Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Cost-Efficient Ways to Run DynamoDB Tables

As we all know, the on-demand capacity mode of DynamoDB is great but can be cost-prohibitive in some cases (up to seven times more expensive than the Provisioned Capacity mode). The Provisioned mode, on the other hand, shifts to the development team the burden of predicting what level of capacity will be required by the application. And it’s not quite as straightforward to achieve the same level of scalability in the Provisioned mode as we enjoy in the On-demand one.

MySQL Log File Location

Logs are valuable. Logs generated by a major backend resource that provides clients with access to crucial data are more than just valuable; knowing where they are and being able to manage and understand the information that they contain can mean the difference between smooth, secure operation and degraded performance or even catastrophic failure for your application. MySQL Server produces a handful of basic logs.

Quick start monitoring by using lightweight monitors

There are instructions to get started with IPHost Network Monitor, covering most typical situations. However, using the defaults (for both monitors parameters and for network discovery) when looking for hosts and/or monitors can result in rather slow setup. In most cases, it is simpler to create "draft", lightweight monitors just to make sure the service exists and accepts connections, and add actual protocol-specific checks as required.

Gaining Visibility and Control Over Solar Energy Storage Devices Using InfluxDB Cloud

Energy storage and sustainability are big issues in Hawaii, where oil tankers are shipped in everyday, just to keep the lights on. Resiliency in the energy grid, due to threat of natural disaster, is critical. Energy storage is needed to manage how much solar energy is coming into the market or into the grid. Properly managing the power entering the grid is vital for grid stability since Hawaii has intermittent energy that floods the grid.

Prometheus for multi-cluster setups

This tip is for those who are using Prometheus federation to monitor multiple clusters. How should alertmanager be configured for multiple clusters? Let us say that if there’s an issue for Cluster A it only needs to send an alert for cluster A? In such cases, every alert should be routed to proper team based on labels (if there is problem with application A on cluster B - team responsible should be notified). In the above case, two alerts are triggered by the same rule.

Monitor Carbon Black Defense logs with Datadog

Creating security policies for the devices connected to your network is critical to ensuring that company data is safe. This is especially true as companies adopt a bring-your-own-device model and allow more personal phones, tablets, and laptops to connect to internal services. These devices, or endpoints, introduce unique vulnerabilities that can expose sensitive data if they are not monitored.

7 Configurations to Enhance the Performance of Your Java Web Applications

There has been a lingering perception that Java applications are slower than applications written in other languages. So, if performance is important for your application, you should not be considering Java as the programming language to use. This perception was true about 20 years ago, when Java was initially used for developing applications. In the early Java implementations, it took a long time for the Java Virtual Machine (JVM) to start.

Mirco Hering on Getting Past DevOps Inertia

Mirco Hering is principal director of APAC DevOps and Agile with Accenture. He supports major public and private sector companies in Australia and overseas in their search for efficient IT delivery. Mirco blogs about IT delivery at NotAFactoryAnymore.com and is author of “DevOps For The Modern Enterprise: Winning Practices to Transform Legacy IT Organizations.”

Capturing and Containing Hidden Cloud Costs-How Overprovisioning Can Hurt Your Budget

The traditional method of planning server, network, and storage capacity is to look at the usage peaks and then add a safety margin. Most cloud hosting is planned this way. The idea that you only pay for what you use is not based on actual usage, rather on the capacities you initially specify. Most cloud migrations involve a ‘lift and shift’ approach of moving an application to a different host with minimal maintenance.