The latest News and Information on DevOps, CI/CD, Automation and related technologies.
Prometheus is a robust monitoring and alerting system widely used in cloud-native and Kubernetes environments. One of the critical features of Prometheus is its ability to create and trigger alerts based on metrics it collects from various sources. Additionally, you can analyze and filter the metrics to develop: In this article, we look at Prometheus alert rules in detail. We cover alert template fields, the proper syntax for writing a rule, and several Prometheus sample alert rules you can use as is. Additionally, we also cover some challenges and best practices in Prometheus alert rule management and response.
Understanding Metrics, Logs, Events and Traces - the key pillars of observability and their pros and cons for SRE and DevOps teams.
For today’s software organizations security has never been more top of mind. On one side there is the present and growing threat of being hacked by malicious actors, set out in Crowdstrike’s recent Global threat report. And, on the other, there is a wave of cybersecurity regulation from the government to mitigate such cybersecurity vulnerabilities.
This week I’ve been reading through the recent judgment from the Swedish FSA on the Swedbank outage. If you’re unfamiliar with this story, Swedbank had a major outage in April 2022 that was caused by an unapproved change to their IT systems. It temporarily left nearly a million customers with incorrect balances, many of whom were unable to meet payments.
The rapid technological advancements in the last decade led to a massive migration of data and applications from on-premise environments to the cloud. While this cloud migration trend dominated the IT world, a recent paradigm shift has emerged that’s moving in the opposite direction – ‘Cloud Reverse Migration’ or ‘Cloud Repatriation’.
It feels great writing this. It's hard to believe that we have been working on Spike.sh full-time for 3 years now. It's been the most rewarding experience of my life. A big thank you to all of our users and your constant feedback, which has only made Spike.sh better month on month. We are - Over the years, we have always kept our heads down and built. During this entire process, we have learnt a huge deal of things when it comes to incidents and how they are being managed.
The use of virtualization in modern computing is becoming indispensable. Virtualization allows users to operate numerous operating systems on a single physical machine, which boosts productivity, lowers costs, and makes maintenance easier. But It's crucial to conduct periodic checks on a Linux virtual machine to make sure it's operating smoothly and effectively.