Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Your Development Environment is Missing

It’s hard to believe, but 10 years ago AWS had only five products. Chief among them, of course, was EC2. Although it feels a little quaint now, back then EC2 was an incredible offering. Anyone could fire up a server in seconds, install some code, and transform that generic server into any service one could imagine.

WLSDM: A Complete End-to-End Monitoring solution for Oracle BI (OBIEE)

Many organizations today use a collection of Business Intelligence (BI) tools and applications to allow experts to gather and analyze information from disparate sources across various lines of businesses to meet enterprise wide information gathering and analysis needs required for the reporting and monitoring of business activities.

7 Key Considerations for Kubernetes in Production

Today Enterprise IT does not question the value of containerized applications anymore. Given the move to adopting DevOps and cloud native architectures, it is critical to leverage container capabilities in order to enable digital transformation. Google’s Kubernetes (K8s), an open source container orchestration system, has become the de facto standard — and the key enabler — for cloud native applications, and the way they are architected, composed, deployed, and managed.

Comparing kube-proxy modes: iptables or IPVS?

kube-proxy is a key component of any Kubernetes deployment. Its role is to load-balance traffic that is destined for services (via cluster IPs and node ports) to the correct backend pods. Kube-proxy can run in one of three modes, each implemented with different data plane technologies: userspace, iptables, or IPVS. The userspace mode is very old, slow, and definitely not recommended! But how should you weigh up whether to go with iptables or IPVS mode?

Canary Deployment with LaunchDarkly and AWS Lambda

LaunchDarkly has built an impressive feature flag management system that overages more than 200 billion feature flags per day. It has helped companies implement continuous deployment, A/B testing, infrastructure migrations and much more. It also enables canary launches (or dark launches) through its built-in support for percentage-based rollouts.

A New Bee's First Oncall

I’m Honeycomb’s newest engineer, now on my eighth week at Honeycomb. Excitingly, I did my first week of oncall two weeks ago! Almost every engineer at Honeycomb participates in oncall, and I chose to join in the tradition. This may seem unconventional for a Developer Advocate — surely my time might be better spent holding more meetings with customers and giving more talks? Yet, I found that being oncall was the right decision for me.

Best Practices with AWS GuardDuty for Security and Compliance

Cloud networks are popular targets for cybercriminals and organizations will inevitably face them. If you’ve ever administered a network of any type, you know that DDoS (distributed denial of service) attack attempts are really frequent, and there’s loads of malware out there too.

MyRacePass Goes Full Throttle With Retrace

Like many of our client successes, this one also starts in a basement. Three friends: Zach Calmus, Ross Van Eck, and Josh Holt came together over a love for motorsports and a passion for technology. A few years later, what had become one of the fastest growing motorsports web development companies had grown into the MyRacePass, a platform that would put the entire motorsports industry on a path of acceleration.

3 Steps to Implement DevSecOps in Your Organization

It seems like hardly a week goes by without news of a security breach. Cyberattacks are becoming more frequent and more severe, costing businesses $600 billion per year according to the 2018 Economic Impact of Cybercrime report. Without a strong security policy in place, businesses risk falling victim to new threats while losing the trust of their customers.