Operations | Monitoring | ITSM | DevOps | Cloud

June 2023

Patch management automation: Is it worth the hype?

Patch management is a term that’s familiar to all within the depths and boundaries of endpoint security. While the addition of “automation” to this term might make it seem like one among the thousands of other automated tasks, cybersecurity experts have been going gung ho over it in the last few years. If you’re reading this, it probably doesn’t make sense to explain to you what patch management automation or automated patch management is.

Graphite Metrics Delay: Why it Happens and What to Do

To understand why Graphite metrics delay occurs, we must first know what Graphite is. Graphite is an open-source tool used to track the performance of websites, applications, and network servers. It makes it simple to monitor, store, retrieve, and visualize numeric time-series data. While Graphite does make it easier to render graphs on-demand, the struggle of dealing with large amounts of data with minimum delay is real.

Blackfire is now even closer to home!

As you probably already know, Blackfire and Platform.sh joined forces back in June 2021. And since then our collective teams have been working together to provide a seamless integration for a complete Git workflow and Observability solution. Blackfire was already part of the Platform.sh product experience for Enterprise and Elite users for quite some time now thanks to the Platform.sh Observability suite.

Synchronizing mental models

In the heat of an incident, having a clear and shared understanding of what’s going on is absolutely crucial to effective response. But often what actually happens is that people involved in incidents build their own picture and narrative of the event, shaped by their own expertise, their past experiences, and what they’re seeing and hearing as the incident develops. The pictures and perspective people build is often referred to as a mental model.

EV charging infrastructure: overcome the challenges with open source

When people ask about the negative points preventing higher electric Vehicles (EV) sales, two points are raised systematically: range anxiety and the availability of charging stations. Range anxiety refers to the fear of running out of battery while driving. Of course, with more range or more charging stations, range anxiety decreases. Unfortunately, most countries lack EV charging infrastructure that meets consumer expectations.

Strengthen Your DORA Metrics with PagerDuty

For technical teams, the findings from DORA provide a model for measuring and improving performance. With almost a decade of data gathered from more than 33,000 professionals worldwide, the capabilities and frameworks detailed by the research help teams pinpoint areas for improvement and areas to celebrate. The team at DORA categorizes capabilities into three sections: Technical Capabilities, Process Capabilities and Cultural Capabilities.

Azcopy: A Comprehensive Guide

In the vast universe of cloud computing, data transfer operations serve as the lifeline of your day-to-day tasks. Whether it’s migrating data to the cloud or distributing data across various storage accounts, data transfer plays a vital role. Microsoft’s Azcopy is a lifeline for those who require a robust, reliable, and efficient tool for their data transfer needs, particularly to and from Azure Storage.

Azure Logic App Standard Monitoring on key metrics

Azure Logic Apps have revolutionized how organizations automate their workflows and integrate various applications and services. They provide a robust and scalable platform for designing, orchestrating, and automating business processes and workflows. With Azure Logic Apps, organizations can harness the full potential of integration and achieve unparalleled efficiency in their operations.

Managing Compliance: Tips + Strategies for Breaking the Vicious Scan-Fix-Drift Cycle

Managing compliance can seem like a losing game. It seems like you'll never be ahead – like you'll always be fixing drift after it happens, only for your configurations to inevitably slip again. Managing compliance becomes a vicious cycle of scanning to hunt down drift, fixing it as best you can, and waiting for it to happen again.

Netdata Parents (Streaming and Replication)

A “Parent” is a Netdata Agent, like the ones we install on all our systems, but is configured as a central node that receives, stores and processes metrics data from other Netdata “Child” nodes in our infrastructure. Netdata Parents are flexible. You can have one big active-active cluster of Netdata Parents, or you can spread a lot of independent Parents across the infrastructure. This “distributed still centralized” setup provides a lot of benefits.

Qovery Demo Day June 2023

Qovery is a platform delivering Environments as a Service in your Cloud, where you can build, deploy and test in production-like environments. Qovery turns app deployment and environment provisioning on AWS a breeze. Developers can instantly spin up production-like environments and start shipping in seconds. Join Albane (Product Marketing at Qovery), Romaric (CEO at Qovery) and Hamza (Senior Solution Engineer at Doppler) to see in action what we worked on last month and what's next.

Monitoring Android Data with MetricFire

Understanding the performance of Android applications, user interactions, and problem-solving is significantly reliant on data monitoring. As the realm of mobile technology continues to expand, developers are tasked with managing an increasingly large amount of data. When this data is correctly harvested and scrutinized, it can yield valuable insights that inform strategic choices and lead to improvements in the app.

How to Successfully Transition from DevOps to Platform Engineering

Are you thinking about switching from platform engineering to DevOps? You're not alone. In order to remain competitive, many organizations are making this crucial change as the world of software development and operations continues to change. This article will discuss the reasons behind the transition, what it implies, and most importantly, how your organization may successfully manage the change.

Top 8 Emerging Technology Trends for 2023

The state of technology is always changing. We are seeing new technological developments every day as a result of several things, such as improvements in research and development, the introduction of new goods and services, and modifications in customer preferences and requirements. The rapid development of artificial intelligence (AI) and machine learning is only one instance of how technology is evolving daily. These technologies are being utilized to increase productivity and decision-making across a range of sectors, including healthcare, banking, and retail.

ManageEngine secures overall leadership position for Unified Endpoint Management in KuppingerCole Leadership Compass 2023

Attention, all tech enthusiasts! We are thrilled to announce that ManageEngine has once again been positioned as an Overall Leader for UEM in the KuppingerCole Leadership Compass. This marks the second consecutive time we have achieved this recognition. We have been acknowledged as leaders in all three leadership categories: Product Leadership, Innovative Leadership, and Market Leadership.

10 Essential Security Tips for Safeguarding Your Cloud Services

In today’s digital era, the cloud has revolutionized the way we store, process, and transmit data, offering scalability, efficiency, and flexibility. As we continue to transition towards this cloud-first approach, the importance of robust cloud security can’t be overstated. This article will provide ten essential tips for ensuring the safety and security of your data in the cloud.

Get Deep Insights Into Your Heroku Applications with Our Comprehensive Cheatsheet

Are you looking to streamline your development process, boost productivity, and deploy your applications effortlessly? Look no further! We are thrilled to announce the release of our Heroku monitoring cheatsheet, designed to be your go-to resource for monitoring Heroku applications.

Billy Beane Shows How AI Can Give You a Competitive Edge

As general manager of the Oakland Athletics, Billy Beane applied statistical analysis (also known as sabermetrics) to the evaluation of baseball players, which enabled the team to excel in the 2020 season. Beane was the subject of Michael Lewis’s book “Moneyball,” which was made into a movie starring Brad Pitt as Beane.

Managing security vulnerabilities and compliance for U.S. Government with Ubuntu Pro

Complying with US government security standards such as FIPS, FedRAMP, and DISA-STIG is essential for federal agencies and any business that deploys systems and services for U.S. government use. However, maintaining a compliant IT ecosystem is a major undertaking, as each regulation brings a host of specialised requirements. And dealing with the never-ending stream of security vulnerabilities that require patching only adds to this task.

The founding moments: Tracing the origins of confidential computing

In Ernest Hemingway’s novel “The Sun Also Rises,” there is a memorable exchange between the author and the main character, Mike. When asked how he went bankrupt, Mike responds with a concise yet profound answer: “Two ways. Gradually, then suddenly.” Innovation happens much in the same way. Gradually, then suddenly. Ideas simmer and evolve, gaining traction until they reach a tipping point.

Top 10 IT Automation Mistakes & How To Avoid Them Guide

Over the years, Kelverion has seen it all, from excessive employee-wide automated messaging to connecting systems with people. We’ve seen many automation projects fail to achieve their potential or even grind to a halt completely, and the reasons for these IT automation mistakes are shockingly common. With automation’s huge business benefits, committing some of these blunders has proved to be career limiting.

Announcing Catalog - the connected map of everything in your organization

One of the most painful parts of incident response is contextualizing the problem and understanding how and where it fits within your organization. If responders are unable to answer basic questions such as: Then you waste valuable time talking to the wrong people or solving the wrong problems — ultimately extending impact and hurting your response. It’s a common issue that, up until now, didn’t have a clear solution or workaround.

ChatGPT: Friend or Foe? Protect your dev team from the Dark Side!

It’s no surprise that AI is rapidly becoming the most powerful tool for developers. The ease of use and accuracy of such tools can even generate code snippets for a website written entirely on a napkin! While the potential of AI is exciting, it is crucial to address the potential vulnerabilities that bad actors can exploit within AI systems.

Your Starter Guide to Using the HAProxy Lua Event Framework

In this article, we’ll take you on a quick tour of the new Lua event framework shipped with HAProxy 2.8—plus demonstrate how Lua helps you further customize HAProxy’s behavior. We’ll start with a brief, high-level overview of Lua and how HAProxy uses it. Next, we’ll introduce you to the Lua event framework, show you what you can do with it, and familiarize you with its mechanics.

Ocean for Apache Spark releases Azure support

NetApp is pleased to announce General Availability of its Spot Ocean for Apache Spark™ product on the Microsoft Azure cloud. Customers can now choose to have Spot optimize and manage their AI and data engineering projects at scale on many kinds of infrastructure. Spot’s SaaS product removes the effort, complexity, and risk of setting up and running Apache Spark yourself. It also improves the performance and efficiency of data scientists’ Jupyter Notebooks.

How To Transition To Cloud Cost Optimization 2.0

But many businesses don’t have insight into where that money goes and whether or not they’re pricing their products accordingly. CloudZero Founder and CTO Erik Peterson sat down with Erik Carlin, Founder and CPO at ProsperOps, to talk about the transition in cloud cost optimization from 1.0 to 2.0. They explored what data engineering teams need to make informed buying decisions, how to turn data into actionable intelligence, and why you should view cloud costs as an opportunity for ROI.

Upgraded role-based access control brings more visibility - and control - to incident management at your organization

We’ve long believed that incidents (and technical team cultures) improve when more people are empowered to declare, follow, and contribute to their resolution. But not everyone in an organization needs to be able to manage the processes, rules, and settings a company enforces for their incident programs.

Beyond SaaS: Multi-cluster Kubernetes Management for Regulated Industries and Sovereign Clouds

VMware Tanzu Mission Control is a centralized hub for simplified, multi-cloud, multi-cluster Kubernetes management. It helps platform teams take control of their Kubernetes clusters with visibility across environments by allowing users to group clusters and perform operations, such as applying policies, on these groupings.

Hyperscaling open-source AI: How small teams can out-innovate big tech

Mattermost CEO Ian Tien speaks at Collision 2023 in Toronto about hyperscaling Hyperscale happens during technology transitions. Open-source innovation in generative AI – now available to every developer in the world – is outpacing tech giants on critical fronts. Join Mattermost co-founder and CEO Ian Tien to discover how startups can use open source to accelerate awareness, build community, reach target buyers, and sail past competitors.

4 Ways Automation Can Help Airlines Prepare for a Smoother Winter 2023

How can anyone forget the photos and images of mounds of luggage sitting wherever they could find a spot at most major airports, back during the winter storm of 2022? And what about the thousands of stranded passengers in dismay during the holidays, with plans and gifts that literally couldn’t get off the ground?

GitOps the Planet #14: Building Open Source Communities with Itay Shakury

Itay is the VP Open Source at Aqua Security and CNCF Ambassador. In this GitOps the Planet, we'll discuss open source, dev advocacy, community and how we approach these open source roles. Open source lives at the intersection of community and business, striking the right balance and tone is critical to having a sustainable project with strong community buy-in to serve as the foundation for successful businesses. Come hear all about it!

How our product team use Catalog

We recently introduced Catalog: the connected map of everything in your organization. In the process of building Catalog as a feature, we’ve also been building out the content of our own catalog. We'd flipped on the feature flag to give ourselves early access, and as we went along, we used this to test out the various features that Catalog powers.

Services are not special: Why Catalog is not just another service catalog

As you may have already seen, we’ve recently released a Catalog feature at incident.io. While designing and building it, we took an approach that’s a tangible departure from a traditional service catalog. Here’s how we’re different, and why.

35 Best Cloud Monitoring Tools (Updated By Category)

The purpose of cloud monitoring is to identify, observe, track, and manage cloud infrastructure components and services. Cloud monitoring helps organizations ensure their services meet customer expectations of performance, availability, and security. Companies also use cloud monitoring to learn how users interact with their business websites, applications, and other digital touchpoints.

Monitoring High Cardinality Metrics

Monitoring is all about data. When you implement a monitoring tool, you have to make sure that the monitoring software can handle data. Today, data flows at high speeds and in large volumes. Data also comes in diverse forms, which increases the complexity of data ingestion. Because of this, monitoring solution providers promote, among others, their data processing capacities. If a monitoring platform can handle large and diverse data that comes in at a high velocity, it becomes a big advantage.

