Operations | Monitoring | ITSM | DevOps | Cloud

%term

AKS Cluster Performance: How to Better Operate Kubernetes in Azure

AKS is the managed service from Azure for Kubernetes. When you create an AKS cluster, Azure creates and operates the Kubernetes control plane for you at no cost. The only thing you do as a user is to say how many worker nodes you’d like, plus other configurations we’ll see in this post. So, with that in mind, how can you improve the AKS cluster performance of a service in which Azure pretty much manages almost everything?

11 Design Tools to Create Amazing Visual Content for Your Website

When you add high-quality images, infographics, videos, and other visual elements to your website, you don’t simply make it look more beautiful. You boost SEO, increase engagement, and make your content much more memorable. Great sites need amazing visual content.

What Your Website is Going to Lose if it is Not Secured

The very foundation of exchange between web & client-server protocol started with HTTP, where HTML form was the source of fetching resources - from documents to images. This extensible protocol was designed in the early '90s and has evolved over time. Cache or authentication is the main feature handled by HTTP which has never been compromised. Still, there are dangerous sites that are keen on corrupting the digital world.

Tigera Secure Enterprise Edition 2.4 Enables Firewalls to Secure Dynamic Kubernetes Workloads

We are excited to announce the new security capabilities of Tigera Secure Enterprise Edition 2.4. This release enables enterprise security teams to extend their existing zone-based architectures and easily connect to external resources. The highlights include DNS Policies, Threat Defense, Compliance Dashboard and Reporting, and easier installation options.

How to Monitor Apache Web Server

In order to effectively manage and monitor your infrastructure, a web admin needs clear and transparent information about the types of activity going on within their servers. Server logs provide a documented footprint of all traffic and errors that occur within an environment. Apache has two main log files, Error Logs, and Access Logs.

Chef automation for infrastructure management

Infrastructure management has come a long way. (Mostly) gone are the days of manual configurations and deployments, when using SSH in a “for” loop was a perfectly reasonable way to execute server changes. Automation is a way of life. Configuration management tools like Chef, Puppet, and Ansible — once on the bleeding edge — are now used by most enterprises.

Apache Error Log & Apache Access Log: Complete Guide to Analyzing and Troubleshooting Apache

+ Bonus: 20 Apache errors – a free checklist Apache error logs and Apache access logs contain valuable data. In this article, we explain how the log files generated by the Apache web server are an important factor in keeping your web sites and apps running 24/7. We show you how to effectively use Apache logs to monitor and troubleshoot Apache log files, to protect and fix your web server. Want to get Apache/Tomcat/Log4J insights right away?

How to use Mint, an awesome HTTP library for Elixir - Part 01

Mint is a shiny new Elixir package which allows you to make HTTP requests using the HTTP 1 and HTTP 2 protocols. It can transparently handle ALPN (Application Layer Protocol Negotiation), which essentially means that it can figure out if a server uses HTTP2 or HTTP1 on its own. It also comes with an optional dependency on a castore package which verifies the SSL certificates of the servers (that you connect to).

Building an AI-powered IT infrastructure

From an enterprise IT perspective, AI continues to prove its worth, as it makes an IT admin's life easier by automating help desk operations and providing real-time insights about potential security incidents, offering conversational assistance for efficient management of help desk requests, and providing preemptive solutions to customers’ problems using predictive analysis.