Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Kubernetes Phase 2-Key Challenges at Scale

Kubernetes is THE buzzword these days. Almost every IT organization is currently using it or is in the process of implementing it as part of their infrastructure. The transition to Kubernetes is complicated, whether a company is using an on-premises, cloud, hybrid, or managed solution, and it usually involves other changes in the codebase, such as shifting to a microservices architecture. While the implementation phase is led by the DevOps team, it requires the participation of the whole R&D group.

Yet another malware attack: macOS now the target for security attacks

Mac usage, as you’ve probably seen in your workplace, has risen exponentially in enterprises. According to a Jamf survey, 74 percent of those who previously used a PC for work experience fewer issues now that they use a Mac. Just like you’ve been watching the rapid rise of Macs in enterprises, so have attackers—the ones wreaking havoc in enterprises through malware attacks.

The life of a sysadmin: Encircled by excessive tools

It’s 3am, and you’re woken up by frantic calls and messages from users at your company—this is the everyday life of a sysadmin. Constantly surrounded by numerous tickets and persistent users who require immediate solutions, the life of a sysadmin is not a bed of roses. Their tasks are not limited to server management, maintenance, and repair, but also completely supporting a smoothly running production environment with minimal or no complaints from end users.

Fixing Native Apps with Sentry

Whether it’s a computer game, IoT device, or high-performance backend, chances are you’re using a native language to develop this application. Hands down, by far the most popular choices today for native application development are C and C++. Okay, maybe not the most popular, but definitely the most prevalent. Some might even say “inevitable.”

Python Profilers

Python performance measurement tools help us to identify performance bottlenecks in our app. This allows us to focus on the business logic as opposed to writing custom code, setting it up with our app, and then figuring out whether the results are accurate enough. These tools are well tested by the open source community and used by many companies to measure the performance of their web apps.

Datadog + New Relic: Monitor every layer of your stack

Application performance monitoring (APM) dovetails nicely with infrastructure monitoring, allowing you to monitor app performance and end-user satisfaction in context with the rest of your infrastructure. That’s why we unveiled Datadog APM to complement our infrastructure monitoring platform and provide full-stack observability.

Efficiently retrieve old logs with Datadog's Log Rehydration

Logs provide invaluable information about issues you need to troubleshoot. In some circumstances, that may mean that you have to look back at old logs. For example, you may be running a security audit and need to analyze months-old HTTP request logs for a list of specific IP addresses over a period of time. Or you might need to investigate why a scheduled service never occurred, or run an exhaustive postmortem on incidents that happened over a couple months but that you suspect are related.

Deep in the heart of Tech-sys: SpiceWorld 2019 Recap!

In case you missed it, we just wrapped up our keynote to kick off SpiceWorld 2019! Last year, we shared our vision to empower you to use technology to transform your organizations, community, and the world – every day. This year, you’re seeing the first steps of that vision coming to life!