How to Handle Kubernetes Resource Quotas

A containerized approach to software deployment means you can deploy at scale without having to worry about the configuration of each unit. In Kubernetes, clusters do the heavy lifting for you—they’re the pooled resources that run the pods that hold your individual containers. You can divide each cluster by namespace, which allows you to assign nodes (ie the machine resources in a cluster) to different roles or different teams. Resource quotas limit what each namespace can use.

Strengthening Aviation Cybersecurity: Take Flight with Teneo and Akamai Guardicore

In today’s digital landscape, the aviation industry faces increasingly sophisticated cyber threats that can compromise the safety and security of critical systems. To combat these challenges, the Transportation Security Administration (TSA) has implemented new cybersecurity requirements. In this blog post, we’ll explore how Teneo, in collaboration with Akamai Guardicore, can help aviation organizations meet these requirements and strengthen their cybersecurity defenses.

Database Sharding: What is it, and How it Works?

Today’s world runs on data. We are constantly improving our solutions thanks to the plethora of data available to us in the public domain. Our society has seen a behavioral change when it comes to formulating remedies. We are increasingly adopting data-driven decisions, and rightly so. Now, talking about this whole data logic, where do you think this enormous amount of data gets stored? Well, the answer is a database!

How we combined OpenTelemetry traces with Prometheus metrics to build a powerful alerting mechanism

One of the qualities of engineering team excellence is thinking outside the box to find creative solutions to hard problems. It’s our responsibility, as dev leaders, to pass on to the next generations of developers tips and tricks to help them look beyond the surface to solve complex business problems and leverage the power of the open source community, when possible.

Introducing the Mattermost OpenOps sandbox for GenAI

OpenOps is an open source, AI-enhanced chat collaboration sandbox to accelerate the responsible evaluation of generative AI models applied to real-world workflows. Use OpenOps to connect a local Mattermost instance with Microsoft Azure AI, OpenAI, and LLMs from Hugging Face and explore AI with full data control in a multi-user pilot for your team.

The Cost of Upgrading Hundreds of Kubernetes Clusters

At Qovery, we manage hundreds of Kubernetes clusters for our customers on different Cloud Providers. For most non-operational people, it’s hard to understand what it means behind the scene, the amount of work it represents, pitfalls we can encounter, and associated complexity. Our customers are coming for several reasons, but they’re all happy to have Qovery management on the Kubernetes maintenance and upgrade stack. On our side, it’s too many clusters to manage them manually.

Benefits of GitOps in IT app development

Benefits of GitOps in IT monitoring The GitOps model has gained popularity as a software development approach. It enables IT teams to deliver higher-quality software faster and more efficiently. By streamlining and automating the development process, GitOps provides substantial productivity improvements while ensuring comprehensive observability for monitoring and control.

Decoding Logic App Dilemmas: Copying .gdoc files from Google Drive using Azure Logic App

Welcome again to another Decoding Logic App Dilemmas: Solutions for Seamless Integration! This time we selected a different problem but a very common scenario in Enterprise Integration: File transfer. But in this very particular case: How to copy.gdoc files from Google Drive into another place using Azure Logic App?

Strengthen your cloud cyber security with Ubuntu Pro and confidential VMs

In today’s digital landscape, organisations of all sizes have expanded their presence in the cloud. But with this expansion comes a significant increase in the attack surface, making security a top concern. In this blog, we will dive into the exciting world of cloud cyber security, and explore a stronger approach to securing your workloads with the help of Ubuntu.

What are VMware Tools?

Virtualization has become a cornerstone in modern IT infrastructures, allowing businesses to maximize their resources, streamline operations, and improve service delivery. A key player in this domain is VMware, a company that pioneered virtualization technology and continues to drive innovations in this field. One of their most useful offerings is the VMware Tools, an essential software suite for any VMware virtual machine (VM).

Notifications don't let silent disasters crush your dev team

Smart notifications and nudges are table stakes tools for developers looking to streamline their work and stay focused on building improvements. These automatic alerts are key to a more efficient workflow, freeing us from the burden of repetitive, overwhelming, and time critical tasks — aka, toil.

Making the Move to Consolidation: Reducing Sprawl in 2023

For DevOps, 2023 is the year to reduce tool sprawl and start tool consolidation efforts. Sprawl is often seen as a natural result of the flexibility and empowerment of dev teams to choose their own tools, but organizations now understand the need for a single, streamlined system. While flexibility to choose the right tool for the job has enabled teams to move quickly, the result is a complex web of systems and processes to deliver software.

Cloud Expenditure - A Storm is Brewing

Expenditure on cloud computing services reached a mammoth 225 billion dollars in 2022. Companies start their cloud-native journeys with the best intentions and consume the many benefits including: But current cloud expenditure growth levels are unsustainable for many organizations and with 82% of organizations investing in FinOps staff it shows that cloud expenditure is top of mind in the c-suite.

Solving the top 7 challenges of ML model development with CircleCI

Amid an AI boom and developing research, machine learning (ML) models such as OpenAI’s ChatGPT and Midjourney’s generative text-to-image model have radically shifted the natural language processing (NLP) and image processing landscape. Due to this new and powerful technology, developing and deploying ML models has quickly become the new frontier for software development.

Machine Learning Made Simple - Civo Navigate NA 2022

Josh Mesout explores the complexities and challenges of adopting machine learning and artificial intelligence (AI). He discusses the struggle to embrace and understand these technologies, leading to a high failure rate. Mesout highlights the significant time spent on infrastructure engineering and the need for expertise across various disciplines. He addresses the difficulty in justifying ROI and the risks associated with machine learning. Civo introduces KubeFlow as a service to simplify machine learning, including lower pricing points, GPU Edge box, and partnerships.

Mattermost Pro Tips: Optimizing channel headers in Mattermost

Channels are at the core of how teams collaborate in Mattermost. While team conversations take center stage, every channel is packed with additional features to help you stay in sync. Today, let’s take a closer look at channel headers, and how you can use them to help your team use Mattermost channels more effectively.

Should I Stay or Should I Go? Get smarter about your refresh cycles

Deciding what to migrate, what to modernize, and what to retain on-premises is part of enterprise IT infrastructure management. When a refresh cycle is up in your data center, there are two very different types of competing motions you need to evaluate. While they may appear to be independent, they’re also kind of not, so it can be tricky to decide which one to execute—or even to execute both—and to do so smoothly.

Automated Password Resets: The Effortless Way to Get Employees Back Online

The password reset just might be the most notorious high-volume, repetitive IT ticket ever. Who actually remembers passwords, anyway? Considering just about everything done online requires some sort of login with a unique username and password, remembering all those individual combinations of letters, numbers, and special characters isn’t easy! And so employees turn to IT for what can be nonstop help.

Azure Incident Management with Escalation Policy

These days, businesses heavily rely on cloud services like Microsoft Azure to power their operations. While Azure provides robust infrastructure and services, occasional issues and incidents can still occur. Serverless360 provides enhanced capabilities to monitor and manage Azure incidents in a system. But to ensure seamless operations and timely resolution of problems, it is crucial to have a well-defined escalation policy in place for Azure Incident Management..

Monitoring with Graphite: Architecture and Concepts

In this article, we provide a concise guide to help you get started with Graphite quickly and efficiently. We cover the basic concepts, architectural considerations, and metrics aggregation of Graphite. We also explain the data feeding methods, metrics format, and storage using Graphite's file-based database. Additionally, we discuss visualization options, including Graphite-Web and Grafana.

Canonical Joins Eclipse Adoptium Working Group to Strengthen Commitment to Open Source Java Runtimes

Canonical, the company behind Ubuntu, is thrilled to announce its membership of the Eclipse Adoptium Working Group. As an esteemed project under the Eclipse Foundation, the Adoptium Working Group brings together renowned OpenJDK builders and distributors such as Alibaba, Azul, Huawei, IBM, Microsoft, Red Hat, Rivos, and, most recently, Google.

The Spot for FinOps: Accelerating customers' FinOps journey with enhanced insights, efficiency and optimization

In an uncertain and turbulent economy, organizations have made it a critical priority to ensure they are managing cloud spend to stay within their cloud budgets and efficiently optimize that spend while leveraging the cloud to achieve business growth.

Cloudify 7 Goes Native

Kubernetes has revolutionized the management of containerized applications, but what about non-Kubernetes resources? Can Kubernetes extend its capabilities to encompass those as well? Cloudify, known for its ability to fit into highly distributed and heterogeneous environments, is making a significant stride in this direction with the release of Cloudify 7. In this blog, we explore how Cloudify brings its powerful capabilities natively into the Kubernetes ecosystem.

Densify Named a Market Leader in GigaOm Radar Report for Cloud Resource Optimization

June 27, 2023 We were excited to learn last week that GigaOm named Densify as both a Leader and an “Outperformer” in its new report “Radar for Cloud Resource Optimization”. This was particularly meaningful to us for a few reasons.

Top 8 Tools to Build Your Own PaaS

Building your own PaaS (Platform as a Service) can revolutionize the way you deploy and manage applications. One of the key advantages of a custom PaaS solution is its ability to streamline the complete application life cycle. With a well-designed PaaS environment, developers can easily package their applications, define dependencies, and deploy them seamlessly across various cloud environments. This simplifies the deployment process, reduces time-to-market, and ensures consistent application delivery.

What is Azure Data Lake? An In-depth Understanding

Azure is Microsoft’s flagship cloud computing service, providing a host of capabilities and features to enable businesses to operate and thrive in the digital age. One of these offerings, Azure Data Lake, stands as a pivotal resource for organizations that process massive volumes of data. But what exactly is Azure Data Lake?

Things To Know About AZ-900: Microsoft Azure Fundamentals Exam Prep 2023

In the ever-evolving landscape of technology, cloud computing has become a vital component for businesses of all sizes. Microsoft Azure, one of the leading cloud platforms, offers various services to enable organizations to build, deploy, and manage applications efficiently. To establish a solid foundation in Azure, individuals often pursue the AZ-900: Microsoft Azure Fundamentals certification and utilize the az 900 dumps for preparation. If you plan to take the AZ-900 exam in 2023, here are some essential things to know about exam preparation.
Sponsored Post

Squadcast's Improved Mobile App for Better Incident Response

The 2020 pandemic has definitely changed the way teams operate across the globe. Many of you may have already experienced moving from 100% office work to 100% remote work, and now that it has been almost three years since the pandemic started many of us have resorted to hybrid models. We at Squadcast value the importance of efficient communication, reaching the right people during a crisis, and the freedom to resolve critical incidents from anywhere, anytime. Keeping that in mind, we have made major improvements to our mobile app to help you effectively partake in Incident Response activities anytime from across the globe.

Anomaly Detection With Graphite

Graphite is used by many organizations to track and visualize various metrics that their applications or servers send out. But what happens if there are too many of these metrics or the company doesn't want to use its human resources to monitor the behaviour of metrics constantly? In this article, we will use Hosted Graphite by MetricFire to learn about Graphite's ability to notify users about the abnormal behaviour of services or infrastructure in a timely manner.

Reduce Cloud Spend With Engineering-Led Optimization - Not Just Discount Hunting

CloudZero’s research has determined that as many as 60% of SaaS business leaders feel their cloud spend is higher than it should be. Considering cloud spend is a dominant portion of a SaaS company’s operating costs, unexpectedly high cloud bills can be a significant problem. While many SaaS leaders use discount plans to stem the bleeding, we believe the better solution lies with giving your engineers the tools to track and optimize costs as they build.

One Cluster to Rule Them All

Reviewing the Current State of Infrastructure as Code (IaC), its Challenges, the Emergence of Crossplane, Adoption Difficulties, and the Road Ahead! Infrastructure as code (IaC) has become an indispensable practice for managing and deploying cloud-native applications. By defining infrastructure through code, developers can efficiently and consistently manage their infrastructure. In this post, we’ll delve into the state of IaC, the problems it poses, and the new approach offered by Crossplane.

OpenTelemetry .NET Distributed Tracing - A Developer's Guide

Modern applications are becoming increasingly distributed due to a wide range of benefits including enhanced scalability, high availability, fault tolerance, and better geographical distribution. But it also makes the overall system complex making it challenging to understand how they function internally. Distributed tracing helps to address it by tracking how requests flow through various system components with detailed insights.

Cloudify VS Code Extension

In this blog, we’ll run through the new features of Cloudify’s VS Code extension and how developers can use it to write better and more consistent blueprints. This will ultimately improve the overall user experience. VS Code is a cross-platform text editor created by Microsoft. Developers can use VS Code as an Integrated Development Environment (IDE) for just about any language. Part of VS Code’s appeal is in the ease of developing extensions, which can expand its applications.

