Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Stabilizing Marathon: Part III

So far we covered team culture which amplifies our code culture and design. It was kind of abstract so far and you’ll be forgiven if you skipped right a way to this part. I will cover our test and release pipeline, the thing that probably has had the biggest impact on Marathon’s stability. The pipeline enabled us to discover issues before our users did. I will first give an overview of the pipeline stages and dive deep into the Loop. You will soon see what I meant by that.

Simple trap monitoring thanks to Pandora FMS SNMP alerts

The SNMP world is becoming more and more important within the monitoring environment, as companies need to find software that has specialized tools for trap monitoring. If you are not familiar with the term SNMP, take a look here. In this article, we will focus on Pandora FMS SNMP alerts, on how they work and how you can benefit from them.

Building a Python web application with Elastic App Search

This post is a brief summary of a presentation I gave recently where I deploy Elastic App Search, show off the ease of setup, data indexing, and relevance tuning, and take look at a few of the many refined APIs. It’s also written up in a codelab with step-by-step instructions for building a movies search engine app using Python Flask. The app will work on desktop or mobile and is a fast, simple, and reliable way to query the information.

10 Best NOC Dashboard Examples (in 2020)

Your network operations center (NOC) team plays an important role in your enterprise — and you want to do everything possible to help this team succeed. With these 10 best NOC dashboard examples, you can do just that. Bonus Material: NOC Automated Workflow Example PDF There’s no shortage of NOC dashboard examples, but deciding which ones work best for your enterprise NOC team can be challenging.

Drive 99.999% Uptime for Your Data Center by Supercharging your NOC

Your NOC data center is vital to your enterprise’s success, due to the fact that it bridges the gap between your computer network and telecommunications infrastructure. This center also enables your enterprise to quickly and effectively identify IT downtime and outages and address these incidents before they damage your enterprise and its stakeholders.

Australia's Department of Health Suffers PHI Breach Due to Pagers

In an unprecedented incident that has left medical authorities in Western Australia (WA) in disbelief, a local teenager has been found to be the mastermind behind a massive data breach. The breach intercepted thousands of names, phone numbers and communications between doctors responding to the COVID-19 crisis from their pagers. This is an unfortunate incident and a simple reminder of how pagers jeopardize the security of sensitive patient information.

What Is a Serverless Database? (Overview of Providers, Pros & Cons)

To put it simply, serverless computing is a cloud computing execution model meaning that the cloud provider is dynamically managing the distribution of computer’s resources. What’s taking up valuable computing resources is the function execution. Both AWS and Azure charge more if you have a combination of allocated memory and the function execution elapse time which is rounded up to 100ms.

Cloud Optimization: How to Squeeze More Value From Your Spend

Minimizing costs, reducing risk, and maximizing business value—all at the same time—requires a delicate balancing act. It’s not a new challenge, nor is it unique to IT infrastructures. But when it comes to the cloud, especially in hybrid cloud scenarios, it requires you to understand the performance, risk/compliance, and cost impacts of your current resource allocations and then adjust to maintain the optimal decisions to meet your SLA and budget targets.

Deploying AWS Microservices

There has been increasing buzz in the past decade about the benefits of using a microservice architecture. Let’s explore what microservices are and are not, as well as contrast them with traditional monolithic applications. We’ll discuss the benefits of using a microservices-based architecture and the effort and planning that are required to transition from a monolithic architecture to a microservices architecture.

Mitigating BootHole - 'There's a hole in the boot' - CVE-2020-10713 and related vulnerabilities

Today we released updates for a series of vulnerabilities termed ‘There’s a hole in the boot’ / BootHole in GRUB2 (GRand Unified Bootloader version 2) that could allow an attacker to subvert UEFI Secure Boot. The original vulnerability, CVE-2020-10713, which is a high priority vulnerability was alerted to Canonical in April 2020.