Operations | Monitoring | ITSM | DevOps | Cloud

Kubernetes and containers adoption growing fast

Cloud-native development and microservices enable development teams to work more efficiently and innovate faster. Operators appreciate the container environment because it increases infrastructure utilization, enabling them to accomplish more with less while managing critical applications at unprecedented scale. Kubernetes and containers adoption growing fast in the last few years.

Icinga 2.9.2 released

Icinga 2 v2.9 introduced performance related changes inside the configuration compilation and activation order. This was to ensure a) no unwanted notifications b) use available CPU resources to speed up the overall validation process. These changes had a bad effect on configuration depending on a specific activation order, and slowed it down with many config objects of a specific type. The Icinga Director depends on get_host() being called in service objects to support specific service set overrides.

5 Best Practices for Using Sumo Logic Notebooks for Data Science

This year, at Sumo Logic’s third annual user conference, Illuminate 2018, we presented Sumo Logic Notebooks as a way to do data science in Sumo Logic. Sumo Logic Notebooks are an experimental feature that integrate Sumo Logic, notebooks and common machine learning frameworks. They are a bold attempt to go beyond what the current Sumo Logic product has to offer and enable a data science workflow leveraging our core platform.

PHP Performance: Five Types of Tools You Need To Know

To all the developers out there, it is highly advisable that every application you build should have tools that will monitor performance and ensure that it runs correctly. There are a variety of tools available that can monitor your application’s performance. Choosing the right tool that caters to your organization’s needs should be a priority.

Get your own Uptrends Checkpoint

Your private network is teeming with web services (APIs), intranet, business applications like CRMs and ERPs, acceptance and preproduction environments, databases, and other servers. Your business relies on your network infrastructure to function every day. Each part of that infrastructure needs to be available, performing, and functioning well to keep your business humming along.

Simplifying security auditing, part 5: Detecting network attacks

Anyone trying to access resources in your network needs to interact with your network devices: firewalls, routers, switches, and IDS/IPSs. Each of these devices generate syslogs that contain important security information and must be audited to gain complete visibility into the activities occurring in your network. Most SIEM solutions, including our own Log360, can collect and analyze syslogs in real time and instantly alert security teams if any security event of interest occurs.

The challenges of choosing an APM tool

How do you choose an APM tool? You search online and you see there is a lot of choice. But you can only choose one. And it's a big decision. You need to find a tool that can monitor your crown jewel applications. You know that the cost of an APM tool is high. And you know that it's going to be a challenging and lengthy process to implement it.