Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Best Practices for Incident Management: A Checklist

If productivity is the engine that helps optimize how a business operates then being proactive is the oil and knowing how to effectively maintain productivity is regularly checking and replacing said oil. Whenever a service outage occurs it throws a wrench into the whole process and can put an entire organization in flux, mainly because the outage.

Martello in Motion - Rapid Circle

Rapid Circle has been providing information and communication technology services to organizations since 2008. The company offers cloud workplace and managed cloud services like data center migration, adoption and change management, and other cloud solutions that help organizations cut costs, improve productivity, and contribute to innovation, internal communication, and collaboration.

How Prometheus monitoring mixins can make effective observability strategies accessible to all

Three years ago, Tom Wilkie and Frederic Branczyk sketched out the idea for Prometheus monitoring mixins. This is a jsonnet-based package format for grouping and distributing logically related Grafana dashboards with Prometheus alerts and rules. The premise was that the observability world needed a way for system authors to not only emit metrics, but also provide guidance on how to use those metrics to monitor their systems properly.

Code Coverage Reports using Codacy and Codefresh

Where do you usually track your code coverage? If you are not sure about the answer to this question or you would like to explore other options to the ones that you are currently using, then this post is for you. Specifically, this post details how you can use Codacy in your Codefresh pipeline to create and send coverage reports of your repository with every pipeline build. To follow along, make sure to have a Codacy and a Codefresh account. If not, now is the time to set-up a fresh account for free!

Healthcare IT responds to pandemic with increased focus on database monitoring and the cloud

Every year, Redgate’s State of Database Monitoring Report reveals how businesses and organizations are monitoring their database estates. Are they using in-house or third-party monitoring tools? Who has access to the data? What are their biggest challenges? The thousands of responses to the survey behind the report offer the answers, and also provide an opportunity to dive deeper and examine those issues at an industry sector level.

Creating Custom Plugins Using The Snap Framework

SolarWinds® AppOptics™ was designed from the ground up as a SaaS-based APM tool for cloud-native and traditional IT implementations. It provides out-of-the-box monitoring for applications and infrastructure through simple-to-install APM libraries and host agents. AppOptics makes it easy for multiple teams to quickly assess the health and performance of your applications regardless of how or where they are implemented.

Why Cross-Domain Topology Seems Too Good To Be True

There are some things in life that seem too good to be true. So good, in fact, that they border on the edge of mythology. We see this often in the case of Cross-Domain Topology. Cross-Domain Topology ties together all the pieces of a hybrid, dynamic IT environment, so you can instantly see how changes impact your environment. It’s something that a lot of people didn’t even think was a possibility. While unicorns are myths, Cross-Domain Topology is very real. Here’s how it works.

Extending the Zero-Trust Security Framework to Your Home

Mixing your personal and work devices while connected to your home network and accessing the Internet is a risky proposition from a security and privacy standpoint. Why? I frequently monitor my firewall logs. What I observe on my WAN interface are blocked IP addresses sourced from adversarial nation states which makes the hair on the back of my neck stand up.

Icinga 2 Config Language (DSL): Advanced Apply Rules

As many users of Icinga don’t know what the DSL has to offer, I’m going to show you how to use custom variables and apply for rules to make your life easier when writing configuration for your Icinga environment. In this example we will use custom variables on a host to configure a dynamic set of services to monitor multiple web services behind a reverse proxy. On the host we define a custom dictionary called http_vhosts and assign our virtual hosts to it.