As organizations build out their serverless footprint, they might find themselves managing hundreds or thousands of individual components (e.g., Amazon S3 buckets, Amazon DynamoDB tables, AWS SQS queues) for just a single application. At the same time, performance issues can crop up at any of these points, which means that having access to detailed observability data from your serverless functions is crucial for effective troubleshooting.
As cloud providers and infrastructure technologies grow their support for Windows containers, developers who use the Windows ecosystem are more and more able to enjoy the benefits of containerization. It’s quicker and easier than ever to modernize and deploy applications that use Windows-specific frameworks like .NET. Plus, Windows developers can use orchestration services like Kubernetes, Amazon ECS, or Docker Swarm to manage the complexity that containerized environments introduce.
Kubernetes has a lot of features and deployment options for running containers. One of these is the Service. In this blog post, we’ll discuss what Services are, what they can be used for, and how to create them.
Summer is in full swing, and the latest release of SquaredUp for SCOM and SquaredUp for Azure is now available. Welcome to version 4.7! This release is jam-packed with great functionality which our Product Engineering teams here at SquaredUp have been working hard on for the last few months. Here’s a quick round up of everything that’s been added and enhanced in version 4.7. There will be a series of blog posts covering the features in the coming weeks so stay tuned for more.
The HAProxy Kubernetes Ingress Controller integrates with cert-manager to provide Let’s Encrypt TLS certificates. When it comes to TLS in Kubernetes, the first thing to appreciate when you use the HAProxy Ingress Controller is that all traffic for all services travelling to your Kubernetes cluster passes through HAProxy. Requests are then routed towards the appropriate backend services depending on metadata in the request, such as the Host header.
Identity & Access Management (IAM) is the central administration of identities and access rights in a company. Authentication and authorization are essential components with which identities are managed and access rights for linked solutions, systems, applications and resources are controlled. It may sound complicated, but this can be easily explained using a practical example.
eG Innovations has been a Citrix partner since 2003. Those were the days when Citrix’s messaging was around “access”. Thin client computing and then server-based computing were the hot topics. Discussions around the efficiency of RDP and ICA ruled and Citrix Resource Manager was the best way to monitor a Citrix server. What was then Citrix MetaFrame soon became Citrix Presentation Server, then Citrix XenApp, and now Citrix Virtual Apps.
SaaS monitoring platforms must provide a flexible set of capabilities to their customers. A platform with the ability to adjust according to business needs reduces costs (e.g. the cost to switch) and tool sprawl since the need to perform different monitoring functions can be accommodated in a single place. A monitoring platform should allow you to adjust, for example: Not all digital experience monitoring platforms are the same.