Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Centralized user management has arrived at Platform.sh

Securely managing the people who have access and permissions to each of your applications can get very confusing, very fast for administrators. That’s why we’re delighted to be introducing centralized user management for all Platform.sh users which was designed to solve this exact problem. Ready to find out more? The answers are just one play button away in our demo video below.

How Coveo Reduced User Latency and Mean Time to Resolution with Honeycomb Observability

When you’re just getting started with observability, a proof of concept (POC) can be exactly what you need to see the positive impact of this shift right away. Coveo, an intelligent search platform that uses AI to personalize customer interactions, used a successful POC to jumpstart its Honeycomb observability journey—which has grown to include 10,000+ machine learning models in production at any one time. Wondering how Coveo got there? So were we.

Code Mappings and Why They Matter

Code Mappings connect errors to the source code in a repository. And since errors can have paths that are different from the tree structure of the repository, Code Mappings determines the accurate path through a combination of a repository URL and a path transformation. Sentry uses Code Mappings to serve issue context on the issue details page.

k3s vs k8s - The Difference Between k3s vs k8s

Our CTO Andy Jeffries explains how k3s by Rancher Labs differs from regular Kubernetes (k8s). Since we launched the world’s first k3s powered, managed Kubernetes service – we’ve had a lot of questions from our members on what the differences are between k3s and k8s (full blown Kubernetes), aside from the choice from each on how to capitalise a "K" (or not).

6 Signs Your Company is Experiencing Data Breaches

Do you always stress about the confidential data your business owns? You have a valid reason to worry because data security risks are a growing concern and the stakes have never been higher. According to a recent report, the global cybercrime cost may reach $10.5 trillion by 2025. Businesses must be vigilant about potential data theft and take proactive measures to protect themselves.

Beyond Logging: The Power of Observability in Modern Systems

Observability has now become a key aspect of designing, building and maintaining modern systems. From logs to distributed tracing and from distributed locking to distributed tracing, observability as a function has gone beyond logging. With so many aspects to be taken care of, it thus becomes essential to have an observability toolchain which is comprehensive and comprehensive without making it complex. In this blog, we will explore the underlying motivations behind observability, the various tools available to enable it, and the various components of the same.

Changing the owner of the team can now be done in our UI

Changing the owner of the team can now be done in our UI In the past, we've seen users reach out to support to change the owner of a time for a variety of reasons. You can now change the owner of the team without contacting support. Just head over to the team settings and scroll down. As the owner of a team, you can move ownership to another member of your team. Because this action cannot be reversed, it needs to be confirmed.

Why Is Kubernetes Troubleshooting So Hard?

Maintaining reliable Kubernetes systems is not easy for anyone, especially for team members with less in-depth knowledge of Kubernetes itself and the overall service environment. This blog, part 1 of 3 in the “8 SRE Best Practices to Help Developers Troubleshoot Kubernetes” series, outlines the key challenges SREs and developers face when they need to quickly troubleshoot and remediate issues in applications running on Kubernetes.