Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

A Primer on Building a Monitoring Strategy for Amazon RDS

In a previous blog post, we talked about Amazon Relational Database Service (RDS). RDS is one of the most popular cloud-based database services today and extensively used by Amazon Web Services (AWS) customers for its ease of use, cost-effectiveness and simple administration.

How to Create an Effective Incident Response Playbook

Oftentimes, enterprises struggle to notify customers, employees, partners and other key stakeholders about incidents. Yet failure to maintain constant communication with key stakeholders may slow down incident response. Worst of all, a lack of communication may put customer relationships in danger and lead to revenue losses, brand reputation damage and other long-lasting business issues.

Simplify Troubleshooting your IT Healthcare Virtual Architecture with Goliath Technologies

Virtual architecture is complex to standup and deploy, and when it comes to the ability of your support team to fix an issue it needs to be done fast and when possible – proactively. This is extremely important from the business user perspective in all organizations, but even more importantly in healthcare where there is another person’s health and possibly even their life on the line.

4 Steps to Monitor Your Cron Jobs Using PushMon

It is imperative to keep a close watch on all the Cron jobs you have defined on your system, this would include checking errors and validation of codes. For monitoring of defined Cron Jobs, a developer can use a “Hosted monitoring system” like PushMon. This kind of a system is defined as a push monitoring system as it depends on receiving signals from Cron jobs for monitoring and error notification. A system like PushMon has the following 4 steps in its monitor of your Cron job.

Docker image scanning - How to implement open source container security (part 2).

In this article we will cover Docker image scanning with open source container security / image scanning tools. We will explain how to to deploy and setup Docker image scanning: both on private Docker repositories, and as a CI/CD pipeline validation step. We will also explore ways of integrating image scanning with CI/CD tools like Jenkins, Kubernetes runtime configuration features and runtime security tools like Falco.