Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Monitoring for Citrix Digital Workspaces

eG Innovations has been a Citrix partner since 2003. Those were the days when Citrix’s messaging was around “access”. Thin client computing and then server-based computing were the hot topics. Discussions around the efficiency of RDP and ICA ruled and Citrix Resource Manager was the best way to monitor a Citrix server. What was then Citrix MetaFrame soon became Citrix Presentation Server, then Citrix XenApp, and now Citrix Virtual Apps.

Catchpoint Digital Monitoring: Offering lowest cost options without compromising quality

SaaS monitoring platforms must provide a flexible set of capabilities to their customers. A platform with the ability to adjust according to business needs reduces costs (e.g. the cost to switch) and tool sprawl since the need to perform different monitoring functions can be accommodated in a single place. A monitoring platform should allow you to adjust, for example: Not all digital experience monitoring platforms are the same.

Keeping PagerDuty Always On With Remote Incident Response

Earlier this month, many areas of the internet experienced a major incident caused by a router misconfiguration within a highly used service provider. This led to cascading service failures, causing widespread outages and disruptions for several well-known SaaS organizations. When the outage occurred, our teams at PagerDuty immediately noticed a global spike in events and incidents.

Reign in the Chaos of Security Threats with ChaosSearch

The Covid-19 pandemic has had an incredible impact on the world as nations work to keep their economies moving, secure the health and welfare of their citizens through social distancing, testing, and an immediate transition to remote work and classrooms. The world is adopting these measures while anxiously waiting for the great scientific institutions and private enterprises to test and deliver a vaccine to eradicate the SARS-CoV-2 coronavirus we know as Covid-19.

Kubernetes Security Best Practices You Must Know

Kubernetes (k8s) enables you to efficiently orchestrate container management, in the cloud or on-premises. As a whole, k8s provides many benefits, including features for self-healing, automated rollouts and rollbacks, load distribution, and scalability. However, k8s is a highly complex platform and requires extensive configuration.

Charmed OSM Release EIGHT available from Canonical

Canonical is proud to announce the general availability of OSM release EIGHT images in it’s Charmed OSM distribution. As of Release SEVEN, OSM is able to orchestrate containerised network functions (CNFs) leveraging Kubernetes as the underlying infrastructure for next-generation 5G services. Release EIGHT follows the same direction and brings new features that allow for the orchestration of a broader range of network functions and production environments.

Logging Best Practices Part 4: Text-based logging

Isn’t all logging pretty much the same? Logs appear by default, like magic, without any further intervention by teams other than simply starting a system… right? While logging may seem like simple magic, there’s a lot to consider. Logs don’t just automatically appear for all levels of your architecture, and any logs that do automatically appear probably don’t have all of the details that you need to successfully understand what a system is doing.

Getting Github Data with Webhooks (Part 2)

After my last blog around sending Github Data to Splunk via Webhooks, I received a healthy amount of feedback that I want to address here. I learned that (unsurprisingly) a lot of customers are curious about, or dependant on, other cloud platforms out there. In fact, I heard directly from some customers who specifically cannot use any other cloud platforms than one in particular that was not highlighted in my last blog.

Unfolding the Twitter security incident

In case 2020 wasn’t dystopian enough, here’s some more unbelievable news. On July 15, 2020, social media giant Twitter admitted it fell victim to a security breach. The attackers targetted 130 Twitter accounts, including several belonging to high-profile individuals such as elected officials; former president Barack Obama; and business leaders including Bill Gates, Jeff Bezos, and Elon Musk.