Operations | Monitoring | ITSM | DevOps | Cloud

API

The latest News and Information on API Development, Management, Monitoring, and related technologies.

Preventing PII in Test environments

Data privacy and security are a top concern for most organizations. It’s easy to see why given changes over the past few years. These types of protections can be great for us as consumers. However, they also make it extremely difficult to create realistic production simulations in pre-production. It’s hard to rapidly develop new applications if you can’t iterate against realistic data.

Documenting your APIs with developer API portals

Developers need all the information they can get on APIs to get them to work in alignment with their vision. There is no dearth of knowledge in the software development industry today, but only when that knowledge is documented well is it of use to others. In the context of APIs, developer portals offer an effective way to document and communicate relevant information. In this article, we answer the following questions about developer API portals.

Autoscaling Checkly Agents with KEDA in Kubernetes

Checkly private locations enable you to run browser and API checks from within your own infrastructure. This requires one or more Checkly agents installed in your environment where they can reach your applications and our Checkly management API. You need to ensure you have enough agents installed in order to run the number of checks configured in the location. We have a guide to planning for redundancy and scaling in our documentation.

Unleash the Full Power of Playwright With @playwright/test

Welcome to day three of our very first Launch Week! The last two days we shared how alerting became so much better and how we moved one level up by completing our SOC 2 Type 1 audit. Are you curious what’s next? I’ll tell you, but first let’s set the stage and look at Microsoft’s Playwright.

Checkly Completes SOC 2 Type 1 Audit

A Service Organization Control (SOC) audit is one of the most extensive tests an organization can undergo to demonstrate the ongoing maintenance of high-level information security. Today, we’re thrilled to announce that Checkly is SOC 2 Type 1 compliant after completing a successful audit by an accredited auditing firm. This demonstrates that Checkly’s information security policies, procedures, and practices meet the SOC 2 guidelines for security and data privacy.