Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

The GitOps Kubernetes Connection

In the first article in this series, we talked about making Kubernetes essential to your DevOps pipeline. We reviewed CI/CD and DevOps and why their relationship with Kubernetes is so powerful. In this article, I’m going to dive into another term in the application development and management mix: GitOps. We’ll cover what GitOps is, how it affects an organization and how it aligns with Kubernetes.

Releasing icingabeat v7.5.2

We’re happy to announce a new version of icingabeat, v7.5.2. With this release we ensure the compatibility with Elasticsearch 7.x and Logstash 7.x. Icingabeat is an Elastic Beat that fetches data from the Icinga 2 API and sends it either directly to Elasticsearch or Logstash. To get you data forwarded, icingabeat connects to the Icinga 2 event stream and receives all events happening within Icinga in real time.

Kubernetes + Kublr Architecture

Kubernetes, the de facto container orchestrator, is great and should be part of any DevOps toolkit. But, just as any other open source technology, it’s not a full-fletched ready-to-use platform. To run in prod, you’ll need multiple addtional components such as logging and monitoring or RBAC integration. Check out our interactive Kubernetes architecture presetation to learn about key Kubernetes components and those added by Kublr.

How Making Cost a Non-Functional Requirement Helps the CloudZero Engineering Team Build Better Architecture

I never used to care about the cost of the systems I built. As an engineer, why would I? Especially in the days before the cloud, infrastructure resources were purchased and procured by somebody who worked many levels above me. Even when I first started building on the cloud, I had to submit requests (again, to somebody many levels above me) for my resources.

RapidAPI Review - A Guide On How To Use It

As an all-encompassing marketplace, RapidAPI has become a popular option for developers and vendors alike. So what does it have to offer and how can you harness it effectively to get the most out of its features and benefits? On the surface, the concept of RapidAPI is simple; it aims to act as your one-stop-shop for a wide variety of RESTful APIs which can be deployed to tackle a plethora of potential projects.

Intrusion detection techniques: monitor and react to unusual activity

Security monitoring is a constantly changing area; the threats can appear at any moment; when there are so called 0-day threats, there are quite few techniques available to efficiently prevent an unknown yet type of problem. However, there are typical behavior patterns that can be detected using well-known pieces of software and monitor types. Most techniques mentioned below are related to Unix-like systems; however, exactly the same approaches can be used for every operating system.