Enforcing Policy as Code with Cloudify, Terraform, and Open Policy Agent

In my previous article, I provided an example of using Cloudify’s native REST plugin to send a policy evaluation request to an Open Policy Agent (OPA) service. While dispatching requests to an upstream OPA endpoint is a great way to integrate policy enforcement throughout an environment blueprint, Cloudify has also been working toward native integration of OPA throughout our ecosystem.

The Essential Kubectl Commands: Handy Cheat Sheet

As Kubernetes continues to gain popularity as a container orchestration system, mastering its command-line interface becomes increasingly vital for DevOps engineers and developers alike. Kubectl, the Kubernetes command-line tool, is an essential component in managing and deploying applications in a Kubernetes cluster. This tool allows you to interact directly with the Kubernetes API server and control the state of your cluster.

The Importance of Pure Open-Source Kubernetes

In a short time, the open-source ecosystem has evolved from niche projects with limited corporate backing to the de facto way to build software. Today, organizations large and small are adopting open-source software to accelerate product development and innovation. In the government sector, the U.S. Department of Defense issued a memorandum on adopting open source software as its preference versus proprietary software, calling open-source “critical in delivering software faster.”

Guide on migrating VMware VMs to Microsoft Azure

With the surge in digitization, the concept of cloud migration has become a fundamental reality for many organizations. VMware, a widely accepted leader in server virtualization, has enabled many businesses to take advantage of virtual machines’ benefits. However, as businesses evolve, so do their requirements. This often leads to the need for moving these VMware-based virtual machines to more flexible and scalable platforms like Microsoft Azure.

Mocking API requests with Mirage

Building full-stack applications can be challenging, especially when developing the backend and frontend at the same time. In this scenario, frontend teams may have to wait for the backend team to finish building an API before they implement. This is where Mirage.js comes in. In this tutorial, you will explore how to use Mirage.js in frontend applications and mock backend requests for services that have not yet been developed.

Transformations in network technology

Over the past five years, enterprise networking has undergone a significant transformation driven by advancements in technology, the rise of cloud and SaaS applications, the decentralization of the workforce, and the need for agility, scalability, and cost mitigation. These factors have led organizations to shift from on-premise network management systems (NMS) to cloud-managed networking platforms and to adopt technologies like Software-Defined Wide Area Networking (SD-WAN).

Disrupting the Status Quo with Digital Wallets

There’s no shortage of innovation in the financial services industry. Financial institutions have always placed a high value on innovation, as demonstrated by their willingness to fund technology-led initiatives. According to Gartner® Research Inc., “Global enterprise IT spending in the banking and investment services market is forecast to increase by 7.7% in 2023 to $666.5 billion in constant US dollars.

How I Learned to Stop Fearing Blueprints and Love cfy-lint

Writing a blueprint might be one of the hardest tasks for new or experienced users, so why would you punish yourself by writing a blueprint the old way? Cloudify’s cfy-lint tool makes writing new blueprints or improving existing ones easier. In this article, I’ll explain some of the errors cfy-lint can identify and how to fix errors automatically.

Bitrix24 + Squadcast Integration: Simplifying Alert Routing

Bitrix24 is a cloud-based business management and collaboration platform that provides a suite of tools for managing various business processes. If you use Bitrix24 for your collaboration and CRM requirements, you can integrate it with Squadcast, an end-to-end Incident Response tool, to route alerts such as creating a lead on Bitrix24 CRM or creating a task in Bitrix24 to Squadcast. ‍

AWS Instance Types Explained: When To Use Each

You might wonder how companies using Amazon Web Services waste more than $10 billion a year. It’s easy to ask, “why don’t they just reduce their spending?” Well, it’s because there's more to it than that. AWS offers a staggering amount of options — over 200 different services, for example. Among those, Amazon Elastic Compute Cloud (EC2) provides a further 300 AWS instance types spread over five unique instance families.

Without guardrails, engineering teams head for a deadly crash

Every team has guardrails, whether you recognize them or not. They’re a form of automation that can have significant impact on your software development process and the people doing the work. They’re another way to give toil the boot and keep developers in the flow. We’ve made the case for engineering automation in a previous article; here’s how guardrails as automations ensure that agreed upon boundaries and ways of working are codified into team processes.

Kubeflow vs MLFlow: which one to choose?

Data scientists and machine learning engineers are often looking for tools that could ease their work. Kubeflow and MLFlow are two of the most popular open-source tools in the machine learning operations (MLOps) space. They are often considered when kickstarting a new AI/ML initiative, so comparisons between them are not surprising. This blog covers a very controversial topic, answering a question that many people from the industry have: Kubeflow vs MLFlow: Which one is better?

Deploy AWS spot instances with Elastigroup

AWS spot instances represent AWS’s excess capacity, available for any surge in customer demand. To offset the loss of idle infrastructure, AWS offers this excess capacity at a massive discount to drive usage. With up to 90% in savings when compared to on-demand pricing, spot instance pricing is an affordable option for organizations looking to significantly reduce their cloud bills. One of the challenges with spot instances, however, is that they can disappear at a moment’s notice.

Starting with the Right Foundations - The Cortex Engineering Maturity Curve

The path to engineering excellence has no shortage of tooling for improving developer experience. But what has been missing is an understanding of where to begin. Developed from hundreds of engineering team conversations, the Cortex Engineering Maturity Curve has become a trusted guide for IDP evaluation and onboarding—meeting customers where they’re at for faster time to value.

How to Create a Runbook Template for DevOps (With Examples)

A DevOps runbook is a little like a recipe book. Instead of rules for cooking, it’s a compilation of rules and procedures designed to maintain software systems and other applications. The purpose of each runbook is to cross-educate your entire team with the same knowledge base and provide easy-to-follow instructions in time-sensitive situations like incidents. Runbook templates are guides outlining a standard for the documentation of operations and development.

Qovery is a G2 Momentum Leader for 2023

On top of being named a High Performer in the G2 Reports 6 times in a row in our category and earning the User Loves US badge every quarter, we have achieved a new milestone by being named Momentum Leader for 2023 in the G2 Reports! We are also grateful for our users’ continued support, resulting in us receiving a 4.8/5 stars rating.

Decoding Logic App Dilemmas: How to Recurrence Trigger a Logic App at different hours and minutes?

Welcome again to another Decoding Logic App Dilemmas: Solutions for Seamless Integration! This time we will address another widespread problem which is to initiate the workflow at a different timeframe during the day or week with the same Azure Logic App Recurrence Trigger.

Endtest + Squadcast Integration: Alert Routing Made Easy

Endtest is a low code test automation platform enabling organizations to efficiently build automated end-to-end tests for web and mobile applications. If you use Endtest for your test automation requirements, you can integrate it with Squadcast, an end-to-end Incident Response tool, to route detailed alerts from Endtest to the right users in Squadcast.

The Carbon Daemons: Graphite monitoring

Graphite is a powerful open-source time series database used for storing, retrieving, and visualizing changing numeric data points over time. With its robust monitoring system, Graphite can efficiently handle large data loads without compromising performance. In this article, we delve into the basics of Graphite, focusing on its primary component, Carbon.

What is Azure Service Bus?

In the realm of cloud computing, communication and integration form the backbone of any robust architecture. With the exponential rise in distributed systems, the need for a reliable, scalable, and efficient message delivery system is more pertinent than ever. This is where Azure Service Bus, a cloud-based messaging service provided by Microsoft, becomes a game-changer.

Closer to the edge: what a locally national infrastructure can do for you

Edge computing is defined by bringing compute resources out of remote, centralised facilities and putting them at the source of the data itself. Processing and analysis is done where the data is actually generated. The performance and cost improvements that edge computing delivers are based on this proximity. By situating our data centres close to major populations, we have delivered these benefits to many UK businesses. It is an inherently ‘local’ idea.

Resolve Actions PRO - Network Ready for Service Checks

Discover how Resolve's customers are using Resolve Actions PRO to completely automate the request for service checks when delivering new network services to their clients. Request for Service Checks are typically performed by the Telco or Communication Service Provider AFTER their network configuration team have provisioned the requested network circuit, but BEFORE it is released to the paying business or client.

Open Source MLOps on AWS

With the rise of generative AI, enterprises are growing their AI budgets, looking for options to quickly set up the infrastructure and run the entire machine learning cycle. Cloud providers like AWS are often preferred to kick-start AI/ML projects as they offer the computing power to experiment without long-term commitments. Starting on the cloud takes away the burden of computing power, reducing start-up time and cost and allowing teams to iterate more quickly.

Ocean CD is now available: Control Kubernetes application changes with reliable continuous delivery automation

In the beginning, cloud cost savings were the focus for Spot. As we grew, our customers helped us understand that cloud cost reduction is just one of the many challenges they face when operating in the public cloud. Spot by NetApp has since invested in and developed multiple solutions that can promote FinOps best practices and equip DevOps with comprehensive infrastructure automation and optimization solutions for VMs and containers.

Ocean CD from Beta to Availability: 12 months of valuable customer feedback

As part of the Ocean CD GA release, we took some time to reflect. Ocean CD beta version was released a year ago with a plan to focus on progressive deployment strategies (Canary and Blue-Green deployments). The curiosity and eagerness Ocean CD created among the Spot by NetApp community helped advance its development and made it clear that our customers need a solution that meets their requirements.

Enterprise businesses that adopt Database DevOps save an average of $4.3M per year

If treated well, the database can be a major accelerator in your business’s efficiency. It can be the star performer in your migration to the cloud, in your move to micro services and other change initiatives. If the right factors aren’t in place, though, the database can become a business risk. You could be at risk of losing new and existing customers to the competition due to poor UX, downtime or outages. It can also increase your vulnerability to data breaches. Find out how the database can be the hero in your digital transformation or change initiative.

GitOps the Planet #13: eBPF - what's all the buzz about with Liz Rice

Liz Rice has a knack for predicting the future of DevOps and she's all a buzz about eBPF, a revolutionary technology to dynamically program kernels for networking, observability, tracing, and security. The technology is driving a lot of excitement but what does the ability to hook into the kernel really give us and how is it changing software delivery? Join this exploratory session of GitOps the Planet with Liz Rice to find out!

FireHydrant Private Incidents & Runbooks: more control for you, more security for your customers

Ensuring the privacy and security of sensitive information is crucial no matter your company's size or industry. So when an incident comes up that includes sensitive information — Personal Identifiable Information (PII), financial data, accidental data breaches, or legal matters requiring privileged communication — your response process might need a higher level of security and discretion.

AIOps and ITPA: 7 Steps for Using Automation to Prevent Credit Card Fraud

Incident response is one of the most prevalent, time-consuming, and challenging processes in an already complex IT environment. At the height of digital transformation and organizational strategy, businesses are craving success and growth during a time when next to nothing seems certain.

Faster Developer Onboarding in Multi-Repos with GitKraken Client

Welcome to our new Everyday Use Case series where we dive into some of the real-world workflows for GitKraken Workspaces. Our goal is to show you practical ways to make routine tasks faster and simpler, starting today with a scenario every development team encounters (and needs to get right): onboarding a new developer.

Government Risk Management: How Agencies Balance the Risks vs. Benefits of Digital Transformation

Digital transformation is happening all around us: for every business sector, across every type of organization. For government agencies, keeping up with digital transformation is riskier due to the large number of legacy systems still in use. Government risk management and digital transformation go hand-in-hand.

Webinar: Your IDP Playbook - Best Practices for Internal Developer Portals

Developer experience and productivity are top-of-mind this year as organizations sharpen a focus on engineering efficiency. In a bid to become the central hub for developer interactions, internal developer portals (IDPs) have landed on the short list of priorities for engineering teams in every industry. But with just a few years on the shelf, many IDP programs are beginning to fail or flail. Why?

Demystified Service Mesh Capabilities for Developers

Service Meshes have been gaining a lot of popularity lately, more so amongst Spring and Java developers who wish to address cross cutting concerns. But, are you wondering what exactly are Service Meshes? What are some of the popular types out there? And most importantly, what kind of problems do they actually solve? Well, look no further! This blog is here to provide you with the answers you seek.

2bcloud Achieves AWS DevOps Competency, Demonstrating Exceptional Cloud Operations Expertise

2bcloud announces that it has achieved the AWS DevOps Competency designation from Amazon Web Services (AWS). This prestigious recognition validates 2bcloud's deep expertise in cloud operations and its commitment to delivering exceptional DevOps solutions to customers.

Monitoring Your IoT Devices Using Mosquitto and Graphite

Monitoring IoT devices is a very important process for analyzing their behavior and ensuring their performance. You need to choose the right monitoring tools to effectively collect and analyze metrics. In this article, we will learn how to monitor your IoT devices using Mosquitto and Graphite. You will also find out what benefits you can get using a Hosted Graphite solution from MetricFire. Check out MetricFire’s free trial to test all the features it provides.

