Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

5 Serverless AWS Core Services Everyone Should Have in Their Starter Toolkit

When first looking into serverless migration and its architecture, it can feel like you’re staring down an endless shopping aisle of critical serverless tools that all need to be put into your basket straight away. Some services seem to offer the same function, while others can feel wildly different - both, as a result, can instill some doubts as to what is really necessary for your business and serverless application.

Monitoring Your Dynamic Cloud Infrastructure

Fully taking advantage of cloud infrastructure includes the ability to scale up and down dynamically, taking the need and load off your services. The compute services like Amazon Web Services (AWS) EC2, Azure Virtual Machines (VM), and Google Cloud Platform (GCP) Compute Engine allow Auto Scaling of the instances of the service. This helps manage the responsiveness and costs of your cloud services by ensuring that the instance counts go up and down depending on demand.

Why should an Enterprise Invest in Containerization of Applications Instead of Lift-and-Shift

In our series of blog posts based on Automated Containerization, here is another quick read on why Enterprises should invest in containerization of applications instead of Lift-and-Shift approach. Legacy applications can be slow and expensive to maintain. If you use the Lift-and-Shift approach to migrate applications to cloud is relatively inexpensive, but ongoing operating costs can be exactly the opposite. The contention is that applications perform and evolve relative to their environments.

SolarWinds Gives IT Pros New Levels of Hybrid IT Support With Enhanced IT Operations Management Portfolio

Introduces new and improved software-defined solutions support, AWS and Azure workload troubleshooting and visibility, and full-stack application and infrastructure monitoring capabilities

What the Cloud Native Revolution Means for Log Management

This was originally posted on The New Stack. Once upon a time, log management was relatively straightforward. The volume, types, and structures of logs were simple and manageable. However, over the past few years, all of this simplicity has gone out the window. Thanks to the shift toward cloud native technologies—such as loosely coupled services, microservices architectures, and technologies like containers and Kubernetes—the log management strategies of the past no longer suffice.

Complete Guide to Lambda Triggers and Design Patterns (Part 1)

A while ago, we covered the invocation (trigger) methods supported by Lambda and the integrations available with the AWS catalog. Now we’re launching a series of articles to correlate these integration possibilities with common serverless architectural patterns (covered by this literature review). In Part I, we will cover the Orchestration & Aggregation category. Subscribe to our newsletter and stay tuned for the next parts of the series.

Suggested Cloud Monitoring Strategies for IaaS, PaaS, and SaaS

From the Cloud First policy established in 2010 to last year’s Cloud Smart update, it’s clear the government is driving federal agencies toward cloud computing. The strategy makes sense, but for agencies migrating, however, the decision is less clear cut, because there are several options agencies can choose based on individual agency needs.

Becoming Hybrid: Operating Your Cloud Environment

It’s a day for celebration! Our migration is complete, and our applications are now running in the cloud environment best suited to their needs. The rest of our application inventory, the ones not cut out for the cloud, remain on-premises where they belong. Actually…we’re not done yet. We still have some work to do to make sure our hybrid environment runs smoothly and delivers the business value we expect. Fortunately, we aren’t the first ones to travel this path.

Guide to Serverless Information Security

Information security (infosec) is a broad field. Its practitioners behave more like artists than engineers. After all, the mandate for security is not “do X”, but instead “ensure no one can do X, Y, Z, ɑ, β, ɣ, etc.”. The array of possibilities leading to infosec failure are vast. It’s like trying to prove a negative, thus making the task near impossible. On one hand we have an impossible task, on the other we have the affordance of time.