Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

HTTP(S) Check Upgrade | HTTP(S) Monitoring Improvements from Uptime.com

Our bread and butter is checking for uptime, and we always recommend users begin their monitoring with the HTTP(S) check. We call it a basic check type, but its functionality is boosted when you start exploring optional parameters. The Uptime.com HTTP(S) check can do a lot more than check for server status 200 OK.

Grafana Tempo is now GA with the release of v1.0

It’s exciting to see a project that you’ve poured so much time into progress at the rate Tempo has. Tempo is not the first piece of software I have shepherded from the very first line of code to a production release, but it is the first large-scale open source project I have led. Working with a community that is able to use and improve your software as a community is a powerful thing.

GrafanaCONline Day 1 recap: Grafana 8, Tempo GA, machine learning, ISS, and more!

GrafanaCONline 2021 is live! Join us over the next two weeks for more than 30 virtual sessions, ranging from demos of the new Grafana 8.0 release and technical deep dives around Grafana, Prometheus, Loki, and Tempo to insider looks at how companies are leveraging Grafana in observability, IoT, science, and business intelligence. GrafanaCONline 2021 runs through June 17.

Multi-Project Cloud Monitoring made easier

Customers need scale and flexibility from their cloud and this extends into supporting services such as monitoring and logging. Google Cloud’s Monitoring and Logging observability services are built on the same platforms used by all of Google that handle over 16 million metrics queries per second, 2.5 exabytes of logs per month, and over 14 quadrillion metric points on disk, as of 2020.

Automate and scale your CI/CD with CircleCI orbs

For the past two and a half years as a Solutions Engineer at CircleCI, I’ve had the distinct pleasure of working with some of CircleCI’s largest customers to help them instill healthy CI/CD practices into their development processes. Leading-edge organizations are trying to make sure that their applications are scalable, reliable, and secure. Shipping products to users quickly and reliably is imperative to gaining a competitive edge.

Faster Incident Resolution with Context Rich Alerts

Labelling your alert payloads although simple can significantly improve the time it takes for your team to respond to incidents. In this blog learn how Squadcast's auto-tagging feature can be a game changer by enabling intelligent labelling & routing of alerts to ultimately reduce your MTTR. A frequent problem faced by on-call engineers when critical outages occur is pinpointing the exact point of failure.

Performance, Stress, and Load Tests in Rails

Tests are an integral part of most well-working Rails applications where maintenance isn’t a nightmare and new features are consistently added, or existing ones are improved. Unfortunately, for many applications, a production environment is where they are put under heavy workload or significant traffic for the first time. This is understandable as such tests are costly.

Automated Falco rule tuning

We recently released the automated Falco rule tuning feature in Sysdig Secure. Out-of-the-box security rules are a double-edged sword. On one side, they allow you to get started right away. On the other, it can take many working hours to learn the technology, configuration, and syntax to be able to customize the rules to fit your applications. Falco’s default security rules are no different.

20 Best Software Development Tools in 2021

With the increase in popularity and adoption of software development across the industry, developers and organizations are constantly looking for tools to make their lives easier. The right set of tools can quickly help you get the maximum output each day, but the road to finding your arsenal of the best software development tools is not easy. That’s why we researched for you!

CVE-2021-31440: Kubernetes container escape using eBPF

In a recent post by ZDI, researchers found an out-of-bounds access flaw (CVE-2021-31440) in the Linux kernel’s (5.11.15) implementation of the eBPF code verifier: an incorrect register bounds calculation occurs while checking unsigned 32-bit instructions in an eBPF program. The flaw can be leveraged to escalate privileges and execute arbitrary code in the context of the kernel.