Icinga is coming to Berlin for the 3rd time next week, and we are super excited to share the latest developments with you. And of course to meet again with our awesome community and have a couple of G&Ts :) If you can’t make it, our first Icinga Camp New York happens on March 16th the week after!
Developers working hand in hand with IT professionals is vitally important to maintaining stable application environments with mininal errors. Ideally, they work in the same environment. This is called DevOps. Learn why DevOps and collaboration is necessary.
How many times have you had to work through local environment issues when running code only to have it fail as soon as it tests start to run? With Bamboo’s Docker Runner, those problems are a thing of the past. Now, create and isolate your end-to-end build processes inside Docker containers with full control to install build dependencies or manage resource usage.
A snow delay can throw a wrench into your typical workday at the daycare center — especially if you’re fielding emails and phone calls from concerned parents. When you start receiving these emails, phone calls or texts from parents asking whether to pack their kids’ lunches, you may have to answer each of message in an emergency. This can snowball into calls or emails asking for more information about the snow delay.
Uptime Robot offers multiple ways to get notified of downtime. And, here comes another exciting one. Thanks to its bot framework and API support, it is now possible to get down/up/SSL notifications via Telegram messaging app.
We’ve finally made the finishing touches on the elasticsearch monitoring and officially released it. Only after three complete reworks did we manage to achieve really nice results and detect all the issues in any ES cluster setup.
Today we are announcing Kamon 1.1.0 with a couple bugfixes and a small but important improvement on context propagation, plus several minor updates on other modules that sort of went under the table for Akka, Akka Remote, Akka HTTP, Play Framework, Http4s and our sbt-aspectj-runner plugin.
When it comes to network security, the best case scenario is that an IT team identifies a threat, and immediately acts to mitigate damage caused by the threat, eliminate the threat from the network, and then close the point of attack to prevent future incidents.