Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

How to scale your monitoring with Sensu clustering

I recently led a webinar for the Sensu community on how to scale your monitoring by setting up a three-node cluster in Sensu Go using Sensu’s embedded etcd. Clustering improves Sensu’s availability, allows for node failure, and distributes network load. In this post, I’ll recap the webinar and provide demos on how to set up, back up, and restore your etcd cluster, including best practices for success.

Find What You Need! All About Our New Search Tool.

Product Releases Update Our new Search tool allows you to quickly build detailed queries without having to leave the page. Our new search tool expands on our column filtering feature. You can now create even more detailed queries by filtering on 20 unique criteria. New for this release is the ability to search Call Stack Function Names, Call Stack File Names, and Call Stack Line Numbers.

OpenStack Ussuri available on Ubuntu 18.04 LTS and 20.04 LTS

Canonical today announced the general availability of OpenStack Ussuri on Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. The most notable enhancements of today's OpenStack upstream release are stabilisation efforts around the Open Virtual Networking (OVN) driver and the Masakari project which allow organisations to run highly available workloads on the top of an open source software-defined networking (SDN) platform. Full commercial support for OpenStack Ussuri in Canonical's Charmed OpenStack distribution will come with the OpenStack Charms 20.05 release on May 20th.

Quickly Duplicate Triggers Across Apps in AppSignal

We’re happy to announce that we’ve added a new feature which will make it easier for you to copy your trigger setup from one app to a new one. Anomaly detection triggers are a great way to get notified about unwanted events in your app. These anomalies are things like a high error rate, a lack of free disk space, or a high CPU usage. If your apps have a lot of the same requirements and infrastructure, you may have a lot of the same triggers across your apps.

How to deploy an app to AWS: Route 53 and DNS explained

In our series on how to deploy an app to AWS with the least effort, we've talked about getting started, preventive measures, and securing your app. Today, we're going to focus on DNS (domain name system), specifically the AWS DNS service Route 53. As you're deploying your web app, you will inevitably use DNS.

Breaking down network complexities with network mapping

Is it possible for network engineers to gain complete visibility over all the components in an enterprise network? With new devices constantly connecting and disconnecting, creating a mental image of the entire network is impossible. This is where network mapping comes in. Using Simple Network Management Protocol (SNMP), you can see a visual representation of your network and every connected device for an easy-to-understand look at your dynamic network.

Enterprise Cloud MVC Requirements

A Minimum Viable Product (MVP) in software development is often what we strive for when proving a case for improvement or product. With the movement toward the cloud infrastructure, we should start striving for a Minimum Viable Cloud (MVC). An MVC consists of everything needed to get a cloud environment up and running. The main services of cloud infrastructure are Communication, Application, and Storage.

Empire Office Gains Critical Insights into Remote Worker Trends with End-User Productivity Report

Empire Office is the United State’s largest commercial furniture dealer, providing creative and cost-effective workspace solutions. Based in Manhatten, NY, the epicenter of the COVID-19 outbreak, they were mandated to immediate stay at home orders, forcing their entire workforce to work from home. Fortunately, their Senior Vice President and CIO, Michael Pfaeffle, had already enabled the teams to work remotely by investing in Citrix XenApp a few years prior.

The New Normal & Unified Communications

As I wrote in a previous blog post, the world has undergone massive changes that have created chaos for CIOs as they struggle to ensure operational continuity, including when in scenarios where things change in an unprecedented fashion overnight. What does operational continuity look like as the world moves forward in the paradigm of the new normal?

Cybersecurity use cases for better remote workforce management

In the new normal, if your business has chosen remote operations, this might attract malicious actors. Hackers prey on the remote workforce whose vulnerability has increased in multifold ways. While infrastructural concerns, such as working outside the corporate IT network and using home Wi-Fi are inevitable, other issues, including using personal devices and retaining privileges to access more than required business resources add to the magnitude of this vulnerability.