how you can monitor your Website in just 2 simple steps while saving a lot of time. Think of Components like folders that contain other Fyipe resources and one of the resources it has is called "Monitors". A website monitor will basically test your Website for availability, performance, and function. I'll also show you how your team is alerted when your website goes down.

Azure Cost Optimization: 10 Ways to Save on Azure

Cloud has become an integral part of modern businesses as extra resources keep moving towards it. Budgeting cloud expenses has come into focus with its massive expenditure in IT. Azure usage optimization entails several modes through which an organization can save on costs. Let's look into ten ways to save on Azure.

Introducing the Datadog quick nav menu

Datadog’s features give you full visibility into every part of your application environment, so it’s likely you have many resources to switch between as part of your troubleshooting and development workflows. For example, you might switch from the host map to investigate a performance issue with your services in APM, or jump between dashboards to correlate metrics and troubleshoot a problem with your CI/CD pipeline.

Taloflow raises new funding and joins Y Combinator W21 Batch

We're excited to share some updates on what we've been working on at Taloflow. We've come a long way since we launched Tim - AWS cost management for developers, which was a finalist for Product Hunt Dev Tool of the Year. Since launch, we've had the opportunity to work with nearly 100 companies and developers. We've helped digital native companies like NS1, Bluecore and Modusbox save money, improve performance, and get a better grasp of their marginal costs on the cloud.

Dispelling 7 SLA Myths That Keep Your DevOps Awake at Night

DevOps fits this odd niche between development and oversight. Like any “Wild West” type of position, pretty much anything goes. Your job is to think of everything including the stuff you haven’t thought of yet. You make the rules, and as long as the lights are on you’re considered a success. But alongside that freedom come the rumors and SLA myths that inspire such dread that you write them off as jokes.

SQL Server deployments: Which Redgate tools should you use?

Since 1999, we’ve been developing tools at Redgate to support database deployments for SQL Server. In the past couple of years, we’ve increased our effort in this space by further developing our proprietary technologies based on SQL Compare, and acquiring others like Flyway, the most popular database migration engine. As a result, we now offer tools which provide more options for SQL Server and also support deployments for 20 different database systems.

Gartner's 2021 Strategic Roadmap for ITOps Monitoring highlights

Does your work involve a lot of ITOps Monitoring? If so, chances are you have developed a roadmap for 2021 that addresses digital business disruption, application and infrastructure changes, and the ongoing global pandemic… And here’s an opportunity to incorporate expert advice into your plan.

Frontend Performance Monitoring: 8 Tools & SaaS to Improve Application and Website...

Monitoring the performance of an application is not a strange concept to most developers. At one point or another, we’ve all had to do some performance debugging of our own. Usually, it happens when there’s a big issue affecting the user’s experience or cost implications. Only then do we make time to look at how the app performs in different scenarios. Of course, there are different parts of the application that you can, and should, monitor separately.

Top 10 Characteristics of an Enterprise-Class IT Application and Infrastructure Monitoring Tool

‘Enterprise class’ is a buzzword that refers to applications that are designed to be robust, flexible, and scalable for deployment by a large organization. There are no firm standards for what makes an application or platform enterprise class, but enterprise-class applications are generally: When any product is developed, there are assumptions made. These assumptions dictate how widely the tool can be deployed and what constraints it has during usage.

Which Open Source Bug Tracking Tools Would Be Best For You?

With the increase in open-source software tools, developers have become more powerful. Open Source refers to an openly distributed code which allows users to inspect, modify and enhance it. It includes a license that allows users to utilize the source code and you can also modify and share under defined terms and conditions.

Layering customer, infrastructure and business perspectives into your monitoring (Part 4)

In my prior three blog posts, we set some ground rules, looked at some out-of-box dashboards, overloaded an in-box property, and finally created an innovative structure to communicate status using SquaredUp's EAM feature. Looking back, when I started this blog, I explicitly stated that traditional monitoring wasn't our goal. It's essential, but the industry (in broad terms) hasn't been successful with monitoring when the only focus is on the infrastructure perspective.

AlertOps Expert Guidance

At AlertOps, we believe our job doesn’t end when you complete the procurement of our software service. It has just begun, our support team is only a call, email or chat away, to guide you toward your goal. Our Customer Success team will also be in constant touch, helping you with your issues at hand, guiding you on your usage patterns, recommending any under-leveraged options and highlighting new features and service that we rolled out.

