Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Website Security: Web Monitoring Tips for Keeping Your Site Safe

With the constant threat of DDoS, DNS attacks, malware, and data breaches; website security is a top priority for today’s tech teams. You’ve taken the appropriate measures. Your domain uses HTTP/S, SSL encryption, and is locked up tight. Or is it? In 2018, Symantec reported over 70 million records were leaked or stolen because of misconfigured S3 buckets.

Deploying Redis Cluster on top of Kubernetes

Redis (which stands for REmote DIctionary Server) is an open source, in-memory datastore, often used as a database, cache or message broker. It can store and manipulate high-level data types like lists, maps, sets, and sorted sets. Because Redis accepts keys in a wide range of formats, operations can be executed on the server, which reduces the client’s workload. It holds its database entirely in memory, only using the disk for persistence.

Navigating Network Services and Policy With Helm

Deploying an application on Kubernetes can require a number of related deployment artifacts or spec files: Deployment, Service, PVCs, ConfigMaps, Service Account — to name just a few. Managing all of these resources and relating them to deployed apps can be challenging, especially when it comes to tracking changes and updates to the deployed application (actual state) and its original source (authorized or desired state).

What is DNS? Some basic concepts

What is DNS? DNS is the Domain Name System, or the hierarchical system of nomenclature that orders the names of members who connect to IP networks, such as the Internet. In this article we will briefly learn what DNS is, how it works, what it is used for and some of its advantages and disadvantages. What is DNS? Shall we begin?

Reduce Incident Downtime and Fix Outages Sooner with Policy-Based Alert Escalation Management

Proactive Incident Analysis, Diagnosis, and Resolution with Service-Centric AIOps. Alerts define the state of an infrastructure resource, application, or any other IP discoverable device. Organizations take action on alerts based on business impact and priority and ensure that IT service performance meets the required standards for availability, usability, and security.

Key ECS metrics to monitor

Amazon Elastic Container Service (ECS) is an orchestration service for Docker containers running within the Amazon Web Services (AWS) cloud. You can declare the components of a container-based infrastructure, and ECS will deploy, maintain, and remove those components automatically. The resulting ECS cluster lends itself to a microservice architecture where containers are scaled and scheduled based on need.

Tools for ECS monitoring

In Part 1, we introduced a number of key metrics that you can use for ECS monitoring. Monitoring ECS involves paying attention to two levels of abstraction: the status of your services, tasks, and containers, as well as the resource use from the underlying compute and storage infrastructure, monitored per EC2 host or Docker container. In this post, we’ll survey some techniques you can use to monitor both levels of your ECS deployment.

Monitoring ECS with Datadog

As we explained in Part 1, it’s important to monitor task status and resource use at the level of ECS constructs like clusters and services, while also paying attention to what’s taking place within each host or container. In this post, we’ll show you how Datadog can help you: Automatically collect metrics from every layer of your ECS deployment, Track data from your ECS cluster, plus its hosts and running services in dashboards, and more.