Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Comparing Kubernetes CNI Providers: Flannel, Calico, Canal, and Weave

Network architecture is one of the more complicated aspects of many Kubernetes installations. The Kubernetes networking model itself demands certain network features but allows for some flexibility regarding the implementation. As a result, various projects have been released to address specific environments and requirements.

The Lazy Programmer's Guide to Web Scrapers

I am a proud lazy programmer. This means that if I can automate a task, I will absolutely do it. Especially if it means I can avoid doing the same thing more than once. Luckily, as an engineer, my laziness is an asset - because this week, it led me to write an HTML scraper for our Changelog, just so I wouldn’t have to manually update the Changelog feed on our new app homepage (btw, have you seen our new app homepage? It’s pretty sweet).

How to Get Internal Buy-In for a Clinical Communications Platform

As a change agent in a healthcare organization, it’s likely that you’re eager to give your antiquated paging system the boots and to replace it with a more updated, efficient, HIPAA-compliant clinical communications platform. However, convincing the rest of the organization isn’t always easy. It’s normal to get resistance from your care team whenever you introduce new processes or technologies.

The 5 Web Analytics Tools That Will Make Your Life Easier

When people talk about web analytics, you immediately think of Google Analytics. But there is life beyond Google Analytics. There are many web analytics tools that currently exist on the web and many that are emerging daily. Knowing how to combine these tools well is key to a good web analytics strategy that allows us to understand what happens on our website and how our users act.

How to monitor WAN load balancers

Since load balancers are active devices that can be included in the design of a WAN, the question arises: Should we adapt our monitoring scheme to include something that could be called Load Balancer Monitoring? To answer this question we can assume that WAN monitoring is based on the following fact: the behaviour of communication links directly affects the performance of applications and therefore the entire platform.

New Integrations Directory enables your team to do better work, faster

Integrations enable you to unlock the full power of Mattermost by extending the platform to make your team even more productive. Customizing Mattermost this way enables privacy-conscious organizations to collaborate even more effectively, saving time and money without compromising on security.

Everything You Need to Know About the OSS Licensing War, Part 1.

The emergence of a new breed of commercial open source company, challenging the dominance of public cloud, has set off a licensing war that calls into question the very meaning of open source. We debated this topic at last month’s GrafanaCon Los Angeles, where I participated in a spirited panel. Since then, the battle lines have been redrawn. Last week, Amazon announced its Open Distribution for Elasticsearch. And MongoDB Inc. abandoned OSI approval of its new SSPL license.

How to Look for Suspicious Activities in Windows Servers

Scenario You are running a large production environment with many Windows servers. There are multiple forests in the network and some forests have multiple domain controllers. Your Windows server security is paramount – you want to track and audit suspicious activities and view detailed Windows reports extracted from the Windows servers event logs.