Azure Storage Queue vs Service Bus

Azure is a cloud computing service created by Microsoft to help businesses tackle challenges and build solutions through a comprehensive suite of cloud services. It offers a wide range of integrated cloud services and functionalities such as analytics, computing, database, mobile, networking, storage, and web, allowing developers to pick and choose from these services to develop and scale new applications, or run existing applications, in the public cloud.

Pepperdata with Ash Munshi and Kirk Lewis: AWS Startup Showcase, Season 3, Episode 2

Hosted by SiliconAngle and theCUBE, Pepperdata CEO Ash Munshi walks through the history of Pepperdata as well as the importance of cloud cost optimization in the world of cloud computing. Also, Senior Solution Architect Kirk Lewis gives a demo of our two solutions: Capacity Optimizer Classic—which is designed for DevOps—and Capacity Optimizer Next Gen, which focuses on the financial side of optimizing the cloud.

Addressing the dynamic incident communication challenges of the enterprise with CommsFlow

At enterprise scale, effective flow of incident awareness requires sharing many distinct pieces of information with many unique stakeholders serving different roles in the organization at precise moments in time. The creation of these dynamic communications and their delivery is constantly put to the test by the pressure of knowing that for every minute the incident is allowed to persist, potentially hundreds or thousands of customer businesses are being harmed.

Netreo How To: Troubleshooting Configuration Backup Issues

Self-service can be a point of contention when it comes to certain industries, products and customer groups. Not everyone has the time or inclination for any type of DIY automobile fix, for example. Conversely, time is always of the essence when it comes to ensuring the real-time performance of business technology solutions. Therefore, many IT pros, especially those in network management, are more than willing to do it themselves.

Built for Multi-cloud Fleet Management

As the latest surveys show, organizations are struggling to manage multiple clouds and to realize the expected benefits of moving to the cloud. In the Flexera 2023 State of the Cloud Report, for example, enterprises cited managing cloud spend and managing multi-cloud environments as their top cloud challenges. The root of these problems can be traced to cloud and cluster sprawl and the complexity of managing Kubernetes.

The State of CloudOps in 2023: Driving success with cloud automation

Modern businesses are rapidly expanding their use of public cloud for an ever-growing list of applications and services. But as more cloud-focused solutions are thrown into the mix, the more complex things get for enterprises. Every cloud has its rules, tools, and processes, but businesses often struggle to fill their teams with specialists for one cloud provider, let alone multiple.

Introduction to SBOMs - What is it and do I need one? - Cloudsmith's Unpacked Conference 2023

Software Bill of Materials (SBOM) are new and exciting, but what do they actually do and do you REALLY need one? If you read any security news lately, it seems like everyone is talking about how an SBOM can solve whatever problem they have, and they are years into their SBOM journey. But many of us don’t even know what they are.

Overcoming Complexity and Cost - Cloudsmith's Unpacked Conference 2023

“Overcoming Complexity and Cost” will delve into the challenges faced by software developers in managing complexity and reducing costs during the software development lifecycle. We will bring together industry experts to explore strategies, best practices, and emerging technologies that can empower developers to tackle these complex problems. Featuring: Mel Kaulfuss, Staff Developer Advocate, Buildkite Shanea Leven, Founder & CEO, CodeSee Tamara Miner, Principal Strategy Consultant, Pragma Moderated by Dan McKinney, Technical Account Manager, Cloudsmith.

Real World Strategies for Securing the Software Supply Chain - Cloudsmith's Unpacked Conference 2023

While "secure software supply chain" can feel like a buzzword, the past 18 months have shown companies, open-source communities, and vendors making significant progress toward making it a reality. In this panel discussion, real-world practitioners will share their insights and experiences in securing the software supply chain. The panelists will cover a range of topics, from best practices in vulnerability management, risk assessment of open-source dependencies, and generating authenticated provenance, to the challenges of integrating security into the DevOps workflow. They will provide actionable strategies for improving security while maintaining development speed, and share real-world examples of how their organizations have successfully secured their software supply chains.

Monitoring Real-Time Stock Quotes with MetricFire

In the ever-evolving stock market landscape, immediate access to accurate information is crucial for investors and financial experts alike. In this piece, titled "Monitoring Real-Time Stock Quotes with MetricFire," we dive deep into the realm of advanced technology, focusing on its potential to transform stock market tracking and decision-making procedures.

Fleet: Multi-Cluster Deployment with the Help of External Secrets

Fleet, also known as “Continuous Delivery” in Rancher, deploys application workloads across multiple clusters. However, most applications need configuration and credentials. In Kubernetes, we store confidential information in secrets. For Fleet’s deployments to work on downstream clusters, we need to create these secrets on the downstream clusters themselves.

Cloud Native Security for the Rest of Us

Your mission is to secure the vast tracts of land of the cloud native security landscape. Where do you even start?!? It would be preposterous to cover that whole topic in a single session, but we can at least map it out. Our plan is to break it down into three key areas and review each in turn. You’ll leave this session with a stronger understanding of the breadth and depth of cloud native security and resources to further develop your knowledge.

Logic App Best Practices, Tips, and Tricks: #34 How to validate JSON messages

In the last three blog posts, we explain how to validate null inside Logic App and specifying json schema elements/properties and perform JSON Schema restrictions in Logic Apps. Today and to finish, at least for now this topic, I will speak about another best practice, Tips and Tricks that you must consider while designing your business processes (Logic Apps): Validating JSON messages against schema in Logic Apps.

ManageEngine joins Android Enterprise Partner Program for advanced mobile device management solutions

We are excited to announce that ManageEngine Mobile Device Manager Plus is now an Android Enterprise validated Silver partner, marking a significant milestone in our commitment to delivering an exceptional mobile device management solution. As an Android Enterprise Silver partner, we offer a comprehensive feature set aligned with Android Enterprise’s best practices, empowering organizations to secure, manage, and deploy Android devices efficiently.

Azure Integration with Graphite and Grafana

In this article, we will see how we can integrate an Azure data source with Graphite and Grafana. This will allow us to monitor metrics from the applications hosted in the Azure cloud on a Grafana dashboard. We will also see how to integrate Azure Active Directory with MetricFire’s Hosted Graphite and Grafana. You don’t need fully functional cloud services running with Azure to understand this article, but it assumes that you have basic familiarity with Azure Cloud.

Ocean CD is now generally available: Control Kubernetes application changes with reliable continuous delivery automation

In the beginning, cloud cost savings were the focus for Spot. As we grew, our customers helped us understand that cloud cost reduction is just one of the many challenges they face when operating in the public cloud. Spot by NetApp has since invested in and developed multiple solutions that can promote FinOps best practices and equip DevOps with comprehensive infrastructure automation and optimization solutions for VMs and containers.

Top Trends in DevOps - ChatGPT

The world of DevOps is constantly evolving and adapting to the needs of the software development industry. With the increasing demand for faster and more efficient software delivery, organizations are turning to modern technologies and practices to help them meet these challenges. In a series of articles on the Kublr blog, we will take a look at some of today’s top DevOps trends.

Catchpoint's 2024 SRE Survey Is Here - We Need YOU!

They say imitation is the sincerest form of flattery. In the six years since we launched the initial SRE report, we've seen some similarly themed 'reports' jump on the state of site reliability bandwagon. Why? Because the impact and importance of SRE and resilience engineering have resonated across industries, prompting organizations to delve deeper into this vital domain.

Ep. 3: FinOps for the Rest of Us Featuring Sara Gadallah

In this episode of Cloud Control, host Shon Harris and Sara Gadallah, Principal Cloud FinOps Analyst at Atlassian and a FinOps Foundation Ambassador discuss the role FinOps plays in CloudOps. FinOps is a rapidly transforming landscape that plays a crucial role in driving business growth, efficiency, and transparency. Sara shares her journey into FinOps, the practices of FinOps, and how collaboration between different teams is essential in taking informed decisions on cloud cost optimizations.

The Process Automation Dream Team of RPA and ITPA

Robotic Process Automation (RPA) and IT Process Automation (ITPA) are today’s big drivers of revolutionizing the way businesses operate – and they’re nowhere near finished. While RPA and ITPA have their significant differences, they share just enough similarities to have successfully helped organizations in multiple industries automate processes, reduce costs, improve accuracy, and deliver better customer experiences.

Logic App Best Practices, Tips, and Tricks: #33 Specifying JSON Schema restrictions

In the last two blog posts, we explain how to specify nullable and required elements/properties inside our JSON messages. Today we will continue on the same topic, JSON Schemas. This time I will speak about another Best practice, Tips, and Tricks that you must consider while designing your business processes (Logic Apps): Specifying JSON Schema restrictions.

Data security at scale: How IT modernization impacts cybersecurity and data access for the U.S. Department of Defense

As more and more of the public sector enact large-scale digital transformation initiatives, government organizations must find new ways to manage massive amounts of data securely while maintaining compliance. With new mandates from the Biden administration to enhance cybersecurity best practices in both the private and public sectors, organizations like the Department of Defense (DoD) face new challenges to their data management and communication practices.

The "people problem" of incident management

Managing incidents is already tricky enough, and you want to get to mitigation as quickly as possible. But sometimes it feels like organizing everything surrounding an incident is more difficult than solving the actual technical problem and you end up getting delayed or sidetracked during mitigation efforts. We call that scenario the “people problem” of incident management.

Ep. 4: FinOps for the Rest of Us Featuring Sara Gadallah

On this episode, Shon Harris talks with Sara Gadallah, Principal Cloud FinOps Analyst at Atlassian, to discuss the role FinOps plays in Cloud Ops. FinOps is a rapidly transforming landscape that plays a crucial role in driving business growth, efficiency, and transparency. Sara shares her journey into FinOps, the practices of FinOps, and how collaboration between different teams is essential in taking informed decisions on cloud cost optimizations. They also discuss the importance of continuous collaboration and education, the culture change needed to drive engineers to see cost as another operational metric, and the alignment of FinOps and data security.

Reduce cycle time with effective pull requests

A pull request (PR) is (quite literally) a request to pull a change into a project’s code or documentation. It is a popular change management process supported by many VCS providers including GitHub, GitLab, Bitbucket, Codeberg, and others. Typically these come with features to track open pull requests, tools to assist in reviewing the changes, the ability to approve—or reject—PRs, and finally to merge approved PRs.

How Jackpocket scaled to 220% more software deploys a week

How Jackpocket scaled to 220% more software deploys a week. Check out how Sleuth helps lottery app Jackpocket scale, adopt a DevOps culture, and improve rollbacks by 220 percent. Key moments: Give Sleuth a try and see how we empower software teams to build faster by making engineering efficiency easy to improve and measurable — in a way that both managers and developers love.

Squadcast Named Category Leader in IT Alerting by G2 | Squadcast

🚀Squadcast has been recognized by G2 as a Category Leader in the IT Alerting category! Backed by immense customer love, advanced features, and the highest possible scores 💯— Squadcast has made it to the Leader Quadrant! This video offers all the related updates!

Protocol analyzer: What is it, and why does your organization need one?

IT admins are expected to keep the organization’s network reliable and resilient all while the complexity of today’s networks grows. From adopting hybrid infrastructures and maintaining multi-cloud environments’ security to managing ever-increasing bandwidth demands, enterprise network management is getting more difficult by day.

Tuning a real-time kernel

This blog expands our technical deep-dive into a real-time kernel. You will need to be familiar with a real-time kernel to understand the tuning concepts in this blog. If you are starting from scratch and need to revisit the basics of preemption and a real-time system, watch this introductory webinar. If you are interested in the primary test suites for real-time Ubuntu, an explanation of the components and processes involved, head over to the first part of this mini-series.

Differences between snapshot with memory and without memory

In the realm of virtualization, snapshots play an integral role in managing virtual machines (VMs). Essentially, a snapshot captures the state of a VM at a specific point in time, providing a reference point to which you can revert if necessary. This can be especially handy when implementing changes to your VM or its applications, allowing you to quickly undo the changes if they cause any unforeseen issues.

Top 5 cloud security risks

Cloud security is a constant concern and tends to revolve around common themes - how do you give intended users access to the data and systems their clearance allows, while maintaining a good user experience; and how do you keep unintended users or malicious bots out? In the entanglement of systems, services, and applications that make up a modern IT infrastructure, this is a lot harder to balance in practice than it is on paper.

HA Kubernetes Monitoring using Prometheus and Thanos

In this article, we will deploy a clustered Prometheus setup that integrates Thanos. It is resilient against node failures and ensures appropriate data archiving. The setup is also scalable. It can span multiple Kubernetes clusters under the same monitoring umbrella. Finally, we will visualize and monitor all our data in accessible and beautiful Grafana dashboards.

