Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

What Is Identity & Access Management and What Does It Mean for You?

Identity & Access Management (IAM) is the central administration of identities and access rights in a company. Authentication and authorization are essential components with which identities are managed and access rights for linked solutions, systems, applications and resources are controlled. It may sound complicated, but this can be easily explained using a practical example.

Monitoring for Citrix Digital Workspaces

eG Innovations has been a Citrix partner since 2003. Those were the days when Citrix’s messaging was around “access”. Thin client computing and then server-based computing were the hot topics. Discussions around the efficiency of RDP and ICA ruled and Citrix Resource Manager was the best way to monitor a Citrix server. What was then Citrix MetaFrame soon became Citrix Presentation Server, then Citrix XenApp, and now Citrix Virtual Apps.

Catchpoint Digital Monitoring: Offering lowest cost options without compromising quality

SaaS monitoring platforms must provide a flexible set of capabilities to their customers. A platform with the ability to adjust according to business needs reduces costs (e.g. the cost to switch) and tool sprawl since the need to perform different monitoring functions can be accommodated in a single place. A monitoring platform should allow you to adjust, for example: Not all digital experience monitoring platforms are the same.

Keeping PagerDuty Always On With Remote Incident Response

Earlier this month, many areas of the internet experienced a major incident caused by a router misconfiguration within a highly used service provider. This led to cascading service failures, causing widespread outages and disruptions for several well-known SaaS organizations. When the outage occurred, our teams at PagerDuty immediately noticed a global spike in events and incidents.

Getting Github Data with Webhooks (Part 2)

After my last blog around sending Github Data to Splunk via Webhooks, I received a healthy amount of feedback that I want to address here. I learned that (unsurprisingly) a lot of customers are curious about, or dependant on, other cloud platforms out there. In fact, I heard directly from some customers who specifically cannot use any other cloud platforms than one in particular that was not highlighted in my last blog.

Reign in the Chaos of Security Threats with ChaosSearch

The Covid-19 pandemic has had an incredible impact on the world as nations work to keep their economies moving, secure the health and welfare of their citizens through social distancing, testing, and an immediate transition to remote work and classrooms. The world is adopting these measures while anxiously waiting for the great scientific institutions and private enterprises to test and deliver a vaccine to eradicate the SARS-CoV-2 coronavirus we know as Covid-19.

Kubernetes Security Best Practices You Must Know

Kubernetes (k8s) enables you to efficiently orchestrate container management, in the cloud or on-premises. As a whole, k8s provides many benefits, including features for self-healing, automated rollouts and rollbacks, load distribution, and scalability. However, k8s is a highly complex platform and requires extensive configuration.

Charmed OSM Release EIGHT available from Canonical

Canonical is proud to announce the general availability of OSM release EIGHT images in it’s Charmed OSM distribution. As of Release SEVEN, OSM is able to orchestrate containerised network functions (CNFs) leveraging Kubernetes as the underlying infrastructure for next-generation 5G services. Release EIGHT follows the same direction and brings new features that allow for the orchestration of a broader range of network functions and production environments.

Logging Best Practices Part 4: Text-based logging

Isn’t all logging pretty much the same? Logs appear by default, like magic, without any further intervention by teams other than simply starting a system… right? While logging may seem like simple magic, there’s a lot to consider. Logs don’t just automatically appear for all levels of your architecture, and any logs that do automatically appear probably don’t have all of the details that you need to successfully understand what a system is doing.