Operations | Monitoring | ITSM | DevOps | Cloud

%term

Real User Monitoring vs Synthetic Monitoring: Why You Need Both

When it comes to Application Performance Management (APM), there are two main technologies used to measure end-user perspective performance: synthetic monitoring (STM) and real user monitoring (RUM). We’ll discuss the pros and cons of each of the technologies especially related to monitoring third-party apps. Third-party apps like Office 365 and GSuite are experiencing a surge of growth for mission-critical purposes within business.

Startup CTO: How to Screen Software Engineers

Once you’ve got software engineers applying for your job opening, you’ll need to determine who is good enough to interview, and who is not. Additionally, you’ll want to make sure the time investment made by you and your team has a high return on investment. In this part of our series on hiring software engineers as the CTO of a startup, we’ll talk about Blue Matador’s approach to the screening process and the insights I’ve gained in this part of this CTO experience.

How we used Caddy and Laravel's subdomain routing to serve our status pages

We recently launched our new Status Page feature. Under the hood, it's using the Caddy proxy server and Laravel's subdomain routing to serve the right status page on the right domain. With this technology stack, we can automatically generate, configure & renewe the SSL certificates for custom domains of our clients. In this post we'll deep dive in to our current setup.

Time drift monitoring: Troubles of unsynchronized servers

A distributed IT infrastructure has many servers operating across multiple regions. Applying a single consistent time across servers will ensure isolated servers communicate in the proper time zone when exposed to the internet. When Microsoft encountered this problem back in 2017, the servers were offset by almost an hour, affecting a number of windows machines. With Reddit, it was a different case.

Kubernetes Master Class Day 2 with Stateful Applications - Implementing a Data Management Strategy

As teams start to onboard mission-critical applications such as databases and NoSQL systems into production, there’s a need to address critical Day 2 concerns. Dealing with regulatory requirements, user error, ransomware and cluster upgrades - requires safeguarding of both data and state. In this master class, we'll describe the challenges associated with implementing a robust data management strategy with Kasten's K10 platform and Rancher's RKE.

Easy Ingress Management on the Edge with K3s lightweight Kubernetes and Traefik

K3s and Traefik are partnering to speed up cloud native applications deployment. K3s, by Rancher, is the best way to have a lightweight, fully CNCF conformant Kubernetes cluster running on diverse infrastructures, including possible IoT appliances such as Raspberry Pis. K3s starts in seconds thanks to its light weight nature. As it adds some components to the cluster automatically, k3s is very easy to use and therefore very accessible for new users.

How to Get Stronger Consistency Out of a Datastore

Welcome to our series of blog posts about things Sentry does that perhaps we shouldn’t do. Don’t get us wrong — we don’t regret our decisions. We’re sharing our notes in case you also choose the path less traveled. In this post, we stretch technologies to their limits to see real-time data while handling traffic spikes.