Operations | Monitoring | ITSM | DevOps | Cloud

%term

How Much Should My Observability Stack Cost?

What should one pay for observability? How much observability is enough? How much is too much, or is there such a thing? Is it better to pay for one product that claims (dubiously) to do everything, or twenty products that are each optimized to do a different part of the problem super well? It’s almost enough to make a busy engineer say “Screw it, I’m spinning up Nagios”. (Hey, I said almost.)

Whitelist Email Addresses: Thunderbird

TLDR; "If you expect to receive important emails from a trusted email address it is worth whitelisting the address to make sure that emails won't be accidentally blocked by an overzealous email client." In this post we show you how to do it in Mozilla Thunderbird by selecting the correct address book settings and adding the email address as a contact in your address book...

A Quick Guide to Encrypted Messaging

With it now being so easy to share information, we have a tendency to over-divulge. We check into public places online, tell the world when we’re going on holiday and where, and send and receive risqué photos. However, when it became public knowledge that the NSA, internet service providers, and trusted social media platforms were able to monitor our private messages, the choice to share or not to share was taken away from us.

Visualize your Thundra Monitoring data with Honeycomb

Visualize your Thundra monitoring data with Honeycomb. Identifying critical issues in your stateless serverless environments can be difficult. Often, you are left guessing at where the problems may lie. Learn how to pinpoint critical issues in your AWS Lambda environment with the deep query and end-to-end tracing.