Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

Kubernetes Load Testing: How JMeter and Speedscale Compare

At some point, your development team may be considering implementing load testing (also known as stress testing) as part of your software testing process. Load testing validates that your web app is able to withstand a large number of simultaneous users, decreasing the chance that any traffic spikes will bring down your services once deployed. These stress tests can be highly granular, giving you the opportunity to test run virtually unlimited strategies before they are set into the wild.

How to Calculate TPS in Performance Testing: A Kubernetes Guide

Transactions-per-Second (TPS) is a valuable metric for evaluating system performance and is particularly relevant for engineers overseeing Kubernetes environments.TPS, alongside average response time, provides critical insights into system performance during load testing. This post covers two approaches to calculating TPS; a manual approach applicable in all environments, and an automatic Kubernetes-specific solution using production traffic replication.

Stop Using TCP Health Checks for Kubernetes Applications

As developers, one of the most important things we can consider when designing and building applications is the ability to know if our application is running in an ideal operating condition, or said another way: the ability to know whether or not your application is healthy. This is particularly important when deploying your application to Kubernetes. Kubernetes has the concept of container probes that, when used, can help ensure the health and availability of your application.

The Best Tips for Implementing Effective Alerts

When monitoring your logs metrics and traces it’s crucial that you can detect issues early to ensure the uptime of applications, alleviate bottlenecks, and enhance the performance of your systems. If you’re an experienced developer or IT professional this is a straightforward task when you’re viewing the data in front of you. However, when you aren’t viewing your data, it's just as important to guarantee that your systems are functioning optimally. This is achieved through alerts.

Android Kiosk Setup

Kiosks are a part of everyday life, we use them at stores for self-checkout, at doctors’ offices to check in, and so much more. But how do you make one? Certainly, you can’t just take an Android tablet and make it a kiosk, right? Well, it just so happens that you can! This blog walks through that process in NinjaOne, starting with enabling NinjaOne MDM, all the way through locking a tablet into single- or multi-app kiosk mode!

Managed vs Unmanaged Switch: Which One Fits Your Network Needs?

The backbone of any business or home setup relies on robust, reliable infrastructure. At the heart of this infrastructure lies a fundamental piece of hardware: the network switch. And beneath that there is a battle: Managed vs unmanaged switch. Whether you’re a seasoned IT pro or someone just dipping their toes into networking, knowing the difference between managed and unmanaged switches can save you a lot of trouble (and money) down the road.

Uniform Resource Locator Scanning: What is it?

Cybersecurity is a growing concern in today’s digital age, where every click could lead to unexpected threats. With the rise of phishing scams, malware, and other online attacks, it’s becoming harder to distinguish between safe and harmful websites. Whether you’re casually browsing the web or running a business, you need protection from these ever-present dangers. That’s where Uniform Resource Locator scanning comes in.

11 helpful KPIs to improve your network performance

Digitalization has surpassed network modernization, resulting in networks struggling to keep up with daily operations. While many networks can accommodate GenAI and other new technologies, network administrators are responsible for maintaining uninterrupted operations and preventing any errors. For this, they must diligently monitor network performance and related metrics so their networks remain secure and robust yet flexible enough to adapt to the latest technologies.