Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Make sense of SCOM Alerts with SquaredUp 4.7

One of the most common complaints about SCOM is the noisiness of alerts from Management Packs. Getting on top of these alerts can be a huge challenge and often the thing that most gets in the way of an organization getting value out of SCOM. In SquaredUp for SCOM 4.7, our recent feature-packed update, we bring you three new alert-handling super-powers to help you get on top of alerts.

New in Grafana 7.1: Gain new data insights with InfluxDB and Flux query support

The audience was buzzing when Ryan McKinley, VP of Innovation at Grafana Labs, demoed the new native support for InfluxDB Flux queries in his talk at the InfluxDays virtual conference in late June. Whether the goal is to build IoT applications, or monitor DevOps infrastructure or another application or system, it’s important to move beyond just visualizing the data.

The Pain of Debugging WebAssembly

If you know anything about WebAssembly (WASM), it’s probably that WASM lets you execute code compiled from languages such as C, C++, Rust, or others in the browser at almost native speeds. You might be less familiar with the fact that WASM is not only an interesting technology in the browser, but also in other environments that require fast sandboxing. As such, WASM has found some popularity with edge computing and as a lightweight docker replacement for certain situations.

Automate registry scanning with Harbor & Sysdig

Discover what registry scanning is, how it helps with shifting security left, and how you can implement it using Harbor and Sysdig. Shifting security left is all about moving security to the earliest possible moment in the development process, dramatically improving “time to fix” and security impact. In this article, we’re going to show you how to shift left with Harbor registry and Sysdig Secure.

Disaster Recovery Preparedness for Your Kubernetes Clusters

In the pre-Kubernetes, pre-container world, backup and recovery solutions were generally implemented at the virtual machine (VM) level. That works for traditional applications when an application runs on a single VM. But when applications are containerized and managed with an orchestrator like Kubernetes, this system falls apart. That means effective disaster recovery (DR) plans for Kubernetes must be designed for containerized architectures and natively understand the way Kubernetes functions.

How to optimize your logging costs

CIOs see data costs as their greatest logging challenge to overcome, according to this survey we collaborated on with IDC. If you’re running significant production operations, you’re almost certainly generating 100’s of GB of log data every day. Naturally, you’re also monitoring those logs and querying for incident investigations. However, most log data is never queried or analyzed, yet makes up the majority of logging costs.

Ensuring Availability and Security for Remote Workers

The year 2020 has seen various changes throughout the world but no change has seen more of an impact than the Corona-virus. During this epidemic, workers from all industries have moved from a traditional office-based role to WFH (Working From Home). It’s known as a business transforms it brings new risks associated with it. New and emerging technologies and the practices they involve require operational, policy and security measures to be implemented and evolved over time.

Continuous Deployment vs. Continuous Delivery: What is the difference?

Being in the DevOps space, we're often asked questions about software deployment like, "What's the difference between continuous deployment and continuous delivery?", "What is continuous deployment?", and "Are continuous deployment and continuous delivery the same thing?" So first, let's start by clearly defining these terms.