Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Tips for Finding Reliable, High-Quality Flame Resistant Clothing

In the evolving field of safety apparel, advancements in technology and materials are constantly improving the protection and comfort offered to those working in hazardous environments. Yet, not every piece of flame-resistant clothing (FRC) meets the same standards of safety and quality. Certified and tested garments adhere to established safety codes, ensuring your personal protective equipment (PPE) provides the necessary defense against hazards. This guide will highlight key aspects of selecting superior FR clothing and the proper flame resistant clothing maintenance to extend its protective lifespan.

Graylog Parsing Rules and AI Oh My!

In the log aggregation game, the biggest difficulty you face can be setting up parsing rules for your logs. To qualify this statement: simply getting log files into Graylog is easy. Graylog also has out-of-the-box parsing of a wide variety of common log sources, so if your logs fall into one of the many categories of log for which there is either a dedicated Input; a dedicated Illuminate component; or that uses a defined Syslog format; then yes, parsing logs is also easy.

Closing the Interconnection Data Gap: Integrating PeeringDB into Kentik Data Explorer

Kentik users can now correlate their traffic data with internet exchanges (IXes) and data centers worldwide, even ones they are not a member of – giving them instant answers for better informed peering decisions and interconnection strategies that reduce costs and improve performance.

Understanding SharePoint Online Licensing and Pricing

Imagine a place where all your work documents, projects, and team collaborations live—a space that’s not just in the office but accessible from anywhere, at any time. That’s SharePoint Online for you. It’s a cloud-based service, hosted by Microsoft, designed to empower organizations to share and manage content, knowledge, and applications.

Introduction to Kublr with Ceph

Imagine this scenario: You deploy your Kubernetes cluster using Kublr and integrate Ceph storage into the mix effortlessly. Suddenly, all your managed Kubernetes clusters gain access to Ceph, leveraging its features to enhance performance, reliability, and scalability. With Ceph added to the mix, data storage in Kublr becomes even more streamlined.

5 things to look for in a database monitoring tool

Databases are the backbone of enterprise-level organizations, facilitating efficient data management, supporting critical business processes, and providing a foundation for secure innovation and growth. Effective database monitoring is critical for maintaining a high level of performance, security, and reliability in database systems, particularly in enterprise-level environments where large volumes of data and critical business operations are involved.

Icinga 2 API and debug console

Have you ever experienced configuration issues, such as notifications not being sent as expected or apply rules not matching all expected objects, probably due to an incorrectly set custom variable? Icinga 2 has several options to assist you in such situations. Last time, Julian demonstrated how to analyse such problems using the icinga2 object list command. Today I will show you how to interactively investigate your problem using the mighty Icinga 2 debug console.

Navigating User Experience, Performance & Security

In the ever-evolving digital landscape, where users expect lightning-fast, seamless experiences, a thoughtful balance needs to occur between creating a unique website experience and achieving optimal performance whilst tackling the mounting threats posed by cybercriminals. This predicament places website owners and developers at a crossroads: How can they achieve great user experience (UX) while upholding stringent security protocols with a well-performing website?