Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

Visualize relationships across your on-premise network with the Device Topology Map

Network engineers need clear visibility into the relationships and dependencies of their network devices so they can quickly troubleshoot when issues arise. But when dealing with the potentially thousands of devices that comprise a modern enterprise network, engineers often need to navigate a complex web of interconnected signals in order to trace the sources and consequences of poor network performance.

The Complete Guide to FIPS Compliance for Your Organization

Federal Information Processing Standards (FIPS) compliance plays a critical role in setting the standards for encryption and security that safeguard sensitive information. As your organization increasingly relies on digital infrastructure, it’s important to understand and implement FIPS compliance requirements to maintain the security and integrity of your data. This commitment helps ensure your operational practices not only meet but exceed the necessary safeguards.

What Is DNS? Definition & How It Works

The Domain Name System, commonly known as DNS, is a fundamental component of the internet, yet it remains a mystery to many users. Without DNS, browsing the web would be a cumbersome process, requiring us to remember complicated numerical addresses for every website we want to visit. In this article, we will demystify DNS, explaining its importance, how it works, and its critical role in our everyday online activities.

UniSuper Google Cloud Outage Reveals Need for Keen Backup and DR Planning

Earlier this month, Google Cloud disclosed that it accidentally deleted the account of its customer UniSuper, a $125 billion Australian pension fund. According to a joint statement from Google Cloud and UniSuper, the deletion occurred due to an “inadvertent misconfiguration.” As a result, more than 600,000 pension fund users were unable to access their accounts for over a week. UniSuper had geographical redundancy built into its Google Cloud environment, according to the statement.

Modern Egress Gateway: Assign stable IPs to traffic leaving Kubernetes clusters

Whether an enterprise is migrating its legacy application to a cloud-native architecture or deploying a new cloud-native application, it will face the challenge of integrating with security tools such as firewalls that rely on a stable network identity for security configuration. This is due to the fact that cloud-native workloads aren’t guaranteed to have a fixed network identity.

Tips for Controlling and Monitoring Azure Costs in Real-Time

Azure cost monitoring in real time is crucial for efficient cloud management, enabling organizations to optimize resource usage and maintain financial governance. Due to challenges like complex pricing and changing workloads, utilizing Azure Cost Tracking and Reporting becomes essential. Here, we’ll explore tips for real-time monitoring of Azure Costs.

Feature Friday #11: namespaces

Did you know that CFEngine has namespaces? Let’s see how they can facilitate policy sharing while avoiding “duplicate definitions of bundle” errors. Most of the Masterfiles Policy Framework (MPF) and policy examples for CFEngine use the default namespace. However, body file control allows you to specify a namespace that applies for the rest of the file or until it’s set again by another body file control.

Kosli and Swiss Digital Network partner to enhance Continuous Compliance and Verification

We are thrilled to announce a strategic partnership between Kosli and Swiss Digital Network (SDN). This collaboration is set to revolutionize how Swiss organizations approach Continuous Compliance and Verification, combining the strengths of both companies to enabeling regulated sectors like finance and healthcare the power to deliver software with security, compliance, and speed.

Strategies for migrating to Kubernetes

Migrating to a new platform can often feel like navigating a maze of technical challenges, especially when the platform is as complex as Kubernetes. Kubernetes has a vast number of features designed to help with deploying and managing large applications, but learning how to use it effectively can be just as challenging as‌ moving your workloads over. This doesn’t mean it’s impossible, of course, and there are several strategies for easing this process.