Operations | Monitoring | ITSM | DevOps | Cloud

Cloud

The latest News and Information on Cloud monitoring, security and related technologies.

How To Handle Untaggable And Untagged Cloud Spend

Let’s imagine, for a moment, that we live in a perfect world. In that world, you could check your company’s cloud bills and financial reports and find cleanly organized categories of spending that help you instantly understand where your money is going and why. Your engineers would meticulously label every spend item with useful metadata tags so you can clearly see which costs have increased and which are most affecting your bottom line.

Getting Started With Azure Database for PostgreSQL

Open-source software (OSS) relational database management systems (RDBMSes) are becoming incredibly popular in the cloud computing world. In this article, I’ll discuss one of the most popular OSS relational databases, PostgreSQL, and the options you have for this database in the Microsoft Azure cloud. It’s worth noting these products are large with many detailed aspects, so consider this article a cursory, high-level overview of each offering.

Automate AWS Lambda function deployments to AWS CDK

When you build a cloud-based application, you can choose to deploy the resources using the GUI (Graphical User Interface) or CLI (Command Line Interface) provided by the cloud provider. This approach can work well with just a handful of resources, but as the complexity of your application increases, it can become difficult to manage the infrastructure manually.

AWS Monitoring Tool

Businesses today know what a cloud migration brings to the table regarding growth and optimization. AWS is the most popular cloud platform for hosting applications of varying complexity. But, with businesses aiming to upscale faster, the deployments tend to become difficult to track. This is one of the many reasons businesses need AWS monitoring tools. This blog will discuss the industry’s best practices for AWS monitoring.

How to retrieve Azure Key Vault Secrets using Azure Functions (Part II)

In my previous post, I explained How to retrieve Azure Key Vault Secrets using Azure Functions, where you can understand Key Vault URL and the Secret name to retrieve a secret generically, you could use it inside all your Logic App Standard workflows, whether they use the same Key Vault resource or different ones.

How Cloud Network Monitoring Is Critical To Business Success

A rising number of businesses are adopting and utilizing cloud services and capabilities with remarkable success. But embracing cloud tools and services often brings unexpected changes for business leaders and IT teams, especially because of the way in which cloud adoption has altered how networks are monitored and managed.

AppDynamics Cloud: Kubernetes Overview

Kubernetes® monitoring with AppDynamics Cloud provides you with the visibility you need into your Kubernetes infrastructure. It provides you the capability to monitor metrics on clusters, namespaces, workloads, pods and ingress controllers. You also have the capability to cross validate metrics from your servers and network interfaces as well as cloud providers. Monitor your pod resources for performance issues or identify needs to scale. Kubernetes, as well as App Service Monitoring, is supported by using an OpenTelemetry™ Operator.

Intelligent Instance Selection for Your Kubernetes Workloads

Picking the right AWS instance is challenging because you have to match the ever-changing resource usage patterns of your apps with the 500+ AWS instance types, and the result is over-provisioning and waste. Nearly one-third of businesses exceed their cloud budgets by as much as 40%, in part due to poorly sized instances.

Snooze your alert policies in Cloud Monitoring

Does your development team want to snooze alerts during non-business hours? Or proactively prevent the creation of expected alerts for an upcoming expected maintenance window? Cloud Alerting in Google's Cloud operations suite now supports the ability to snooze alert policies for a given period of time. You can create a Snooze by providing specific alert policies and a time period. During this window, if the alert policy is violated, no incidents or notifications are created.

Seven Tools to Help You Become a Better Serverless Developer

Serverless technologies let us do more with less effort, time and energy. They let us focus on creating user value and let the cloud handle undifferentiated heavy-lifting like scaling and securing the underlying infrastructure that runs our code. Serverless technologies have allowed me to accomplish tasks as a solo engineer that used to take a whole team of engineers to accomplish, and I’m able to complete these tasks in a fraction of the time and cost to my customers.