Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Whitelist Email Addresses: Thunderbird

TLDR; "If you expect to receive important emails from a trusted email address it is worth whitelisting the address to make sure that emails won't be accidentally blocked by an overzealous email client." In this post we show you how to do it in Mozilla Thunderbird by selecting the correct address book settings and adding the email address as a contact in your address book...

A Quick Guide to Encrypted Messaging

With it now being so easy to share information, we have a tendency to over-divulge. We check into public places online, tell the world when we’re going on holiday and where, and send and receive risqué photos. However, when it became public knowledge that the NSA, internet service providers, and trusted social media platforms were able to monitor our private messages, the choice to share or not to share was taken away from us.

Conquer it with correlation-Part 3: Cryptojacking

In the previous posts of this blog series, we discussed advanced persistent threats and data breaches, highlighting the importance of data security in today’s times. In the final post of this series, we’ll talk about cryptojacking, a type of attack that can severely affect your network’s integrity, and how you can combat it with event correlation.

How to Monitor CPU and Memory on Ubiquiti Unifi Devices

Retune AB manages a variety of Ubiquiti devices -- wireless data communication products for enterprise and wireless broadband providers. Naturally, we wanted to bring these in under monitoring. However, Ubiquiti does not expose real-time CPU or memory metrics through SNMP in a way that we found reliable and these are some of the key values needed to verify the health of the device.

Why Shift-Right is Essential for SaaS Applications

To many IT software teams, the mantra currently in vogue for team practice is “shift-left.” That refers to moving certain activities, such as code integration, build, and testing, earlier in the software development and delivery process. By shifting them to the left, the team knows more about code quality and performance earlier, allowing for corrective action and making them nimbler in response.

The Multi-faceted Use Cases and Benefits of Application Performance Monitoring Tools in Enterprise IT

Application performance monitoring (APM) solutions are among the most essential tools for IT today. As organizations undertake transformational initiatives such as cloud migration, container orchestration and microservices, they need to be able to manage performance of their business-critical applications and end-user experience across complex and sophisticated technology landscapes.

How Much Should My Observability Stack Cost?

What should one pay for observability? How much observability is enough? How much is too much, or is there such a thing? Is it better to pay for one product that claims (dubiously) to do everything, or twenty products that are each optimized to do a different part of the problem super well? It’s almost enough to make a busy engineer say “Screw it, I’m spinning up Nagios”. (Hey, I said almost.)