Logging with the HAProxy Kubernetes Ingress Controller

The HAProxy Kubernetes Ingress Controller publishes two sets of logs: the ingress controller logs and the HAProxy access logs. After you install the HAProxy Kubernetes Ingress Controller, logging jumps to mind as one of the first features to configure. Logs will tell you whether the controller has started up correctly and which version of the controller you’re running, and they will assist in pinpointing any user experience issues.

AI Chihuahua! Part I: Why Machine Learning is Dogged by Failure and Delays

AI is everywhere. Except in many enterprises. Going from a prototype to production is perilous when it comes to machine learning: most initiatives fail, and for the few models that are ever deployed, it takes many months to do so. While AI has the potential to transform and boost businesses, the reality for many companies is that machine learning only ever drips red ink on the balance sheet.

What a 13th-century monk can teach us about managing information overload

Get stories about tech and teams in your inbox Our brains are simply not equipped to handle all the information we’re trying to stuff into them. That’s the (paraphrased) sentiment of Dominican friar Vincent of Beauvais, a 13th-century monk, who was struggling to manage “the multitude of books, the shortness of time and the slipperiness of memory.” It seems the printing press was burying old Beauvais in a never-ending pile of text. What’s a monk to do?

ServiceNow and Microsoft power virtual agent collaboration on Teams for the new distributed world of work

On-demand collaboration happens fast nowadays. Service agents, from IT, HR and other departments, need to collaborate quickly to resolve employee needs before they become larger issues. Great employee experiences demand end-to-end integration and execution at scale. No longer a nice-to-have, productive collaboration has become essential for business continuity and enterprise resilience, as some workers start to return to the physical workplace.

What Does a DevOps Engineer Do?

As companies seek to embrace DevOps practices, they are increasingly looking to add new skills to their teams. While there are many DevOps roles and positions, from software developers to data analysts, the DevOps engineer has emerged as a critical role in recent years. Data collected by Atlassian shows that nearly 85% of companies face significant barriers when implementing DevOps, with a lack of relevant employee skills being one of the major issues.

Logz.io Celebrates the Release of OpenTelemetry v.1.0

OpenTelemetry 1.0 (Otel) is finally here (in fact, 1.0.1). The announcement brings the industry closer to a standard for observability. OpenTelemetry v1.0.1 will focus solely on tracing for now, but work continues on integrations for metrics and logs. We are still a long way off from this vision becoming reality. Metrics today are in beta, and this is where the community focus is being applied. Logging is even earlier in its life lifecycle.

Surviving the disaster: How to identify bugs immediately & get back on track w/ Codefresh & Rookout

Deploying through imperative kubectl commands is error-prone and time-consuming. In this webinar, we show you how to automate deployments to your Kubernetes cluster through Codefresh. Codefresh has several features to manage Kubernetes deployments, including the Kubernetes Environment Dashboard and the GitOps Dashboard.

How Do You Measure Technical Debt? (and What To Do About It)

Technical debt is an important — but often unclear — concept for engineering teams. In software development, technical debt, also called code debt or tech debt, is defined as the cost of refactoring a piece of code or system to keep it working efficiently. It can be caused by outdated architecture, a change in requirements, or the result of choosing an easier solution instead of a better, but more difficult one.

ASP.NET Performance: 9 Types of Tools You Need to Know!

One of the best things about being a .NET developer is all the amazing ASP.NET performance tools that can make your life easier. This blog post is a list of the various types of ASP.NET performance tools at your disposal for finding and optimizing ASP.NET performance problems. Depending on the task, some of these tools will be much better than the others.

The State of Robotics - January 2021

A new start? 2020 came and went, and in the process, it left a mark in history and our lives that won’t be erased. Together, as a community, we all struggled, we all faced new challenges, we all united and did our best to help each other. We are grateful for the effort of our nurses, doctors, carers, scientific, essential workers, and innovators that have led this fight. We also take a moment to remember those that we have lost and those who have been affected the most.

A Path to Proactive Security Through Automation

The sheer number of cyberattacks launched against organizations every year is massive and growing. If you’re a security analyst working in a SOC or security team, tasked with defending your organization, that means you’re getting bombarded by many more attacks than the recorded numbers above would suggest. These attacks translate into security alerts — fired from your various security tools — that you must investigate and resolve.

Detailed Beginners Guide To NoSQL vs SQL

While SQL has been the big dog since the 70s in terms of database management, NoSQL has really come into its own since the late 2000s. In fact, NoSQL has become a powerful and important tool for data analysis and data scientists. To that end, we wanted to take a look at what NoSQL actually is, what are the benefits over SQL, and what are the different data models.

