Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Introducing the Rollbar Pipe for Bitbucket Pipelines

Automating your deployment process is a critical step towards adopting continuous delivery. For teams that use Bitbucket for hosting their source code, Bitbucket Pipelines provide an easy way to automatically build and deploy when changes are made in your origin repository. The Rollbar team is excited to participate in the launch of Bitbucket Pipes, which make it even easier to configure your pipeline.

How to Monitor OID Status and Restart the LDAP Service When OID is Down?

We prepared WLSDM OID DevOps MBean blog about when OID shuts down due to external problems such as a network issue, the system will be provided to stand up. First of all, We are going to create WLSDM DevOps MBean then assign restart script on it. If the dummy LDAP search on DevOps MBean does not return any result, the opmnctl service will be restart by triggering the action script.

6 Things To Consider When Choosing A Log Management Solution

The days when you could simply SSH into a server and perform a fancy grep are long gone. If you’re reading this article, chances are either you are looking to move from that obsolete approach to a centralized logging approach with a log management tool, or you are looking for an alternative log management tool to replace your existing solution. Problem is, there are so many different tools out there, making a choice can be overwhelming. So how do you pick the right solution?

Avoid Prolonged Downtime With a Website Backup and Recovery Plan

Website downtime is inevitable. Extreme weather, equipment upgrades, or major site updates are all ripe conditions for downtime. However, there’s always a problem we don’t see coming. A website backup and recovery plan is essential to keep unplanned downtime from severely impacting your business. If you already have a plan, use this guide to revise or make changes to your existing one.

Exception Perceptions: 4 Best Practices for Using Docker Compose

On this episode of Exception Perceptions, Bret Fisher, Docker Captain and creator of the popular Docker Mastery series on Udemy, helps us master Docker Compose. Watch the episode, and read more of Bret’s suggested best practices. Then go and get all of his Docker resources.

How To Learn Systems Debugging by People-watching

When I first joined this startup that makes an observability platform, I was a front-end Javascript developer who had never ssh’ed into production–I didn’t even know what tracing or monitoring or metrics were, let alone what it meant for logs to be structured or how they could be useful to me. But within a couple months I joined the on-call rotation, and now share responsibility in our services along with the rest of my team.

Injection Attacks: Protecting Your Serverless Functions

While trying to verify the claims made on a somewhat facile rundown of serverless security threats, I ran across Jeremy Daly’s excellent writeup of a single vulnerability type in serverless, itself inspired by a fantastic talk from Ory Segal on vulnerabilities in serverless apps. At first I wanted to describe how injection attacks can happen. But the fact is, the two resources I just shared serve as amazing documentation; Ory found examples of these vulnerabilities in active GitHub repos!

See You At The RSA Conference!

At PagerDuty, we’re counting down the days until the RSA Conference! Why? Because, in addition to being excited to see everyone there, we also have lots of new information to share—information in line with this year’s conference theme: Better. More specifically, how to improve security at your organization by having better processes and better collaboration.