Operations | Monitoring | ITSM | DevOps | Cloud

%term

Sponsored Post

C# Logging best practices in 2019 with examples and tools

Applications that have been deployed to production must be monitored. One of the best ways to monitor application behavior is by emitting, saving, and indexing log data. Logs can be sent to a variety of applications for indexing, where they can then be searched when problems arise.

Service based access control with Sysdig Secure Teams

While you’re likely familiar with role-based access control, Sysdig teams introduce the concept of service-based access control. With service-based access control, administrators can define groups of users that have access to policy events, policy configuration, and scanning data limited to a service or set of services, as defined by your orchestration system (think Kubernetes, Mesos, and the like).

Answer to the Ultimate Question of (On-Call) Life, the Universe, and Everything: 71

In The Hitchhiker’s Guide to the Galaxy, a group of scientist mice built a mega-computer named “Deep Thought” to Answer “The Ultimate Question of Life, the Universe, and Everything.” After 7.5 million years, the machine produced “42.” At PagerDuty, we did something similar, except we didn’t have scientist mice or wait 7.5 million years.

New generation of web servers based on HTTP/2 and with TLS by default: " Caddy Web Server".

As we all know, Pandora FMS allows the monitoring of practically any device or application. Let’s talk about web content servers. Even the very popular applications or “apps”, made for the Android operating system of our phones, generally use API commands, which are also hosted on web servers to take advantage of the secure protocol (HTTPS).

Careful Data Science with Scala

Data science and machine learning have gotten a lot of attention recently, and the ecosystem around these topics is moving fast. One significant trend has been the rise of data science notebooks (including our own here at Sumo Logic): interactive computing environments that allow individuals to rapidly explore, analyze, and prototype against datasets.