Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

PostgreSQL Database Monitoring

PostgreSQL is one of the most popular relational databases on the market today with more than 1.5 billion users. This article will discuss everything you need to know about monitoring PostgreSQL, and how you can use it to optimize your site's data monitoring. If you want to get started right away on PostgreSQL database monitoring with MetricFire, you can book a demo or sign up for the free trial today.

Kubeflow vs MLFlow

Learn the main differences between the MLOps tools of choice: Kubeflow and MLFlow Started by Google a couple of years ago, Kubeflow is an end-to-end MLOps platform for AI at scale. Canonical has its own distribution, Charmed Kubeflow, which addresses the entire machine-learning lifecycle. Charmed Kubeflow is a suite of tools, such as Notebooks for training, Pipeline for automation, Katib for hyperparameter tuning or KServe for model serving and more. Charmed Kubeflow benefits from a wide range of integrations with other tools such as MLFlow, Spark, Grafana or Prometheus.

Securing open source software with Platform One and Canonical

Our own Devin Breen and Mark Lewis discussed Securing Open Source Software with the Chairman of Iron Bank at USAF Platform One Zachary Burke at AWS Summit Washington, DC. The topic includes: Securing Open Source Software, Secure Minimal Containers, and Software Security Scanning.

Synthetic monitoring as Code with Checkly and ilert

This post will introduce Checkly, the synthetic monitoring solution, and their monitoring as code approach. This guest post was written by Hannes Lenke, the CEO, and co-founder of Checkly. ‍ First, thanks to Birol and the ilert team for the opportunity to introduce Checkly. ilert recently announced discontinuing its uptime monitoring feature and worked with us on an integration to ensure that existing customers could migrate seamlessly. ‍ So, what is monitoring as code and Checkly?

Data Tampering: A Comprehensive Guide

In an increasingly interconnected and data-driven world, where information shapes decisions and fuels innovation, the integrity of data has become paramount. However, lurking beneath the surface is a silent threat that can undermine trust, compromise systems, and wreak havoc on organizations: data tampering. In this post, we delve into the realm of data tampering, exploring the vulnerabilities, the reasons behind data tampering practices, and countermeasures against them.