Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Monitor all your CI pipelines with Datadog

With continuous integration becoming standard practice, getting full visibility into your CI pipelines has become a key part of monitoring and troubleshooting. Datadog gives you that visibility with out-of-the-box support for several continuous integration tools, including: GitLab, Jenkins, Travis CI, CircleCI and TeamCity. Monitoring your CI servers can help you identify bottlenecks in your pipelines.

Solr Learning To Rank and Streaming Expressions

During the Entity Extraction For Product Searches talk that Radu Gheorghe and I gave at Activate conference in Montreal last year, we talked about various natural language processing and machine learning algorithms. We showed entity extraction both on top of Solr and using external libraries. In this post we dig into Learning to Rank with Solr Streaming Expressions.

Say Hello to Enhanced Role Based Access Control (RBAC) from BigPanda

Role-based access control (RBAC) has become one of the main methods for system access control within large enterprises, assigning access to users based on their role in the organization. Employees are allowed to access only those resources that are necessary to effectively perform their assigned job duties.

Monitoring Kubernetes + Docker, part 2: Prometheus

In part 1 of this series, I discussed the rise of microservice architecture and the reliance on Kubernetes and Docker for container orchestration and management. I also shared some of the challenges these new technologies present and what sources of data we need in order to effectively monitor our Kubernetes environments.

Distributed Transaction Tracing: How to Detect Application Performance Issues at The Code Level

Forty-three percent of application performance problems occur because of an issue in the application code, according to a DZone study. Code-level issues include bugs in the code constructs, such as long waits, poor iterations, inefficient code algorithms, unhandled exceptions, bad choice of data structures, etc. Developers and application owners need code-level insight, so they can pinpoint issues in the code and fix them before users notice.

January 2019 Product Update: New Integrations & APIs

To kick off the year, we’re launching a monthly blog series to share new product announcements on an ongoing basis. This month, we’re excited to announce several new integrations, as well as the new global events rule API that empowers admins and developers to easily manage event rules at scale. (Be sure to also check out our platform release notes to stay up-to-date on what’s new.)

Six reasons why data backups are crucial for your business

The increase in ransomware attacks and high-profile data breaches over the last few years has reinforced the importance of data security. It should be noted that WannaCry infected more than 300,000 computers worldwide, encrypting sensitive business data and disrupting productivity for an entire week.

101 More Security Best Practices for Kubernetes

This article analyzes the recent CNCF article, '9 Kubernetes Security Best Practices Everyone Must Follow' and discusses how Rancher, RKE, and RancherOS satisfy these by default. I also discuss the Rancher Hardening Guide, which covers 101 more security changes that will secure your Kubernetes clusters.

Getting Your Feet Wet with the Logz.io API

API access is available at the Enterprise tier of our product. With it, you can create a whole range of heavily customized use cases to further expand our suite of offerings. For example, you can hit our API to send customized query results to a third party service like Nagios, or you can automate the creation and deletion of sub-accounts.