9 Tips to Maximize Data Center Efficiency

Did you know that data centers are some of the most energy-intensive buildings? They consume 10 to 50 times the energy per floor space of a typical office building. As governments, industry regulators, and customers demand more energy efficient data centers, data center managers are tasked to comply with corporate sustainability initiatives by finding new ways to innovate and reduce energy consumption.

9 IT Documentation Best Practices for 2023

What separates successful IT teams from unsuccessful ones is the quality of their documentation. Without proper documentation, your technicians are likely to spend too much time searching for the information they need to perform tasks and resolve issues. They may make errors or respond to issues belatedly, which could impact service levels. Successful organizations ensure their documentation is always well structured, organized, accurate and up to date.

Logic App Best Practices, Tips, and Tricks: #32 Specifying JSON Schema required elements

In the last post, we explain how to specify nullable elements inside our JSON. Today we will continue on the same topic, JSON Schema. This time I will speak about another Best practice, Tips, and Tricks that you must consider while designing your business processes (Logic Apps): Specifying JSON Schema required elements.

Azure Automation Costs Explained

In today’s digital landscape, automation plays a crucial role in streamlining operations and improving efficiency within IT. One popular automation solution is Azure Automation, offered by Microsoft’s Azure cloud platform. But how much does Azure Automation cost? Is an Azure Automation Account free? In this blog post, we will delve into the cost structure of Azure Automation, explore where the costs lie and put the costs of Azure Automation into context.

Why eBPF is Poised to Revolutionize Kubernetes [Without Anyone Noticing]

Have you heard about eBPF? It’s the technology that’s set to transform the Kubernetes landscape. In this article, we’ll explore what eBPF is and why it’s poised to become the next big thing in Kubernetes. But here’s the catch – despite its game-changing potential, it seems that few people are truly aware of its impact. Let’s delve into the details and discover why you should care.

Scaling Kubernetes on AWS: Everything You Need to Know

Kubernetes has emerged as the go-to platform for container orchestration, empowering organizations to efficiently deploy and manage applications at scale. As the demands on applications continue to grow, scaling Kubernetes becomes essential to ensure high availability, optimal performance, and seamless expansion. Today, we will delve into the intricacies of scaling Kubernetes on AWS, exploring best practices, popular tools, performance optimization strategies, cost considerations, and future trends.

What Is A Time-Series Metric?

Today, businesses and organizations rely heavily on metrics and analytics to make informed decisions. Metrics are important whether you’re a developer, a marketer, or the head of a company. One type of metric that is widely used is a time-series metric. Time-series metrics provide insights into how data changes over time. With time-series data, businesses can track trends, detect anomalies, and make predictions.

The case for engineering automation

When you survey developers on how to improve engineering practices and their daily job experience, their answers invariably include getting rid of little annoying things - what's called toil. Toil is manual and repetitive tasks that waste your time. Toil is arguably worse than crisis, because a crisis is temporary and firefighting can feel rewarding when it's over. Toil is more like a death march - an insidious force that eventually leads to burnout.

PostgreSQL Database Monitoring

PostgreSQL is one of the most popular relational databases on the market today with more than 1.5 billion users. This article will discuss everything you need to know about monitoring PostgreSQL, and how you can use it to optimize your site's data monitoring. If you want to get started right away on PostgreSQL database monitoring with MetricFire, you can book a demo or sign up for the free trial today.

What Is The Rule Of 40 For SaaS? Here's How To Calculate It

Many SaaS businesses emphasize customer acquisition and retention over growing gross margins, especially during the startup and scale-up stages. It makes sense. A company can grow its revenue faster if it acquires and retains more buying customers as opposed to simply selling more to existing customers. Yet, here’s the thing. Revenue growth measures the increase in the amount of money a business takes in from sales.

Kubeflow vs MLFlow

Learn the main differences between the MLOps tools of choice: Kubeflow and MLFlow Started by Google a couple of years ago, Kubeflow is an end-to-end MLOps platform for AI at scale. Canonical has its own distribution, Charmed Kubeflow, which addresses the entire machine-learning lifecycle. Charmed Kubeflow is a suite of tools, such as Notebooks for training, Pipeline for automation, Katib for hyperparameter tuning or KServe for model serving and more. Charmed Kubeflow benefits from a wide range of integrations with other tools such as MLFlow, Spark, Grafana or Prometheus.

Securing open source software with Platform One and Canonical

Our own Devin Breen and Mark Lewis discussed Securing Open Source Software with the Chairman of Iron Bank at USAF Platform One Zachary Burke at AWS Summit Washington, DC. The topic includes: Securing Open Source Software, Secure Minimal Containers, and Software Security Scanning.

Synthetic monitoring as Code with Checkly and ilert

This post will introduce Checkly, the synthetic monitoring solution, and their monitoring as code approach. This guest post was written by Hannes Lenke, the CEO, and co-founder of Checkly. ‍ First, thanks to Birol and the ilert team for the opportunity to introduce Checkly. ilert recently announced discontinuing its uptime monitoring feature and worked with us on an integration to ensure that existing customers could migrate seamlessly. ‍ So, what is monitoring as code and Checkly?

Azure Reservations vs. Savings Plans: What's the difference?

Microsoft launched Azure in 2010 as a direct response to Amazon and Google’s cloud efforts. From humble beginnings as an extension of Windows NT, Azure now supports cutting-edge IT services, including AI/ ML, Big Data, Kubernetes, and more. Recent reports show Microsoft Azure taking more of the cloud market share than ever before. Like AWS and other cloud providers, Azure offers both reservations, for virtual machines and a variety of other services, as well as Savings Plans.

DevOps Self-Service: How Developer Self-Service Eliminates the Things Devs Hate

Developer self-service can sound like a dream: A platform that developers can use to freely develop – unburdened by sprawling IT, tools they shouldn’t need to know how to use, and tickets that take forever to complete. But in DevOps, self-service is becoming a differentiator for organizations with growth goals, widening skill gaps, a need for visibility, or just an appetite for better DevOps efficiency.

Data Tampering: A Comprehensive Guide

In an increasingly interconnected and data-driven world, where information shapes decisions and fuels innovation, the integrity of data has become paramount. However, lurking beneath the surface is a silent threat that can undermine trust, compromise systems, and wreak havoc on organizations: data tampering. In this post, we delve into the realm of data tampering, exploring the vulnerabilities, the reasons behind data tampering practices, and countermeasures against them.

Becoming a Sysadmin Hero: Top 10 Skills You Should Have

Every professional wants to advance in their careers and IT pros are no different. You’ve probably wondered how to do and be more as an IT technician. How do you distinguish yourself from Joe, who sits next to you and is also a jack of all IT trades? How do you go from being a common IT guy to being an IT hero? Let’s look at the top 10 sysadmin essential skills you could learn to boost your career and enhance your salary.

GitOps the Planet #12: Building Argo with Michael Crenshaw

Michael Crenshaw joined the ArgoProj in the last 2 years and has quickly become one of the most active maintainers. In this GitOps the Planet we'll explore what brought him to work on Argo CD, where we see opportunities to improve software delivery, take questions from Argo users, and share what's coming in the next version of Argo CD.
Featured Post

The Top 5 Trends on SRE Leaders' Minds in 2023: Insights from a Seasoned Executive

I've spent most of my career trying to solve big problems for people. In the early days at New Relic, we were trying to help people scale their systems based without compromising on performance, cost, or the customer experience. Not an easy feat but we gave them a solution that allowed them to accomplish their goals. The key was religiously listening to our customers talk about their wants, needs, hopes and fears. While I am rarely the smartest person in the room, which my partner rarely misses a chance to lovingly remind me, I always do my best to listen to what the brilliant folks in my sphere are talking about.

Understanding k3s: Architecture, setup, and uses

If you are looking into the cloud-native world, then the chances of coming across the term “Kubernetes” is high. Kubernetes, also known as K8s, is an open-source system that has the primary responsibility of being a container orchestrator. This has quickly become a lifeline for managing our containerized applications through creating automated deployments.

What's New with VMware ESXi Version 8

In the realm of virtualization and cloud computing, VMware has been a leading name for years, offering robust and innovative solutions to businesses of all sizes. Their products have transformed the way organizations manage their IT infrastructure, enabling them to create flexible, scalable, and secure virtual environments. On March 18, 2023, VMware introduced the latest version of their flagship product, VMware vSphere 8.0.

How CloudZero Closed A $32M Series B Round In The Weakest Funding Environment In Years

CloudZero just closed at $32M Series B fundraising round in the weakest funding environment since the dawn of the pandemic. The round was led by Innovius Capital and Threshold Ventures, with continued support from existing investors Matrix Partners, Underscore VC, and G20 Ventures. CloudZero is a SaaS product, a data-dense platform delivered via the cloud, mostly to other SaaS companies and digital native businesses (DNBs).

New related incidents functionality brings order to the chaos of highly complex incidents

We’ve all been there. You’re working through some rather frustrating blockers during an incident only to discover that you don’t own the dependency at fault. Or, you’ve been pounding away at an issue when a fellow engineer reaches out and asks if your service is affected by some particularly gnarly database failure they’re seeing. But then what? Do you merge efforts and work in parallel or head for a coffee break while the issue gets attacked upstream?

Account Credentialing

In this webinar, we cover how credentialing your AWS Payees and Azure Subscription can give you a deeper reporting tool beyond just cost and billing. How it can unlock Cost Savings, Best Practice Checks, Right Sizing, Resource Inventory and Utilization reports, Security, and Compliance. There are a few ways to go about credentialing, join us as we discuss standard configuration and API based configuration.

Ep. 3: Who's Watching Your Cloud? Featuring Bill Mulligan

Description: In this episode, Shon dives into the thrilling universe of eBPF with expert Bill Mulligan in this episode of the Cloud Control Podcast. Explore eBPF's transformative impact on cloud computing, development environments, and security. Discover its usage from tech giants like Facebook to everyday Android devices. Venture into the open-source journey of Cilium, an eBPF-based project with diverse applications such as multicluster networking and observability.

Workshop: 2023 Kubernetes Troubleshooting Challenge

In April, over 350 tech professionals (and a few pirates) participated in the 2023 StackState Kubernetes Troubleshooting Challenge at KubeCon + CloudNativeCon EU in Amsterdam. It was great to witness so many crewmates using StackState to overcome some of Kubernetes applications' toughest challenges. As a result, we decided to organize a live interactive troubleshooting event in collaboration with the StackState product team.

How we improved testing Ubuntu on WSL - and how you can too!

As the popularity of Windows Subsystem for Linux increases, the Ubuntu development team is committed to delivering a first class experience for Linux developers on Windows. To achieve this we’ve made improvements to our automated testing workflows via the creation of WSL-specific GitHub actions. In this post, Ubuntu WSL engineer Eduard Gómez Escandell talks us through the motivation for this approach and how you can implement these actions for your own CI workflows.

Evolution at the edge: what matters when developing an edge strategy?

The evolution of information technology is governed by how businesses adapt to ever-increasing amounts of data. Those businesses most able to exploit more data, win. Terms such as ‘speed’ and ‘agility’ refer to how a business handles and uses this data. Given the 2.5 quintillion bytes created every day, there is a huge opportunity for businesses to create unassailable leadership.

3 Tips to Improve Your Dockerfile Build time

Building Docker images efficiently is crucial for developers and organizations seeking streamlined development and deployment processes, and it’s a real topic for the 50k developers on Qovery; a few weeks ago, a topic was even open on our forum about it. In this article, we will explore three valuable tips gathered along the way to improve the build time of your Dockerfiles, allowing you to optimize your workflow and save valuable time.

How to Do Kubernetes Multi-cloud and Hybrid Management Right

The latest surveys show that organizations are struggling to manage multi-cloud environments and overcome problems that include cloud cost, complexity, security, and visibility. In the Flexera 2023 State of the Cloud Report, for example, enterprises cited managing cloud spend and managing multi-cloud environments as their top cloud challenges.

Understanding Major Incident Management: Beginners Guide

A major incident represents a critical event that poses a real or potential threat to an information system's confidentiality, integrity, or availability. Major incidents can disrupt normal operations, impact your customers, and may compromise the security of sensitive data.

IPoDWDM: Simplify and Save!

IP over DWDM (IPoDWDM) can have a large impact on the total cost of ownership of a network. Disaggregating the transponder solution, and installing the Digital Coherent Optic (DCO) directly in the router can both simplify the design and provide significant cost savings. With the advent of ZR+ optics, and advances in silicon chip efficiency, IPoDWDM is poised to become the new standard.

Graphite for Node.js Monitoring

In this article, we will look at how to monitor Node.js applications using Graphite and StatsD and plot the visualizations on a Grafana dashboard. Node.js is a popular framework for creating microservices. Its asynchronous nature allows for high scalability and low latency, especially for I/O bound tasks. However, it is important to have a proper monitoring setup for any application which is running in a production environment.

