Operations | Monitoring | ITSM | DevOps | Cloud

Blog

AWS: How did we monitor the cloud in 2019?

We had a busy 2019 with a substantial number of Amazon Web Service (AWS) integrations into Site24x7, each providing a seamless monitoring experience for our customers. The increasing number of paid AWS monitors is proof that we enhanced the monitoring expectations in 2019. In case you missed any updates about the AWS monitoring platform, here's a year-end review.

5 Pitfalls to Kafka Architecture Implementation

Let’s face it—distributed streaming is an exciting technology that can be leveraged in many ways. Use cases include messaging, log aggregation, distributed tracing, and event sourcing, among others. Distributed streaming can result in significant benefits for companies that choose to use it, but, when not implemented correctly, it can initiate a frustrating technical debt cycle. How do you know if you’re properly implementing Kafka in your environment?

What are the alternatives to hiring a DevOps?

Congratulations!! After 3 months of hard work, your developer has done an incredible job and your brand new web application is ready to be put online. But wait a minute… Who is going to put it online? Try to ask your developer to do it - there is a good chance that he can’t. Why? Deploying applications is not necessarily a part of their qualifications. And even if he is able to, who's going to make sure it's always available and scale as your business grows?

Introducing always-on production profiling in Datadog

To complement distributed tracing, runtime metrics, log analytics, synthetic testing, and real user monitoring, we’ve made another addition to the application developer’s toolkit to make troubleshooting performance issues even faster and simpler. Today, we’re excited to introduce Profiling—an always-on, production profiler that enables you to continuously analyze code-level performance across your entire environment, with minimal overhead.

What is ITSM? Align IT with Your Business Needs

In this age, businesses that provide the best service survive, and when technology becomes the only means to deliver the best service then IT service management is not a question of why but a must. ITSM enables organizations to build a business around better IT support structures, so they can create the best product or service experience. In this blog, we will talk about some of the fundamental questions around ITSM.

Five worthy reads: The road to empowering employees through data democratization

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In the first Five worthy reads of this year, we’ll explore data democratization in detail, from its definition to its pros and cons, and provide some ways to use it for data empowerment.

Migrating from Perforce to Git

Source control, aka version control, is the method of tracking and managing changes to software code. Source Control Management (SCM) systems offer a running history of code changes and can be particularly helpful for teams of developers making changes to the same files. As a critical aspect of responsible software development, source control helps developers track code changes, see complete revision history, and revert back to a previous version of a project if needed.

Using Open Source Tools to Push Metrics into LogicMonitor

Ever walk into a corner market, push on the door and find it won’t open? You look down at the handle and are reminded by a sign on the door that you have to “pull” to open it? The LogicMonitor platform uses an agentless collector to pull metrics from thousands of devices and resources into a unified monitoring view (no agents required). We currently offer more than 2,000 LogicModules out-of-the-box that gather metrics from all kinds of systems using many different protocols.

Find Security Vulnerabilities in Kubernetes Clusters

Security is one of the most talked-about topics for Kubernetes users. Google “Kubernetes security” and you’ll find a huge number of articles, blogs and more. The reason is simple: you need to align your container and Kubernetes security with your organization’s existing security profile. Kubernetes has some strong security best practices for your cluster—authentication and authorization, encryption in secrets and objects in the etcd database—to name a few.