Operations | Monitoring | ITSM | DevOps | Cloud

Run confidently with secure DevOps

The rapid pace of digital transformation is accelerating the shift to cloud-native applications using containers and Kubernetes to speed the pace of delivery. But application delivery is one thing. Application uptime performance and protection are another. For cloud teams already running production one fact is clear, monitoring and troubleshooting are only the beginning. They also need to own security and compliance for their apps. In cloud-native DevOps is not enough. It's time for secure DevOps.

HAProxy Forwards Over 2 Million HTTP Requests per Second on a Single Arm-based AWS Graviton2 Instance

For the first time, a software load balancer exceeds 2-million RPS on a single Arm instance. A few weeks ago, while I was working on an HAProxy issue related to thread locking contention, I found myself running some tests on a server with an 8-core, 16-thread Intel Xeon W2145 processor that we have in our lab. Although my intention wasn’t to benchmark the proxy, I observed HAProxy reach 1.03 million HTTP requests per second.

How we use metamonitoring Prometheus servers to monitor all other Prometheus servers at Grafana Labs

One of the big questions in monitoring can be summed up as: Who watches the watchers? If you rely on Prometheus for your monitoring, and your monitoring fails, how will you know? The answer is a concept known as metamonitoring. At Grafana Labs, a handful of geographically distributed metamonitoring Prometheus servers monitor all other Prometheus servers and each other cross-cluster, while their alerting chain is secured by a dead-man’s-switch-like mechanism.

Getting Started with Spring Boot Actuator

Any production application needs to be monitored for its uptime. Let’s say you’ve developed a stock market statistics application, for example, using Spring Boot for your client. This application has to be up all the time while the stock market is open. If it’s down at a crucial time, it could mean huge losses for relevant stakeholders.

Quick Search for People in Alloy Navigator Mobile App

Being mobile is in large part about communication. Our app for mobile access to Alloy Navigator™ ITSM platform gives IT people the freedom to communicate with customers and teammates, notify stakeholders, submit approval requests, assign work, and escalate incidents from anywhere, anytime. All those communication tasks typically involve choosing the right person from a list.

3, 2, 1 Liftoff! Launching Your ITSM Implementation

We have service desk liftoff! Well...almost. Completing an IT service management (ITSM) evaluation is no easy feat, but selecting a new solution doesn’t mean it’s time to take your foot off the pedal. Transitioning to a new solution shouldn't be a burden or take away from your day-to-day responsibilities. Developing a strategic approach to tackle your ITSM implementation can help expedite your time to value and maximize your resources.

9 Best Network Discovery Tools

Your organization’s network is large, complicated, and constantly expanding. While you might think you have a handle on it, manually monitoring your network can lead to inaccuracies due to outdated data, undetected devices, and other common visibility issues. A network device discovery tool can help you find devices on a network to manage your device’s health, troubleshoot performance problems, and prepare for your network’s future.