Operations | Monitoring | ITSM | DevOps | Cloud

Icinga 2 API and debug console

Have you ever experienced configuration issues, such as notifications not being sent as expected or apply rules not matching all expected objects, probably due to an incorrectly set custom variable? Icinga 2 has several options to assist you in such situations. Last time, Julian demonstrated how to analyse such problems using the icinga2 object list command. Today I will show you how to interactively investigate your problem using the mighty Icinga 2 debug console.

Navigating User Experience, Performance & Security

In the ever-evolving digital landscape, where users expect lightning-fast, seamless experiences, a thoughtful balance needs to occur between creating a unique website experience and achieving optimal performance whilst tackling the mounting threats posed by cybercriminals. This predicament places website owners and developers at a crossroads: How can they achieve great user experience (UX) while upholding stringent security protocols with a well-performing website?

Detecting Cryptojacking with Progress Flowmon

In the ever-evolving landscape of cybersecurity threats, cryptojacking has emerged as a stealthy and financially motivated attack method. In attacks of this type, cybercriminals hijack servers (or endpoint devices) to use the computing resources to “mine” cryptocurrencies. They get a financial benefit from this activity when they sell the newly minted currencies.

Advancing MLOps with JFrog and Qwak

Modern AI applications are having a dramatic impact on our industry, but there are still certain hurdles when it comes to bringing ML models to production. The process of building ML models is so complex and time-intensive that many data scientists still struggle to turn concepts into production-ready models. Bridging the gap between MLOps and DevSecOps workflows is key to streamlining this process.

Critical Automation: Anomaly Detection for Application Observability

There’s no debate — in our increasingly AI-driven, lean and data-heavy world, automating key tasks to increase effectiveness and efficiency is the ultimate name of the game. No matter what job you hold today, you’re likely being pushed to not only do more with less, but also perform your work with a tighter focus on specific outcomes and SLOs.

Joe's Triumph with an Alert Fatigue Solution

In the fast-paced world of operations management, every alert bears weight, and Joe’s team found themselves caught in a relentless stream of notifications. The challenge they faced was alert fatigue – a persistent obstacle that blurred the lines between critical incidents and routine matters. As the head of operations, Joe navigated through this influx of alerts, ranging from urgent server issues demanding immediate attention to routine notifications like a failed login.

Log Management Made Easy: Top 10 Logs Monitoring Solutions

In contemporary enterprise operations, log management tools have become indispensable for optimizing performance. Among these tools, selecting one with a proficient logs user interface (UI) holds paramount importance. A quality log management tool not only gathers logs but also presents them in a well-organized manner, facilitating easy interpretation for the user.

Understanding How OpenTelemetry can help with PCI Compliance

The early days of e-commerce on the internet resembled a digital Wild West, characterized by unencrypted form inputs and clear-text storage of sensitive information. Fast forward to today, and the landscape of online payments has transformed dramatically, bolstered by industry-driven guide rails like the Payment Card Industry Data Security Standard (PCI DSS). These standards ensure that consumer details are stored appropriately and handled with the utmost care and security.