Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Is That Bot Really Googlebot? Detecting Fake Crawlers with HAProxy Enterprise

Detect and stop fake web crawlers using HAProxy Enterprise’s Verify Crawler add-on. How your website ranks on Google can have a substantial impact on the number of visitors you receive, which can ultimately make or break the success of your online business. To keep search results fresh, Google and other search engines deploy programs called web crawlers that scan and index the Internet at a regular interval, registering new and updated content.

Deploy your Kubernetes clusters on-premises with AWS Outposts

Spot by NetApp is excited to announce our designation as an AWS Outposts Ready Partner, as part of the (Amazon Web Services) AWS Service Ready Program. Ocean by Spot can now be deployed on AWS Outposts, bringing the serverless container experience to workloads that require the performance, low latency and availability of on-premise.

An Introduction to Kubernetes and Its Uses

It's easy to get lost in today's continuously changing landscape of cloud native technologies. The learning curve from a beginner's perspective is quite steep, and without proper context it becomes increasingly difficult to sift through all the buzzwords. If you have been developing software, chances are you may have heard of Kubernetes by now. Before we jump into what Kubernetes is, it's essential to familiarize ourselves with containerization and how it came about.

Rancher Recognized as a Leader in Latest Forrester Wave

The enterprise Kubernetes management space has definitely become a lot more crowded over the past two years as traditional vendors and startups alike attempt to grab a slice of this massive market. The increasingly competitive vendor landscape makes Forrester’s recent recognition of Rancher Labs that much more meaningful.

What is Docker Monitoring?

We have come a long way in the world of computing. From having computers that fill up entire rooms or buildings while performing relatively basic actions to having complex machines that literally fit in our pockets and palms, this advancement has been nothing short of breathless. With an emphasis placed on speed and efficiency, computers and the applications running on these computers have been tailored to ensure optimal use of resources, be these resources hardware or software resources.

Mattermost joins Red Hat, GitHub and Google in the CVE Program to maintain an international, open data registry of security vulnerabilities

Mattermost is joining Red Hat, Google, and GitHub and over 130 other leading technology organizations authorized to be a Common Vulnerabilities and Exposures (CVE) Numbering Authority (CNA) by the CVE Program. The world’s most privacy-conscious enterprises and governments rely on Mattermost’s self-hosted, open source collaboration platform to keep their most vital communications safe and sovereign.

Three Ways Agencies Can Improve Cloud Security and Performance

The Federal Cloud Computing Strategy (FCCS) makes it clear government agencies have significant responsibilities for protecting cloud-hosted data. The FCCS states the need for agencies to develop their own governance models and create service level agreements to ensure they’ll have continuous access to log data and prompt notification from their cloud service provider if there’s a breach.

Keeping Clean with CloudZero Dashboard: Our Latest Updates

Here at CloudZero, we’ve made some updates to our dashboard that we’re excited to share with you! I actually prefer this original definition. When you hear the word dashboard, if you’re not thinking about software, you’re probably picturing the place in a car where you have various dials and readouts for safe operation of the vehicle. But did you know what the term dashboard predates cars?

Enriching data with GeoIPs from internal, private IP addresses

For public IPs, it is possible to create tables that will specify which city specific ranges of IPs belong to. However, a big portion of the internet is different. There are company private networks with IP addresses of the form 10.0.0.0/8, 172.16.0.0/12 or 192.168.0.0/16 scattered in every country in the world. These IP addresses tend to have no real information for the geographic locations.