Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Canonical announces the availability of Real-time Ubuntu for Amazon EKS Anywhere

Barcelona, Spain. 28 February 2024. Canonical today announced an expansion of its relationship with Amazon Web Services (AWS) to make Real-time Ubuntu available to Amazon Elastic Kubernetes Service Anywhere (Amazon EKS Anywhere) customers for use in Open radio access network (RAN) commercial deployments. With Real-time Ubuntu and Amazon EKS Anywhere, customers can benefit from ultra-reliable low-latency operating system performance and simplified Kubernetes cluster management.

Understanding How OpenTelemetry can help with PCI Compliance

The early days of e-commerce on the internet resembled a digital Wild West, characterized by unencrypted form inputs and clear-text storage of sensitive information. Fast forward to today, and the landscape of online payments has transformed dramatically, bolstered by industry-driven guide rails like the Payment Card Industry Data Security Standard (PCI DSS). These standards ensure that consumer details are stored appropriately and handled with the utmost care and security.

How ITSM Automation Improves DEX at Scale

As your organization grows, manual processes that were once convenient become increasingly inconvenient. They’re now cumbersome, slow, plainly inefficient and hinder opportunities for innovation. This is worsened by the rapid onset of digital transformation. Some organizations report that this transformation was accelerated by three to five years since 2020 by the pandemic.

Introducing Next-Level Innovations on Virtana's AIOps Platform

In an era defined by rapid technological advancements and complex digital infrastructures, implementing advanced capabilities is how IT leaders stay ahead of the curve. We are at the forefront of this revolution, continuously evolving to meet and exceed the demands of modern IT landscapes. Today, we are thrilled to announce a series of innovative features and capabilities designed to transform how organizations manage and optimize their digital environments.

How to train your team to use out-of-band communication systems

Out-of-band communication systems are critical to keeping IT, operations, and security teams securely connected during emergencies and mission-critical scenarios. By equipping team members with a communication channel that exists outside the organization’s primary network, decision-makers and leaders can rest assured that their teams can collaborate effectively when main communication channels are inaccessible or have been infiltrated.

The Frugal Architect, Law III: Architecting Is A Series Of Trade-Offs

This is part three of seven in our Frugal Architect blog series. Read part one here, and part two here. In case you weren’t as giddy as CloudZero was at re:Invent this past year, we wanted to recount the seven laws outlined by Werner Vogels, Amazon’s CTO, which he’s bundled into a framework called “The Frugal Architect” (check out the whole framework here). What is “The Frugal Architect”?

Much Ado About OpenTelemetry

There is so much good work that OpenTelemetry has done in the software industry, specifically around the domain of observability, in the last five years. Bringing users and vendors together to define the future of telemetry? Check! Unify logs, traces, and metrics under a completely vendor-neutral API? Check! Deprecate other standards by bringing their collaborators to the table to ensure their use cases are met? CHECK!

Easy guide to Monitoring Puppet with Telegraf and MetricFire

Monitoring your Puppet runs and automations is essential for maintaining performance, reliability, security, and compliance of your infrastructure. It allows you to stay ahead of potential issues, optimize resource utilization, and ensure a smooth and efficient operation of your database system.

Beyond Logs: Navigating Entity Behavior in Splunk Platform

Identifying bad actors within your organization often feels like a complicated game of hide and seek. A common comparison is that it's akin to finding a needle in a haystack. So, if the bad actor represents the 'needle' and your organization the 'haystack,' how would you uncover these bad actors? Perhaps the quickest way to find the needle is by burning the haystack. Alternatively, dumping the hay into a pool of water and waiting for the needle to sink to the bottom could also work.