Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Protocol analyzer: What is it, and why does your organization need one?

IT admins are expected to keep the organization’s network reliable and resilient all while the complexity of today’s networks grows. From adopting hybrid infrastructures and maintaining multi-cloud environments’ security to managing ever-increasing bandwidth demands, enterprise network management is getting more difficult by day.

Azure Automation Costs Explained

In today’s digital landscape, automation plays a crucial role in streamlining operations and improving efficiency within IT. One popular automation solution is Azure Automation, offered by Microsoft’s Azure cloud platform. But how much does Azure Automation cost? Is an Azure Automation Account free? In this blog post, we will delve into the cost structure of Azure Automation, explore where the costs lie and put the costs of Azure Automation into context.

Tuning a real-time kernel

This blog expands our technical deep-dive into a real-time kernel. You will need to be familiar with a real-time kernel to understand the tuning concepts in this blog. If you are starting from scratch and need to revisit the basics of preemption and a real-time system, watch this introductory webinar. If you are interested in the primary test suites for real-time Ubuntu, an explanation of the components and processes involved, head over to the first part of this mini-series.

Differences between snapshot with memory and without memory

In the realm of virtualization, snapshots play an integral role in managing virtual machines (VMs). Essentially, a snapshot captures the state of a VM at a specific point in time, providing a reference point to which you can revert if necessary. This can be especially handy when implementing changes to your VM or its applications, allowing you to quickly undo the changes if they cause any unforeseen issues.

Top 5 cloud security risks

Cloud security is a constant concern and tends to revolve around common themes - how do you give intended users access to the data and systems their clearance allows, while maintaining a good user experience; and how do you keep unintended users or malicious bots out? In the entanglement of systems, services, and applications that make up a modern IT infrastructure, this is a lot harder to balance in practice than it is on paper.

HA Kubernetes Monitoring using Prometheus and Thanos

In this article, we will deploy a clustered Prometheus setup that integrates Thanos. It is resilient against node failures and ensures appropriate data archiving. The setup is also scalable. It can span multiple Kubernetes clusters under the same monitoring umbrella. Finally, we will visualize and monitor all our data in accessible and beautiful Grafana dashboards.

9 Tips to Maximize Data Center Efficiency

Did you know that data centers are some of the most energy-intensive buildings? They consume 10 to 50 times the energy per floor space of a typical office building. As governments, industry regulators, and customers demand more energy efficient data centers, data center managers are tasked to comply with corporate sustainability initiatives by finding new ways to innovate and reduce energy consumption.