Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

The rising trend of Data Breaches and Critical Vulnerabilities in 2023

As the year comes to an end, we are taking a look back on the major data breaches and vulnerabilities that disrupted the security of both small, and large and very important organizations around the world and across all industries. According to a recently published report: As this trend is on the rise, governmental organizations and companies of every size put more emphasis on the security of their systems and networks.

Pay As You Grow Automation

The IT landscape is evolving faster than ever before, and the move to cloud-based solutions has emerged as a game-changer for businesses looking to future-proof their infrastructure. However, the move to cloud solutions is not all plain sailing and comes with its own challenges due to the change in management access. For example, Microsoft 365 / Office 365 saves companies the headache of operating Exchange, SharePoint and Teams infrastructure.

Our Lighthouse check has been upgraded to Lighthouse v11

We are happy to announce that we have upgraded our Lighthouse check from v9 to the latest version, Lighthouse v11. Lighthouse is an open-source tool by Google that helps developers improve the quality of their web pages. Oh Dear can run this check frequently for your site, informing you when SEO-related problems arise. Our check may suggest optimizing images or minifying JavaScript to improve performance.

What's new in Kubernetes v1.29: Mandala

As Kubernetes continues its journey of innovation and improvement, the release of Kubernetes v1.29, also known as the Mandala release, marks another significant milestone. Through this update, there are a total of 49 enhancements, and of these enhancements, 11 have graduated to Stable, 19 have entered Beta, and 19 have graduated to Alpha. In this blog, we'll dive into the key updates of Kubernetes v1.29, highlighting how these changes will shape the future of container orchestration.

The Advent of Monitoring, Day 12: Behind the Scenes: How Checkly Is Using a Smoke Test Matrix to Tame Variant Complexity

This is the last part of our 12-day Advent of Monitoring series. In this series, Checkly's engineers will share practical monitoring tips from their own experience. At Checkly, the commitment to reliability is not just a tagline; it's embedded in our DNA. As software engineers, we understand the critical importance of dogfooding—using our own product to ensure its robustness and effectiveness. This approach holds immense value, especially since Checkly is designed for observability.

Azure Logic Apps costs optimization to maximize savings

The Logic Apps are cloud-based resources provided by Azure, which can be integrated with various systems and services with minimal code implementation. The Logic App uses elements like connectors, triggers, and workflows for optimal performance. The utilization of each component influences the overall cost of the Logic App.

Monitoring Pi-hole using Pi-hole Exporter and OpenTelemetry: A Comprehensive Guide

Pi-hole is a fantastic open-source DNS-based ad blocker that enhances your online experience by blocking unwanted ads and trackers network-wide. Monitoring the performance and status of your Pi-hole setup is essential to ensure its effectiveness. Next, we'll explore how to use a Prometheus exporter to expose metrics from Pi-hole and have the OpenTelemetry collector scrape the metrics and send them to Splunk Observability Cloud.

What is a multi-cloud management platform?

As an IT leader, you’re acutely aware of the struggles of juggling multiple cloud environments, from integration headaches to holistic incident management to monitoring multiple clouds at once. Seeking a more efficient multi-cloud management solution is crucial to alleviate these pressures and streamline your cloud operations.

How MSPs and MSSPs can reduce risk and liability for their clients

For 83% of companies, a cyber incident is just a matter of time (IBM). And when it does happen, it will cost the organization millions, coming in at a global average of $4.35 million per breach. Add to that stringent data protection laws and the growing frequency and reach of ransomware and other sophisticated attacks.

The EU AI Act: What you need to know

The European Union’s new legislation is the first of its kind — and has global reach On December 8, 2023, the European Union made a significant step in digital governance by introducing the first set of comprehensive artificial intelligence (AI) regulations. This legislation, poised for a European Parliament vote by early 2024, is first out of the gate in regulating AI.