Quickly create performance and regression tests from a Postman collection

Speedscale is a Y-Combinator backed startup that helps Kubernetes engineering teams build more resilient and performant containerized apps. Unlike other tools, we use agents/sidecars to record and playback sanitized traffic that you see in prod. With Speedscale, engineers can simulate production conditions, generate load, and mock third party backends modeled after real traffic patterns.

Kubernetes Simplified: Understanding its Inner Workings

Kubernetes has revolutionized the world of container orchestration, providing organizations with a powerful solution for deploying, managing, and scaling applications. However, the complexity of Kubernetes can be daunting for newcomers. In this blog, we will demystify Kubernetes by breaking down its core components, revealing its operational principles, and guiding you through the process of running a pod.

Monitoring Cisco NX OS metrics with Grafana

In this article, we will explore what Cisco NX OS is and what it is used for. You will find out what metrics are and why it is very important to monitor them. Then, we will look at how to monitor Cisco NX OS metrics with Grafana, a graphical data visualization tool, and how MetricFire can help us with this. In order to learn more about MetricFire, book a demo with our technical specialists or sign up for the MetricFire free trial today.

Understanding VMWare Snapshot Quiescing

Snapshot quiescing, a technique employed in the world of virtualization, stands as a pivotal concept to grasp for anyone involved in IT operations. In particular, when working with VMware, understanding snapshot quiescing can significantly streamline your backup and restore operations. It’s a crucial process that ensures the data on a Virtual Machine (VM) is in a consistent state when a snapshot is taken.

Atlassian DevOps Talks: Fireside Chat with Feature Flag Experts | Atlassian

Join Atlassian and our partner experts as we take a deeper dive into feature flags. We will be discussing use cases, best practices, and management of feature flags. Learn how feature flags help teams avoid buggy product releases while moving faster, reducing risk, and taking a more experimentation-oriented approach to software development.

Demo of Jira Software's CI/CD integration | Atlassian

Integrating your CI/CD tools with Jira Software is one of the easiest things you can do to get more value out of Jira Software for free, whether you’re using Bitbucket Pipelines, GitHub, GitLab, Jenkins, CircleCI, Octopus Deploy or others. Did you know that integrating your CI/CD tools with Jira Software unlocks several highly valuable and free native Jira Software features? During this office hours, we demo and talk through.

Canonical solutions reduce SmartNIC time-to-market and drive efficiency in enterprise data centres

Data centre efficiency is a central cost factor in enterprise IT environments. So, in the face of rising energy costs and increasingly resource-intensive workloads, it is more important than ever for businesses to seek out greater optimisation. Traditionally, CPUs have been used for the majority of data centre workloads, including network related tasks.

Canonical extends its commercial OpenStack offering to small-scale cloud environments with project Sunbeam

June 13, Vancouver, OpenInfra Summit – Canonical today announced the extension of its commercial OpenStack offering to small-scale cloud environments with a new project Sunbeam. The project is 100% open source and is available free-of-charge. Early adopters can also opt-in for comprehensive security coverage and full commercial support under the Ubuntu Pro + Support subscriptions once they complete the deployment themselves.

Predictive Modeling: The Next Big Thing for ITPA, Intelligent Automation

If you had the power to predict the future, how would you use it? Gartner refers to the predictive modeling process as that which collects data, formulates a statistical model, makes predictions, and then validates the model as additional data becomes available. In the world of intelligent automation, teams use predictive modeling to formulate how future outcomes or behaviors will be, by using historical data, machine learning (ML) algorithms, and analytical techniques.

Tanzu Application Platform on the Disconnected Edge

Kubernetes has become the de-facto platform for containerized applications. But it’s a fractured environment and each Kubernetes distribution has their own nuances. Further, much of today’s cloud native software design assumes a healthy Internet connection, which is not always available. What’s missing is a standardized way to deliver applications on top of any Kubernetes, without an Internet connection (also known as air-gapped deployments).

Spot and AWS deliver an integrated deployment experience with CloudCheckr Built-in solution

Spot by NetApp is thrilled to announce its collaboration with Amazon Web Services (AWS) to develop a CloudCheckr with AWS Built-in solution that automatically installs, configures, and integrates with native AWS Cloud Foundational Services across multiple domains, such as identity, governance, security, and operations. As a premier partner of the AWS Built-in program, CloudCheckr is now offered as a turn-key solution that can be deployed quickly and easily through the AWS Marketplace.

Kubernetes Architecture Part 3: Data Plane Components

This Kubernetes Architecture series covers the main components used in Kubernetes and provides an introduction to Kubernetes architecture. After reading these blogs, you’ll have a much deeper understanding of the main reasons for choosing Kubernetes as well as the main components that are involved when you start running applications on Kubernetes.

PromQL Cheat Sheet: A Quick Guide to Prometheus Query Language

Prometheus is an open-source monitoring and alerting toolkit that has gained significant popularity in DevOps and systems monitoring. At the core of Prometheus lies PromQL (Prometheus Query Language), a powerful and flexible query language used to extract valuable insights from the collected metrics. In this guide, we will explore the basics of PromQL and provide query examples for an example use case.

Ep. 3: Who's Watching Your Cloud? Featuring Bill Mulligan

On this episode, Shon dives into the thrilling universe of eBPF with expert Bill Mulligan in this episode of the Cloud Control Podcast. Explore eBPF's transformative impact on cloud computing, development environments, and security. Discover its usage from tech giants like Facebook to everyday Android devices. Venture into the open-source journey of Cilium, an eBPF-based project with diverse applications such as multicluster networking and observability. Find out why Cilium is the go-to CNI for all leading cloud providers.

Container Management: A Closer Look at Rancher Desktop's Settings

Rancher Desktop is equipped with convenient and powerful features that make it stand out as one of the best developer tools and the fastest ways to build and deploy Kubernetes locally. In this blog, we will tackle Rancher Desktop´s functionalities and features to guide you and help you take full advantage of all the benefits of using Rancher Desktop as a container management platform and for running local Kubernetes.

What is DevOps? Practices, impacts, and challenges

Bridging the gap between development and operations has become essential for the cultural shifts seen in organizations today. DevOps allows these concepts to be brought together, creating an influential blend of cultural philosophies, practices, and technological instruments, facilitating a quicker delivery of products and services. Throughout this blog, I will explore how we should all be embracing DevOps to allow our organizations to compete in an ever-changing digital world.

A Guide To Ensuring Profitability For Your SaaS Company

This isn’t the “good old days” anymore. It used to be that cloud companies could pursue growth at all costs and still garner the support of venture capitalists and other investors. In 2023, however, with costs rising and margins getting narrower every day, investors are now favoring companies that can ensure long-term profitability rather than just growth. Now, more than ever before, it’s crucial to drive toward SaaS profitability as the ultimate goal.

Minimising latency in your edge cloud with real-time kernel

From applications in telecommunications to edge cloud and industrial digital twins, experimenting with real-time capabilities in cloud technologies is a trend in the industry. Applications for the edge often have an additional requirement as they interact with real-time systems: they need to run deterministically. It means that time constraints their execution and interaction within the system.

Common Causes of Outages and Tips to Prevent Them

Recently, Ron DeSantis used Twitter Spaces to launch his presidential campaign. At least, he tried to. As you may have heard, the event was marred with technical difficulties, resulting in false starts, confused hosts, glitches, echoes, and the “melting” of servers. Of the more than 600,000 Twitter users who initially tuned in, less than half remained by the time they relaunched the event using a different account.

Logic App Best Practices, Tips, and Tricks: #30 How to validate if a JSON structure is an Array or a single object

In the last two posts, we addressed validating whether a string or an array was null or empty. Today we will continue on the same topic, validations, and I will speak about another good Best practice, Tips, and Tricks that you must consider while designing your business processes (Logic Apps): How to validate if a JSON structure is an Array or a single object.

Run container-optimized EKS clusters with Ocean and Bottlerocket OS

AWS is one of the primary providers for services that help users deploy and manage their containerized applications in the cloud. Since launching ECS in 2014 and EKS in 2017, AWS has learned a lot about running containers at scale and in production. In 2020, AWS developed Bottlerocket OS, a new operating system for hosting containers. This OS was specifically designed to address gaps left by the ECS and EKS-optimized AMIs, which are based on operating systems that run traditional software applications.

Kubernetes Management | DKP 2.5 Announcement

Kubernetes Management | DKP 2.5 Announcement Discover the latest release of D2iQ's Kubernetes management platform, DKP 2.5, designed to simplify fleet management for multi-cluster deployments. In this video, you'll learn how DKP allows you to provision clusters on multiple infrastructures with just a few simple clicks. We'll explore its capabilities, including abstracting Kubernetes management complexities and offering DKP Insights as an intelligent troubleshooting copilot.

Streamline Incident Response with Komodor and Squadcast

With the growing popularity of Kubernetes as a container orchestration platform powering the microservices revolution, comes greater complexity with managing, monitoring, and responding to incidents at scale. Challenges with real production environments include full visibility into your clusters and environment’s health, alongside real-time incident management and response.

10 Best Internal Developer Platforms to Consider in 2023

Internal Developer Platforms have emerged as essential tools for streamlining processes and boosting productivity. As we find ourselves in the midst of 2023, the demand for robust developer platforms remains on the rise as organizations strive to find efficient solutions that expedite software delivery.

Serverless observability, monitoring, and debugging - Overview and best practices

Serverless, as you may already know, is a cloud computing model where the cloud provider dynamically manages and allocates resources to execute code without the need for server provisioning or infrastructure management on the developer. This article overviews serverless observability, monitoring, and debugging, based on distributed tracing and OpenTelemetry (OTel).

Using DORA metrics Mean Lead Time for Changes to deliver iterations faster

Here's what you can expect to learn from this article: Raise your hand if you like shipping changes quickly. (Yes, let's assume that everything you're shipping has value and isn't a vanity project). Chances are, you, the person reading this now, agreed with the above. When you start on a project, big or small, you want to keep any changes moving along and avoid getting stuck. The less time between the beginning and end of a project, the faster you can shift your focus to other things.

AWS CloudTrail vs CloudWatch: Features & Instructions

In today’s digital world, cloud computing is necessary for businesses of all types and sizes, and Amazon Web Services (AWS) is undoubtedly the most popular cloud computing service provider. AWS provides a vast array of services, including CloudWatch and CloudTrail, that can monitor and log events in AWS resources. This article will compare AWS CloudWatch and CloudTrail, looking at their features, use cases, and technical considerations.

Top Trends of the AWS Summit London

This week, I played at home as the rest of the DX team and I were at the AWS Summit London. 🇬🇧 The event was buzzing with excitement and overflowing with great talks and impressive exhibition stands. It didn't disappoint in terms of attendance either! Despite covering a wide range of subjects, I couldn't help but notice three super-hot tech trends that were everywhere throughout the day. So, without further ado, let's dive right in and explore these topics!

Container Optimization Techniques that Cloud Providers Hate!

Watch this 20-min session to get an in-depth look at factors that must be considered when optimizing containers, and effective ways to optimize container density to make sure that they don’t get throttled or killed, while at the same time making sure that being safe doesn’t run up a huge cloud bill. We cover 3 critical factors that are key when optimizing.

Pipelines Full of Context: A GitLab CI/CD Journey

Do you know what version of your software is running in production? How often is that software deployed, and was it deployed right before last week’s p0 incident? What sort of dependencies are being deployed along with that software, and are any of them potential security risks? These are all common observability questions that may be difficult to answer.

How to Monitor a Heroku App with Graphite, Grafana and StatsD

This article explores the efficient monitoring of Heroku Apps using MetricFire's HostedGraphite plugin and Grafana dashboards. By combining these tools, developers can gain valuable insights into their app's performance and resource utilization. This guide provides step-by-step instructions on setting up MetricFire, integrating StatsD, and creating comprehensive Grafana dashboards for effective monitoring and debugging.

The Role of AWS Direct Connect in Hybrid Cloud Networking

Amazon Web Services (AWS) Direct Connect is a system that connects your business to an AWS service without using mainstream internet. Implementing this system into your company means any information transferred over the internet will use a private, secure network. AWS Direct Connect designs virtual interfaces that are directly connected to public AWS service. It makes the transfer of information quicker and more streamlined for your company.

A guide to dynamic application security testing (DAST)

Dynamic application security testing (DAST) is a critical security measure for modern software delivery pipelines. It involves evaluating the security of web applications by actively testing them in real-time, simulating real-world attacks to identify vulnerabilities. As the cybersecurity threat landscape has evolved, DAST has emerged as a key tool for enforcing application security in continuous integration and continuous delivery (CI/CD) pipelines.

