Operations | Monitoring | ITSM | DevOps | Cloud

%term

How Cisco ACI and AppDynamics Deliver a Great End-User Experience

Cisco ACI-AppDynamics integration helps business-critical applications run flawlessly. By providing deep visibility and powerful correlation across the application and network, this seamless interaction enables teams to deliver a positive end-user experience.

Why I Changed My Mind and Embraced Managed Kubernetes Services

I am embracing managed Kubernetes services and here’s my journey. While I attended KubeCon 2018 ready to soak up all I could about Kubernetes and the cloud-native ecosystem, I sought to learn as much as I could to aid me in running my clusters day to day. More importantly, though, I experienced a fundamental shift in what I see as the future of Kubernetes, and what getting started in Kubernetes looks like for companies today.

Distributed Transaction Tracing: How to Detect Application Performance Issues at The Code Level

Forty-three percent of application performance problems occur because of an issue in the application code, according to a DZone study. Code-level issues include bugs in the code constructs, such as long waits, poor iterations, inefficient code algorithms, unhandled exceptions, bad choice of data structures, etc. Developers and application owners need code-level insight, so they can pinpoint issues in the code and fix them before users notice.

January 2019 Product Update: New Integrations & APIs

To kick off the year, we’re launching a monthly blog series to share new product announcements on an ongoing basis. This month, we’re excited to announce several new integrations, as well as the new global events rule API that empowers admins and developers to easily manage event rules at scale. (Be sure to also check out our platform release notes to stay up-to-date on what’s new.)

Say Hello to Enhanced Role Based Access Control (RBAC) from BigPanda

Role-based access control (RBAC) has become one of the main methods for system access control within large enterprises, assigning access to users based on their role in the organization. Employees are allowed to access only those resources that are necessary to effectively perform their assigned job duties.

Monitoring Kubernetes + Docker, part 2: Prometheus

In part 1 of this series, I discussed the rise of microservice architecture and the reliance on Kubernetes and Docker for container orchestration and management. I also shared some of the challenges these new technologies present and what sources of data we need in order to effectively monitor our Kubernetes environments.