Building Complex Well-Architected Serverless Architectures

In this article, we’ll be rewinding back to the very beginning of the AWS Well-Architected Framework to understand how and why it came to be, and why is it of utmost importance, but very often underrated, for serverless developers to learn, understand and apply this framework of best-practices. We’ll also be looking into how the framework has evolved and how it should be used in 2021.

Rancher Online Meetup - Feb 2020 - Longhorn 1.1 and Rancher

Join Rancher and SUSE at our next global meetup where we focus on the latest release from of CNCF Sandbox project Longhorn and its benefits for Rancher users. When used with Rancher, Longhorn 1.1 provides Kubernetes users with a reliable Kubernetes-native persistent storage solution from core to cloud to edge. This meetup will be hosted by Adrian Goins (Director of Community, SUSE). You will also hear directly from Sheng Yang (Principal Developer, Longhorn) and William Jimenez (Product Manager, Longhorn).

Customer Success: Build Better Customer Relationships

Does your professional services firm invest in customer success? Studies reveal that customer-centric firms are 60% more profitable than their peers. That explains how important customer success should be to your business. Particularly, those offering professional services because such firms thrive on long-standing relationships with their customers.

Winter 2021 Updates for Alloy Software ITSM/ITAM Platform

We are pleased to announce the immediate availability of a new update (8.7.3) for the Alloy Software ITSM/ITAM platform, including Navigator, Navigator Express, and Discovery. This maintenance update resolves issues reported in previous versions, offers Apple M1 Chip support, and expands API integration capabilities. For detailed information about all changes in this update, please see Release Notes on the Alloy Documentation Portal.

End Your CMDB Saga with AIOps + Automation

The CMDB has been around for decades, creating heartache and misery for the IT people tasked with maintaining it. Originally implemented to help track and manage ever-changing IT assets, more often than not, the CMDB is outdated the moment the last keystrokes are made. This eBook explores the checkered past of the CMDB and how AIOps and IT automation tools are helping it overcome its bad reputation to usher in a new era where the CMDB can finally deliver on its long-awaited promise.

5 trends that will define endpoint management in 2021 and beyond

2020 was a year of tremendous dejection and disruption. Imagine if you had told your organization’s upper management that they had to switch their 10,000 or 20,000 strong corporate office to the virtual world back in January 2020. They would have flipped. Despite all the fear and loss that 2020 brought, we capitalized on the opportunities. And even a year later, there are still possibilities galore.

Dangerous defaults that put your IT environment at risk: IT security under attack

In this blog in the “IT security under attack” series, we wanted to shed some light on an unfamiliar and seldom discussed topic in IT security: the default, out-of-the-box configurations in IT environments that may be putting your network and users at risk. Default settings, and why the initial configuration is not the most secure

Cross Company manages IT efficiently using OpManager's push notifications and email alerts

Customer stories are one of the best ways for users to get to know a solution or tool and learn how it can solve their problems. By sharing some of our customers’ OpManager success stories, we aim to help new users and evaluators understand our solution and its wide range of functions. Let’s take a look at how Cross Company used OpManager. Founded in 1954, Cross Company is a 100 percent employee-owned engineering and automation services company.

Monitor Core Web Vitals with Datadog RUM and Synthetic Monitoring

In May 2020, Google introduced Core Web Vitals, a set of three metrics that serve as the gold standard for monitoring a site’s UX performance. These metrics, which focus on load performance, interactivity, and visual stability, simplify UX metric collection by signaling which frontend performance indicators matter the most.

5 trends that will define endpoint management in 2021 and beyond

2020 was a year of tremendous dejection and disruption. Imagine if you had told your organization’s upper management that they had to switch their 10,000 or 20,000 strong corporate office to the virtual world back in January 2020. They would have flipped. Despite all the fear and loss that 2020 brought, we capitalized on the opportunities. And even a year later, there are still possibilities galore.

How to Monitor Google Network Performance: Google Meet, Google Workspace, Gmail and Google Calendar

Application slowdowns, poor Internet speed, and laggy video calls are always frustrating. Whether you’re working in an office, or working from home, it’s important to keep an eye on the applications that matter most. In this article, we’re teaching you how to monitor the network performance of Google apps, including Google Meet, Google Workspace, Gmail & Google Calendar.