The 7 IT Automations for Highly Effective Organizations - Load Balancer Sanity Reboot

According to a recent Gartner report, less than 35% of enterprise network activities are automated today. Manual network management can negatively affect the business, creating bottlenecks in provisioning and incident resolution, resulting in poor service delivery to lines of businesses, and reduced uptime. Watch Resolve's Brinda Sreedhar and Brent Hunter as they demonstrate how teams can leverage network automation to automate common use cases such as network management, optimization, and security. Automation can standardize processes and allow network operations teams to operate faster.

Technical deep-dive into a real-time kernel

Canonical announced the general availability of Ubuntu’s real-time kernel earlier this year. Since then, our community raised several questions regarding the workings of the kernel and tuning guidelines. We aim to provide answers in this and an upcoming follow-up post. Depending on your background knowledge, you may wish to start with the basics of preemption and a real-time system. In that case, this introductory webinar or our blog series on what is real-time Linux, is for you.

Secret Sauce: Stevie Award Shines Spotlight on D2iQ Customer Support

When deploying a mission-critical Kubernetes infrastructure, the support you receive from your vendor is as important as the product. This is why we at D2iQ are especially pleased and proud that our D2iQ Customer Operations Team has won the Gold Stevie Award for Support Team of the Year for 2023. The American Business Awards, also known as the Stevie Awards, are billed as the “world’s premier business awards” and are judged by a panel of more than 200 industry experts.

Throw custom exceptions in Logic Apps: Using an API Management (Part V)

Welcome to the fifth and last part of this series of blog posts on How to throw custom exceptions inside Logic Apps. In all those posts, we talk about the following: The last approach we want to address in this series is another out-of-the-box idea: using an API exposed in API Management to throw back the exception. This approach is similar to the previous one.

How To Allocate Cloud Costs After A Company Merger/Acquisition

If you’re going through a merger or an acquisition, you’ll soon have to assemble all the cloud account data from two or more organizations and blend it together to fit your new, larger organization. You may be bringing the companies together to form a new entity or simply absorbing one company into the other; the details don’t matter, because the solution is the same either way.

Top 3 Ways IT Automation Drives Certainty in 2023's Times of Economic Uncertainty

It seems like we can’t escape the burden of uncertainty. From the countless things we were uncertain about during the Covid-19 pandemic to the current state of the economy, financial circumstances and trends, and fear of unemployment. For many of today’s businesses of all sizes, predicting the future might appear nearly impossible. IT teams at the start of the pandemic in 2020 shifted without notice to supporting remote employees.

Kubernetes Monitoring - Why It Matters

Kubernetes was designed by Google in 2014 and has been maintained by the Cloud Native Computing Foundation since 2015. It has become the de facto standard for running containers in production at scale, including in cloud environments such as AWS, Azure and Google Cloud. Kubernetes is a modern framework for managing and scaling containerized applications. There have been over 2.8 million contributions to Kubernetes made by companies.

Receiving MySQL database Alerts

Imagine your popular website or app suddenly slowing down significantly or even stopping altogether. You scramble to find the root cause while losing customers and income every minute. This stressful situation is all too familiar, but you can avoid it. Proactively monitoring MySQL databases can help prevent these issues and keep your performance at its best.

From Git to Kubernetes

Join our webinar to learn best-practices when using the JFrog Platform to store and manage your Docker images and Kubernetes deployments from beginning to end, while also setting up a continuous build, test and deploy pipeline. We’ll cover best practices for managing and creating Docker registries and Helm repositories, testing and promotion of Docker containers, and taking your containers all the way to production using the JFrog Platform and Kubernetes together.

How AirDroid Business enables Digis Squared's team to remote control mobile devices efficiently

Are you looking for a reliable and efficient mobile device management solution? To better support their fieldwork across 25 countries, Digis Squared decided to use AirDroid Business to remotely control their fleet of mobile phones in the field. The company also integrated a remote control function with its in-house software, the INOS AI tool, to further enhance the process of testing mobile networks.

Automation in ITOps: An overview

IT networks are the foundation of businesses today. Robust networks enable organizations to conduct seamless business operations and deliver services continuously to customers. To maintain healthy, robust networks, companies depend on ITOps. ITOps refers to the provisioning, monitoring, and management of IT networks to ensure maximum uptime and a better end-user experience.

Sponsored Post

The 29 best DevOps tools for 2023 and beyond

The integration of Development and Operations is a powerful innovation in how we build software. If you're new to DevOps practices, or looking to improve your current processes, it can be tough to know which tool is best for your team. We've put together this list to help you make an informed decision on which tools should be part of your stack. Read on to discover the 29 best DevOps tools, from automated build tools to application performance monitoring platforms.

Featured Post

After action reports: post-incident investigations

When something unexpected happens within the digital operations remit, software engineers put on their deerstalker hats and wax their fussy little moustaches-metaphorically. It's their time to play detective as they unravel the evidence and create the reports to explain the recent IT incident. But unlike with a hat-wearing Sherlock Holmes or a hirsute Hercule Poirot, cliff-hanger endings are not encouraged in software engineering.

Install Graphite: Common Issues

Graphite is a very popular enterprise monitoring tool. This article will address the common issues that occur while setting up a Graphite instance, and how they can be avoided. We will assume readers have already become acquainted with Graphite, but if you’re interested to learn about the basics of Graphite, check out our articles on the Architecture and Concepts of Graphite and the Installation and Setup before reading this article.

Open Source Monitoring vs Proprietary Software

It’s easy to get pulled into paying more and more at a major monitoring company, despite not getting the functionality that you’re looking for. Leaving your monitoring provider can be difficult because it means replacing expensive software or hardware, re-educating your team, and transferring huge amounts of data to a new system - data that may or may not be well suited to the new system. Despite these issues, there are many reasons that motivate users to move to open source.

DevOps Evolution and the Rise of Platform Engineering

As we continue to see rapid technological advancements, organizations must evolve and adapt to maintain a competitive edge. The principles of DevOps - collaboration, automation, continuous integration, and delivery - have emerged as critical success factors in this landscape, enabling organizations to navigate the ever-changing environment.

Simplifying Everyday Network Management: How AI is Changing the Game

Artificial Intelligence (AI) is the current buzz word in IT with AI promoted as the magic ingredient for improving business performance across a wide range of areas. But how, specifically, does AI enhance Network Management? The idea that computers can manage themselves is nothing new.

Optimizing Your K8s Nodes Using FinOps Tools? Try This Instead...

June 7, 2023 It’s no secret that Kubernetes is one of the fastest-growing technologies in use today for deploying and operating applications of all types in the cloud. It’s also no secret that Kubernetes’ popularity is a significant contributor to fast-growing cloud bills. FinOps teams are constantly looking for ways to lower their cloud spend, in cooperation with the DevOps, Engineering and App owner teams that control this infrastructure.

Using Docker Desktop and Artifactory for Enterprise Container Management

As the prevalence of containers continues to expand, managing the push and pull of containers without an enterprise-grade container registry is unwieldy. Many companies utilize JFrog Artifactory as a Docker and Helm registry, but also utilize Docker Desktop strategically to manage their container services.

Charmed MLFlow Beta is here. Try it out now!

Canonical’s MLOps portfolio is growing with a new machine learning tool. Charmed MLFlow 2.1 is now available in Beta. MLFlow is a crucial component of the open-source MLOps ecosystem. The project announced it had passed 10 million monthly downloads at the end of 2022. With Charmed MLFlow users benefit from a platform where they can easily manage machine learning models and workflows.

What Is an Application Programming Interface (API)? - VMware Tanzu Fundamentals

What are APIs and why do they matter? The application programming interface is a key enabler of modern applications, and API use is increasing rapidly in virtually every industry, as software development accelerates to meet digital transformation goals. Businesses are embracing an API-first approach to application development and using APIs and microservices to create modern applications and to integrate new applications with legacy systems.

Impossible! Do Developers Really Mean This?

Impossible! Do software developers really mean this when they're estimating projects? Maybe, but they might not realize that even if a project is technically impossible, sometimes getting close is good enough. Here's part 2 of 4 of Sleuth's CTO and cofounder, Don Brown's take on decoding developer speak. Give Sleuth a try and see how we empower software teams to build faster by making engineering efficiency easy to improve and measurable — in a way that both managers and developers love.

The 2023 State of CloudOps report from Spot by NetApp is here

SAN JOSE, Calif. — June 7, 2023 — NetApp® (NASDAQ: NTAP), a global, cloud-led, data-centric software company, today released its 2023 State of CloudOps report, an annual survey exploring the current state of CloudOps and how IT decision makers feel about the ways their organizations are working to optimize their environments.

Delivering UK-wide edge computing with platformEDGE

As the UK’s edge infrastructure provider, we’ve launched platformEDGE™ — a next-generation platform that will enable regional businesses across the UK to harness the opportunity of digital transformation. PlatformEDGE is a UK-wide integrated infrastructure that enables scalable, high-performance, low-latency edge application delivery.

What Is Hybrid Cloud Automation? Examples, Use Cases + More Essential Info

What is hybrid cloud automation, and how can it help manage specific tasks in your environment? With more and more infrastructure moving into public, private, hybrid, and multi cloud environments, you may be exploring ways to automate manual processes that happen in the cloud — like configuration and deployment tasks. Let's dive into the definition and benefits of cloud automation, as well as some methods to approach this strategy in increasingly complex heterogenous computing environments.

Merging to Main #3: CI/CD Secrets

CI/CD Secrets are... well... secret (or at least they should be)! Think of all the credentials and tokens currently in use in your CI/CD pipeline. These secrets provide critical authentication for essential infrastructure like source control, environments, and build and deployment tools, but they can also easily expose you to risk. Having a secure secret management process is more important than ever for protecting your company and ensuring only authorized personnel can access them.

8 Business Benefits of Ephemeral Environments

In today's rapidly evolving world of software development, ephemeral environments have emerged as a game-changer. These disposable, isolated instances for development, testing, and deployment purposes are revolutionizing the way applications are built and delivered. Let's explore the 8 business benefits of ephemeral environments and how they can accelerate development and deployment processes.

How telco companies can reduce 5G infrastructure costs with open source

5G has the potential to revolutionise the telecommunications industry, offering high speed and connectivity for a wide range of devices ranging from radio access networks (RAN), user equipment (UE), and core networks. However, the high costs associated with 5G infrastructure have been a significant blocker for adoption, hindering innovation and growth in this area. This blog discusses the primary challenges faced in the telecom industry and how open source technologies are helping to resolve them.

Ask What Air-Gapping Can Do for You

In our recent webinar on air-gapped security, D2iQ VP of Product Dan Ciruli shared a new way of thinking about air-gapping, explaining how air-gapping could be applied in places that are not usually considered candidates for air-gapping. In an exchange of insights with Paul Nashawaty, principal analyst at Enterprise Strategy Group, Ciruli explained how the need for air-gapped security has become more critical as more organizations move to the cloud.

How to Secure Your CI/CD Pipeline: Best Tips and Practices

CI/CD pipelines have become a cornerstone of agile development, streamlining the software development life cycle. They allow for frequent code integration, fast testing and deployment. Having these processes automated help development teams reduce manual errors, ensure faster time-to-market, and deliver enhancements to end-users. However, they also pose risks that could compromise stability of their development ecosystem.

Kubernetes Architecture Part 2: Control Plane Components

This Kubernetes Architecture series covers the main components used in Kubernetes and provides an introduction to Kubernetes architecture. After reading these blogs, you’ll have a much deeper understanding of the main reasons for choosing Kubernetes as well as the main components that are involved when you start running applications on Kubernetes. This blog series covers the following topics.

Rancher Desktop: The Ultimate Local Kubernetes Solution for Developers

Kubernetes has created a major impact on modern software development because it is a powerful open source container orchestration platform that enables organizations to deploy and manage complex containerized applications at scale. In this blog, we will cover how Rancher Desktop can help developers run and manage Kubernetes locally.

From Fear to Fandom: How Resolve's OpenAI/ChatGPT Translate Code Benefits IT Teams

The rollout of new technology can come with hesitation and even fear, and generative AI is no different. The New York Times in February 2023 dubbed the popularity of ChatGPT a “phenomenon” that started an AI arms race – one that wasn’t exactly welcomed by news writers, marketing agencies, or business leaders.

Trivial? THIS is What Developers Really Mean!

Trivial? THIS is What Developers Really Mean! Software development managers, do you really understand your developers? Here's your guide to speaking developer, Part 1 of 4, from Sleuth's CTO and cofounder, Don Brown. Give Sleuth a try and see how we empower software teams to build faster by making engineering efficiency easy to improve and measurable — in a way that both managers and developers love.

10 Resources Every Sysadmin Should Know

The IT world is continuously evolving and there are so many resources to help you keep up to speed. However, it’s a challenge for even senior sysadmins to sift through all the available resources to identify the ones that are most relevant and useful. In this blog, we identify some key resources across various channels to not only help you stay up to date with the latest technologies but also to improve your skills and career opportunities.

