Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

How New Mexico State University accelerates compliant federal research with Ubuntu

When the stakes are high and national security is on the line, every decision matters. Just ask the team at New Mexico State University’s Physical Science Laboratory (PSL). Founded back in 1946 to support the United States’ space and rocket programs, PSL has been on the leading edge of defence-oriented applied science for over seven decades. But when the Department of Defense (DoD) rolled out new cybersecurity guidelines, PSL found itself at a crossroads.

Closing the Gap: Ubuntu Pro in the AWS Shared Responsibility Model

Deploying your application on a public cloud offers numerous benefits, including improved time to market, elastic capacity, and improved baseline security compared to on-premises solutions. However, this does not guarantee better security coverage for your application and data. For this reason, the major cloud providers provide a Shared Responsibility Model, which outlines the distribution of security responsibilities between the cloud service provider and its customers.

Leveraging Cloud Infrastructure for Remote Work

Even though there have been numerous reports about the decline of remote work in the last two years, many companies are still using the model and seeing a lot of success with it. Some of this success has to do with the technology they use. Cloud technology has become popular as businesses have realized its numerous benefits, including its ability to help them reduce operating costs, enhance collaboration, and provide scalability. Here's how these businesses are using cloud infrastructure effectively for remote work.

Telecom security: How to safeguard your open source telco infrastructure

From pure voice to data, and now with the connectivity provided to devices and machines, telco systems make it possible to deliver digital services to society. Thanks to telecom systems, we can keep in touch with each other and reach the information sources we need at any time and anywhere. As we have become increasingly reliant on these systems, we also need to be vigilant about telecom security.

How to schedule an AzCopy Data Transfer

AzCopy is a command-line utility designed for copying data to and from Microsoft Azure Blob and File storage. It is a very powerful tool provided by Microsoft that helps users to copy and transfer data efficiently and securely. One of the key features of AzCopy is the ability to schedule transfers. Scheduled transfers can be extremely useful in managing data and ensuring that data is moved or backed up at the most appropriate times.

Detecting Performance Monitoring Issues in Prometheus & Grafana | 2023 Guide

Stay ahead of performance hiccups with our comprehensive Prometheus & Grafana monitoring tutorial. From setup to advanced detection techniques, this guide ensures your systems run smoothly. Facing challenges or want to exchange tips? Connect with peers and mentors in our dedicated community space.

Advanced Monitoring and Observability Tips for Kubernetes Deployments

Cloud deployments and containerization let you provision infrastructure as needed, meaning your applications can grow in scope and complexity. The results can be impressive, but the ability to expand quickly and easily makes it harder to keep track of your system as it develops. In this type of Kubernetes deployment, it’s essential to track your containers to understand what they’re doing.

LogicMonitor Kubernetes Helm Monitoring

LogicMonitor recently added support for monitoring Kubernetes Helm Charts. This new module helps customers clearly see the health and performance of their Kubernetes applications, quickly respond when configured metrics exceed thresholds or deviate from patterns, and take action on critical issues to detect anomalies or issues early on.

How to use Key-Based Deduplication in Squadcast | Deduplication Rules | Squadcast

Key Based Deduplication is an efficient way to avoid duplicate entries when processing incoming Events alongside existing Incidents. It generates a Deduplication Key using a user-defined template specific to events from an Alert Source. This key helps identify and group duplicates. This video explains how does Key Based Deduplication work and how to set it up effectively.