Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Three Ways Federal Agencies Can Manage and Secure Their Hybrid Data Centers

As hybrid environments become more popular, federal IT teams are faced with managing and securing their on-premises and cloud infrastructures, while minimizing costs—and there’s no single tool or approach that can solve all these problems. With this in mind, let’s look at three ways federal agencies can address these challenges by adopting new mindsets, tools, and best practices.

DNS Monitoring 101: Verify DNS Mapping

This Tip of the Day is the first in a three-part series on Domain Name System (DNS) monitoring. The Domain Name System is often described as “the phonebook of the Internet.” While humans access the Internet via domain names such as npr.org or bbc.com, web browsers interact via Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so that browsers know which Internet resources to load.

Dispatch evolves as the only Kubernetes native, CI/CD platform leveraging Tekton, ArgoCD and more

Responsibilities are shifting between software developers and operators due to the increasing adoption of agile development practices, DevOps, and GitOps. This makes it challenging for developers and operators to effectively collaborate in order to increase developer agility and productivity. D2iQ’s Dispatch is built on a cloud native foundation, leveraging Tekton and Argo CD to simplify running CI/CD on Kubernetes with a simplified user experience.

A Next Step Beyond Test Driven Development

The most successful software development movement of my lifetime is probably test-driven development or TDD. With TDD, requirements are turned into very specific test cases, then the code is improved so the tests pass. You know it, you probably use it; and this practice has helped our entire industry level up at code quality. But it’s time to take a step beyond TDD in order to write better software that actually runs well in production. That step is observability driven development.

Kubernetes observability tutorial: Log monitoring and analysis

Kubernetes has emerged the de facto container orchestration technology, and an integral technology in the cloud native movement. Cloud native brings speed, elasticity, and agility to software development, but also increases the complexity — with hundreds of microservices on thousands (or millions) of containers, running in ephemeral and disposable pods. Monitoring such a complex, distributed, transient system is challenging, and at the same time very critical.

Kubernetes observability tutorial: K8s cluster setup and demo app deployment

The easiest way to get the Elastic Stack up and running for this tutorial, is to spin up a 14-day free trial of our Elasticsearch Service on Elastic Cloud. A few clicks (no credit cards) and you’ll have your cluster up and running. Or if you prefer, download the Elastic Stack and install locally. All of the instructions in this tutorial can be easily amended to work with a standalone Elasticsearch cluster on your own hardware.

3 Reasons to Use Auvik's Remote Management Features

In today’s world, it isn’t always practical or possible to be on site to troubleshoot every network issue that pops up. Whether you’re under mandatory stay-at-home orders because of a global pandemic, in the middle of a surprise snowstorm, or sleeping cozy in your bed 60 miles away, being able to access remotely the network would make your life infinitely easier. With Auvik’s remote management features, it’s possible.

Enterprises that halted IT cloud migrations have been hit with 2.5x outages during global pandemic, new research highlights

Survey respondents who continued their cloud journey experienced less IT performance issues—Virtana and Enterprise Management Associates (EMA) to present full survey findings during June 25th webinar

How To Keep Track Of Your Android Applications

Keeping track of application usage and the installation of software on your Android phone or tablet is an essential activity, both for device management and your overall security. In this regard, it’s also advisable to monitor how your Android applications are tracking you, in terms of your physical location, activities on the local device, and online. Here are some tips on how to achieve this.

Wireless Beyond Wi-Fi: Trends to Watch

For more than a decade, the face of wireless has been IEEE 802.11 WLANs, your typical Wi-Fi networks prevalent in every home and business. In 2020 and beyond, the line is trending toward RF-based technologies departing from our common WLAN technologies. Tomorrow’s wireless networks will impact every organization and professional, as we work to incorporate, manage, and secure these deviant technologies.