Automate end-to-end processes and quickly respond to events with Datadog Workflow Automation

Developer, SRE, IT, and security teams often perform complex and error-prone processes in response to disruptions and changes in their systems. Relying on these processes requires a significant amount of time switching between tools to gather the relevant context needed for remediation, domain expertise, and the manual execution of tasks for incident management—which can significantly prolong disruptions and downtime.

Software Maintenance Best Practices for 2023

Businesses rely on software solutions increasingly in our modern age, and it’s constantly evolving. Compared to some of the software being used in the early 2000s, we’ve seen large changes, resulting in more complex frameworks, which come with their own unique changes. As software and systems become more complex, so increases the probability of errors occurring and the level of jeopardy those errors might present.

Seamless Transition to Kubernetes: Ninetailed's Path to Production with Qovery

In today's fast-paced digital world, companies are always looking for ways to optimize their deployment processes. This is especially true for Ninetailed, a leading composable personalization and experimentation solution for digital teams, as they aim to provide exceptional experiences for their customers. To achieve their goals, Ninetailed embarked on a journey to enhance their DevOps practices and scale their infrastructure effectively.

How To Enable QUIC Load Balancing on HAProxy

HTTP/3 is the latest generation of the HTTP protocol, and its ability to serve applications over QUIC offers several advantages for user experience, including reduced latency, improved reliability, and faster page loading as a result of fixing the head-of-line blocking issue in previous versions of HTTP. Both HAProxy and HAProxy Enterprise offer support for using HTTP/3 over QUIC, although the steps for enabling QUIC in HAProxy and HAProxy Enterprise are different.

6 Key Factors to Consider When Choosing a Website Platform

Choosing the right website platform is an important decision for anyone looking to establish a solid online presence. In fact, choosing the wrong website platform has exposed brands to issues like security breaches, poor mobile responsiveness, and terrible load speeds. To buttress the last point, Google research showed that 32% of users would leave your website if it experiences poor load speed. In other words, they want a good user experience.

What is NetFlow Analyzer?

In today’s interconnected world, network administrators face the daunting task of managing and securing complex networks. To effectively monitor network traffic and optimize performance, they require comprehensive insights into the data flows within their infrastructure. NetFlow Analyzer is an analytics tool that monitors network traffic flow. It leverages the ability of flow technologies to offer visibility in real time.

Escape the Legacy Trap: 5 Keys to Successful Application Modernization

Michael Coté and Marc Zottner co-wrote this article. Legacy software can slow—or even stop—business growth. As organizations hit a legacy wall, they face an unfortunate reality: When IT systems are too old and unchangeable, it’s impossible to transform the way their core business works. In fact, 76 percent of executives say that legacy software is holding them back, according to a Forrester report commissioned by VMware. What does that mean for today’s businesses?

The Care and Feeding of Internal Developer Platforms

If you’ve ever attempted to cultivate a backyard vegetable garden, flower garden for your balcony, hydroponic tower, or other system to grow plants, you’ll understand that it’s not a matter of tossing down some seeds in soil and letting nature take its course. Without proper monitoring and management, ecosystems may grow out of control, or simply wither and die off.

Ensure Kubernetes Compliance with New Private Registry Support for VMware Tanzu Mission Control

Corey Dinkens, Sneha Narang, and Lauren Britton contributed to this blog post. VMware Tanzu Mission Control is a centralized hub for simplified, multi-cloud, multi-cluster Kubernetes management. It helps platform teams take control of their Kubernetes clusters with visibility across cloud, on-premises, and edge environments by allowing users to group clusters and perform operations on these groupings.

A holistic approach to securing Spark-based data engineering

Apache Spark is an open-source toolkit that helps users develop parallel, distributed data engineering and machine learning applications and run them at scale. In this webinar, Rob Gibbon – product manager, and Massimiliano Gori – senior information security lead, will survey the state of big data security best practices and outline both high level architectures and pragmatic steps that you can take to secure your Spark applications – wherever they may be running.

Understanding the network edge and edge networking

Generally speaking, a network ‘edge’ is the boundary between two separate networks - where one network ends and another begins. Edges are important, primarily from a security standpoint as they define the jurisdictions owned by different parties, and ‘the edge’ has become a more popular topic of conversation recently through trends which see network resources moved from centralised locations to network edges to make them closer to the end user.

Incident Analysis: Understanding Importance and Benefits

Incidents and accidents can occur in various domains, from information technology and cybersecurity breaches to workplace accidents and transportation mishaps. When faced with such incidents, it becomes crucial to conduct a thorough analysis to understand the underlying causes and implications. Incident analysis goes beyond problem-solving; it offers valuable insights into preventing future occurrences and improving systems and processes.

Do you think of software developer toil like Atlassian, LaunchDarkly, Okteto and Sleuth?

Do you think of software developer toil like Atlassian, LaunchDarkly, Okteto and Sleuth? Hear how leaders from these SaaS companies deal with toil on their teams. Toil for software developers includes repetitive tasks that could be automated, things that waste time and prevent you from investing in the future. These manual processes weigh down developers and the software development process, and can lead to burnout.

Unplanned, Episode 1: Damon Edwards Rages Against the Ticket Machine

In this, the inaugural episode of “Unplanned”, Dormain Drewitz talks to Damon Edwards about the “capacity conundrum” where everyone is working so hard, but everything takes too long and costs too much. We talk about the “coordination overhead” costs of getting unplanned work done, how generative AI is both adding complexity and offers to accelerate automating as much as you can, and four steps to creating capacity.

Puppet vs. Chef: Key Capabilities, Use Cases + A Comparison Table

Choosing an automation and configuration management solution like Puppet vs. Chef often feels like comparing apples to oranges (or apples to... differently shaped apples). From the outside, it’s hard to tell which tool does what, let alone which will perform best in your infrastructure. If you’re researching Puppet vs. Chef, this blog will explain some of the commonalities between Puppet and Chef, what makes Puppet unique, and what to consider when researching Puppet vs.

Introducing platformEDGE - One platform, bringing the edge closer to you.

PlatformEDGE combines regional data centres, distrubuted compute and low latency connectivity to deliver improved performance, growth at scale and transformation for regional businesses across the UK. Our integrated platform reaches 95% of UK businesses through our strategically located data centres on the edge network of all major UK cities. Get secure, fast, and controlled access to data, where and when you need it.

Deploy PostgreSQL service with custom configurations using Terraform

In this video, Dewan covers how to create an Aiven for PostgreSQL service with custom configurations. For your automation needs, he is using Aiven Terraform Provider for the deployment. CHAPTERS ABOUT AIVEN Aiven’s cloud data platform helps your business reach its highest potential by making your data work for you. It provides fully managed open source data infrastructure on all major clouds, helping developers focus on what they do best: innovate and create without worrying about the limitations of technology.

CRLF Injection, Explained: An In-Depth Guide

In this in-depth guide we’ll explore CRLF injection, a web application security vulnerability that can have severe consequences. First, we’ll cover what CRLF injection is, the types of CRLF injection attacks, and their potential impacts. Additionally, we’ll discuss similarities with other attacks, payloads used in these exploits, and how to prevent CRLF injection. Finally, we’ll touch on the role of OWASP in addressing this security risk.

Terraform Import: What It Is and How to Use It

In this post we’ll explore Terraform Import, a powerful command-line tool that allows you to bring existing infrastructure under Terraform management. We’ll cover what Terraform Import is, its common use cases, and how to use it effectively. Additionally, we’ll discuss some limitations you should be aware of when using Terraform Import.

API monitoring vs. observability in microservices- Troubleshooting guide

Monitoring APIs through enhanced observability has gained traction with the popularity of microservices. Since microservice applications are built as independent and scalable modules, the number of microservices can grow dramatically as the application grows, increasing the complexity drastically. Since APIs work as the connective tissue between microservices, the number of APIs also grows in parallel.

Streamline your CI testing with Datadog Intelligent Test Runner

Modern continuous integration (CI) practices enable development teams to quickly and efficiently build and deploy application code to a shared codebase. However, deploying new code is typically accompanied by tests, and as the codebase expands, this results in a proportionately larger test suite.

What is ESXi?

ESXi, short for Elastic Sky X Integrated, is a groundbreaking virtualization solution engineered by the tech giant VMware. Functioning as a type-1 hypervisor, ESXi stands out from other solutions due to its ability to run directly on the system hardware without the need for an underlying operating system. By providing a platform where virtual machines can efficiently function and interact, ESXi has emerged as an indispensable component in today’s technology-driven business ecosystem.

Choosing the Best Options to Run Kubernetes on AWS

Kubernetes is the most widely used container orchestration platform, and you will see many tech giants using Kubernetes in their solutions. Its built-in scalability, flexibility, and container orchestration capabilities make it an ideal choice for enterprise applications requiring high availability and robustness. When deciding which Kubernetes solution to select, we come across many options, including Rancher, Amazon Elastic Kubernetes Service (EKS), self-hosted Kubernetes, Kops, Kubeadm, and Qovery.

Docker container security: demystifying FIPS-enabled containers with Ubuntu Pro

In today’s rapidly changing digital environment, the significance of robust Docker container security measures cannot be overstated. Even the containerised layer is subject to compliance standards, which raise security concerns and compliance requirements. Docker container security measures entail safeguarding our lightweight, appliance-type containers –each encapsulating code and its dependencies– from threats and vulnerabilities.

Canonical & Ampere: Building Sustainable, Power-efficient Computing Solutions Together

Canonical's Taiwan General Manager Tony Chiang was invited to join the Ampere event at Computex 2023 and had a great talk with Jeff Wittich, Chief Product Officer of Ampere Computing. Ampere and Canonical have been partnered to build sustainable and power-efficient computing solutions together and we can foresee more opportunities on the way from the cloud to the edge. Watch the video to learn more.

Securing Apache Spark Big Data Operations

Apache Spark is an open source toolkit that helps users develop parallel, distributed data engineering and machine learning applications and run them at scale. In this webinar, Rob Gibbon – product manager, and Massimiliano Gori – senior information security lead, will survey the state of big data security best practices and outline both high level architectures and pragmatic steps that you can take to secure your Spark applications – wherever they may be running.

Monitoring a K8s Cluster with MetricFire

Kubernetes (K8s) is a popular container orchestration solution, but monitoring its performance can be quite challenging. Luckily, there's a solution that makes it easier - MetricFire. It's a cloud-based monitoring and visualization platform that provides comprehensive metrics, alerts, and dashboards for K8s clusters. The platform offers amazing cloud-based monitoring and visualization services that can make the K8s monitoring seamless.

Featured Post

From shortage to surplus: How to address the skills gap in data centres

Let me state the obvious - operating and maintaining data centres requires a high level of technical expertise. The demand for these skills has consistently exceeded supply. That is by no means unusual in a rapidly expanding industry. However, I've been working in this field for over 30 years, and I've seen this skills gap widen relentlessly. As the industry matures, there is a genuine risk that this shortage will become permanently ingrained.

Mastering Azure Storage: Best Practices for Security, Performance, and Cost Optimization

Azure Storage is a cloud-based service that provides scalable, secure and highly available data storage solutions for applications running in the cloud. It offers different types of storage options like Blob storage, Queue storage, Table storage and File storage. Blob storage is used to store unstructured data like images, videos, audios and documents while Queue storage helps in building scalable applications with loosely coupled architecture.

Business benefits of artificial intelligence in retail

The retail industry is going through a period of major upheaval. AI is transforming the landscape at a rapid pace. Grand View Research evaluated the market value at USD 5.79 billion in 2021 and this is expected to grow at a 23.9% compound annual growth rate (CAGR) from 2022 to 2030. For retailers, this translates into a need to adapt to an entirely new paradigm of customer expectations.

Using PostgreSQL advisory locks to avoid race conditions

The first moments of incident response can be among the most crucial, which in turn can also make them among the most stressful. There are many ways to ensure incidents are kicked off smoothly, but a recent focus of ours was to ensure they could be kicked off quickly. After all, the faster you're able to start mitigating your incident, the more successful you'll be!

How to Show Reliability Results to Your Organization

Building momentum for a reliability program can be tough. Improving reliability takes time, effort, and resources. But when everything from launching new features to improving security demands those same resources, it can be a struggle to get the buy-in you need to address reliability risks. And it makes sense! If a team spends time patching a known security bug or creating a new feature, they have a clear demonstration of the value created.

Zero trust security for CI/CD pipelines

The zero trust security model is an approach to network security that enforces strict access controls and authentication at every stage of the software development lifecycle. It treats every user, device, and transaction as a security risk and uses the principle of least privilege to restrict access to sensitive resources and minimize the potential attack surface.