Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Why use Typha in your Calico Kubernetes Deployments?

Calico is an open source networking and network security solution for containers, virtual machines, and native host-based workloads. Calico supports a broad range of platforms including Kubernetes, OpenShift, Docker EE, OpenStack, and bare metal. In this blog, we will focus on Kubernetes pod networking and network security using Calico. Calico uses etcd as the back-end datastore. When you run Calico on Kubernetes, you can use the same etcd datastore through the Kubernetes API server.

The COVID-19 Crisis and the need for Citrix XenApp 6.5 Monitoring!

The COVID-19 crisis has put organizations in a position where 100% of employees need to work remotely from their homes. Popular technologies used for supporting remote employees include Citrix virtual application and desktops, virtual desktop technologies based on VMware Horizon, cloud-hosted desktops (DaaS), or just VPN connectivity. Until now, remote access from home was something a small percentage of employees used.

How PagerDuty's Ecosystem Partners Are Helping People During the COVID-19 Crisis

For many of us, “working” is incredibly difficult right now. That’s true at the organizational level, where maintaining business continuity and accounting for changes in customer needs are even more critical. But it’s also true at the individual level, where the sudden shift to working from home has jolted us all into working in new ways, and made virtual collaboration an essential part of each workday.

Honeycomb at OSU Libraries & Press

This is a guest post by Ryan Ordway, DevOps Engineer at Oregon State University. At Oregon State University Libraries & Press (OSULP) we have been using Honeycomb for about 18 months. We were in the beginnings of automating our infrastructure and needed an APM solution that we could scale with. New Relic was becoming too expensive, and we couldn’t afford to monitor our whole infrastructure and trace all of our applications anymore. Thus began our Observability journey.

Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 2)

In Part 2 of this two-part series, our goal is to provide security practitioners with better visibility, knowledge, and capabilities relative to malicious persistence techniques that impact organizations around the world every day. In this post, we’ll explore two additional persistence techniques that are being used by attackers in the wild: Scheduled Tasks (T1053) and BITS Jobs (T1197).

Topology Maps: Connecting the Dots for Hybrid and Multi-Cloud Infrastructure

In this article, learn: Given that enterprises use a mix of physical, virtual, and cloud native infrastructure, it can be a struggle to maintain the availability and performance of digital services. OpsRamp's Topology Explorer delivers visual representations of dependency relationships between application components and hybrid infrastructure that feed into both service maps and service-centric AIOps.

How IT Pros Will Help the World Come Out Stronger After COVID-19

In 2016, we wrote about the exponential value of computer networks and the importance of IT professionals as champions of the network, “doing their part to secure, maintain, and advance the engines that keep everything running.” Today, those words ring true in ways we could never have predicted four years ago.

Lost in the clouds: Managing risk and reaping rewards on your cloud journey

Moving applications to a public cloud, no matter why you’re making that journey, is a high-stakes proposition. As an industry, we’re focused on rapidly moving forward to give our businesses the competitive edge they need. However, when it comes to cloud migration, we often fail to stop and ask some critical questions, and as a result we end up overspending and underperforming.