Operations | Monitoring | ITSM | DevOps | Cloud

October 2022

Getting started with Azure API management health check

Due to the increasing influence of businesses on APIs, the volume of APIs on which they rely, and the administrative challenges that APIs pose, API administration has gained popularity. For the most part, other apps don’t have the exact requirements or construction and management processes as APIs. Vital documentation, higher security standards, extensive testing, frequent versioning, and excellent reliability are all requirements for using APIs properly.

Preventing PII in Test environments

Data privacy and security are a top concern for most organizations. It’s easy to see why given changes over the past few years. These types of protections can be great for us as consumers. However, they also make it extremely difficult to create realistic production simulations in pre-production. It’s hard to rapidly develop new applications if you can’t iterate against realistic data.

Documenting your APIs with developer API portals

Developers need all the information they can get on APIs to get them to work in alignment with their vision. There is no dearth of knowledge in the software development industry today, but only when that knowledge is documented well is it of use to others. In the context of APIs, developer portals offer an effective way to document and communicate relevant information. In this article, we answer the following questions about developer API portals.

Autoscaling Checkly Agents with KEDA in Kubernetes

Checkly private locations enable you to run browser and API checks from within your own infrastructure. This requires one or more Checkly agents installed in your environment where they can reach your applications and our Checkly management API. You need to ensure you have enough agents installed in order to run the number of checks configured in the location. We have a guide to planning for redundancy and scaling in our documentation.

Unleash the Full Power of Playwright With @playwright/test

Welcome to day three of our very first Launch Week! The last two days we shared how alerting became so much better and how we moved one level up by completing our SOC 2 Type 1 audit. Are you curious what’s next? I’ll tell you, but first let’s set the stage and look at Microsoft’s Playwright.

Checkly Completes SOC 2 Type 1 Audit

A Service Organization Control (SOC) audit is one of the most extensive tests an organization can undergo to demonstrate the ongoing maintenance of high-level information security. Today, we’re thrilled to announce that Checkly is SOC 2 Type 1 compliant after completing a successful audit by an accredited auditing firm. This demonstrates that Checkly’s information security policies, procedures, and practices meet the SOC 2 guidelines for security and data privacy.

Checkly Announces Business Milestones, SOC 2 Compliance, New Playwright Test Runner, GitHub Sync, Enhanced Alert Notifications, and More

Company experiences impressive momentum with thousands of users and over 600 customers now using Checkly to monitor apps and APIs quickly and reliably, conducting more than 3.8 Billion browser and API checks.

Checkly Alerting Improvements and Our New Slack Community

Welcome to day one of our very first Launch Week! In the upcoming days, we’ll release new features every day. We’ll share new alerting capabilities, unlock the power of Playwright, and will talk about new ways to control and write your Browser checks. It’ll be a nice feature and improvements mix, trust me! To kick things off, let’s have a look at what’s new in the world of monitoring and alerting.

What's New in Checkly Launch Week

The Checkly development team is continually improving our platform and user experience, and we’re excited to unveil some new features that we’ve been working on during our first ever Checkly Launch Week. From October 11th through 14th, we’ll be announcing and discussing our latest innovations, new features, functionality, and capabilities for users every single day of the week.

Sponsored Post

Production Data Simulation: Record in One Environment, Replay in Another

Have you ever experienced the problem where your code is broken in production, but everything runs correctly in your dev environment? This can be really challenging because you have limited information once something is in production, and you can't easily make changes and try different code. Speedscale production data simulation lets you securely capture the production application traffic, normalize the data, and replay it directly in your dev environment. There are a lot of challenges with trying to replicate the production environment in non-prod.

Datadog on gRPC

Datadog, the observability platform used by thousands of companies, is made up of hundreds of services that communicate over the network using gRPC, an RPC framework, making it a critical component for Datadog’s reliability. As teams investigated incidents related to their services, they discovered that some of them were gRPC related. But, were there common patterns to those incidents? Could we use them to learn more about gRPC and how to use it better?

Why IT Skills Are Vital When You're Running an eCommerce Business

In many ways, running an eCommerce business can be like running any other business. However, in many other ways, it can be completely different. Unfortunately, it is the differences between running an eCommerce business and a traditional business that is often where issues arise for new eCommerce business owners. One of the best ways to manage the differences between traditional and e-commerce businesses is to ensure that you have sufficient technical knowledge to understand how IT works. To that end, this article aims to highlight some of the best IT skills that an eCommerce business owner should develop and why.

An Introduction to gRPC

gRPC is an inter-process communication protocol used in high-performance applications in cloud computing, Internet of Things (IoT), mobile computing, and microservices environments. This article examines how gRPC works, how to use it, and how it compares to other popular API architectures. It also discusses a unique use case where gRPC excels.