Operations | Monitoring | ITSM | DevOps | Cloud

Using Mnesia in an Elixir Application

In today’s post, we’ll learn about Mnesia, see when you would use such a tool, and take a look at some of the pros and cons of using it. After covering the fundamentals of Mnesia, we’ll dive right into a sample application where we’ll build an Elixir application that uses Mnesia as its database. Let’s jump right in!

User Research For Expert Systems

I’d like for you to think of your favorite app that you use almost every day. What do you use it for and why? Next, I’d like for you to think of the last time the app had a major design change that made you think, “What was the company thinking? Why would they change something that worked perfectly fine and make it so unusable? Did they not consult actual users before making this change?”

How to deploy an app to AWS: App automation and optimization

Hey there. Welcome to the fifth and final installment in our series on successfully deploying an app to AWS with the least effort. This week, we'll discuss things you need to worry about now that you've released, plus optimizing your app. Ok, so you've released your app. Congrats! However, we both know your work doesn't end here. You should continue improving your app, both on the end-user side and the back end.

Introducing Rancher Academy

Today we launched the Rancher Academy, our new free training portal. The first course is Certified Rancher Operator: Level 1, and in it you’ll learn exactly how to deploy Rancher and use it to deploy and manage Kubernetes clusters. This professional certification program is designed to help Kubernetes practitioners demonstrate their knowledge and competence with Kubernetes and Rancher – and to advance in their careers.

Elasticsearch vs. MongoDB

Elasticsearch and MongoDb are the two most popular distributed datastores used to manage NoSQL data. Both of these technologies are highly scalable and have document-oriented design at the core. There are differences between the two technologies, however, and it’s important to understand these differences in order to choose the right one for your use case. This blog post will examine the differences between these two technologies in a number of critical areas.

Network Security for D2iQ Konvoy

By default, pods are non-isolated; they accept traffic from any source. The D2iQ Konvoy solution to this security concern is Network Security Policy that lets developers control network access to their services. D2iQ Konvoy comes preconfigured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network policy and a live demo implementing each use case.

How to Import Kubernetes Labels as Tags | Datadog Tips & Tricks

In this video, you’ll learn how to turn Kubernetes node labels and pod labels into tags in Datadog in order to correlate metrics, traces, and logs back to Kubernetes deployments. Using labels for Kubernetes objects—such as pods or nodes—is key to organizing and making sense of your deployments. Datadog can automatically bring your Kubernetes labels from your clusters into the Datadog platform as tags, regardless of whether you’re using on-prem Kubernetes or a cloud-based service such as AKS, EKS, or GKE.

How to Use Browser Tests to Monitor Web App User Journeys | Datadog Tips & Tricks

In part 2 of this 2 part series, you’ll learn how to create Datadog Browser Tests to replicate user journeys and verify both that your web applications are responsive and functioning properly at all times. In part 1 of this series (link), you learned how Datadog’s API tests can be used to check API and website uptime. Datadog Browser Tests take this a step further, allowing you to replicate entire user journeys and transactions through your web applications. This is done with our browser recorder: simply click “Start Recording” and click through your application to record a test.