Operations | Monitoring | ITSM | DevOps | Cloud

How to Install Apache ActiveMQ on Debian 11

Apache ActiveMQ is a free and open-source message broker developed by Apache Software Foundation. It is one of the well-known message brokers that supports multiple protocols such as AMQP, MQTT, Stomp, and OpenWire. It is written in Java and fully compliant with JMS 1.1 standards. Apache ActiveMQ is one of the most popular message brokers that support different types of programming languages that can be deployed on multiple platforms.

Coming soon! A sneak peek at Raygun Alerting's Slack integration

The Slack integration is our #1 feature request for our Alerting feature, and the Raygun team has been busy at work making this feature available to all our customers. We expect this feature to be available around early - mid July 2022. Many of you, our curious customers, have asked for a preview of what’s to come. So we thought we’d share some specs and screenshots with you as we progress through the work.

Is monitoring dead yet?

No, it is not! How can it possibly be dead? In my opinion, monitoring is some thing very important for building a successful IT infrastructure. If monitoring is dead for an IT infrastructure then either that infrastructure already does not exist; or it is so powerful that problems like failure, errors, utilisation issues etc never occurs in the IT infrastructure which is literally not possible.

PCI DSS 4.0: Protecting Payment Card Processing

PCI? PCI SSC? PCI DSS 4.0? Need these acronyms explained? Well, this blog is for you. Read on to find out how the new PCI DSS 4.0 (a set of security standards created to ensure companies maintain a secure financial environment) will affect how you transact online, monitor your website payment gateways and more.

N-central Custom Properties, if you're not using them, you should be

Over the years, I’ve spoken with many of our partners that use N-central, and it always amazes me how few leverage custom properties. Often when I explain one or two uses for them, their minds are immediately racing with other potential uses as well, so today we are going to look at some of the many uses for custom properties and how they can benefit the support and service you provide to your clients.

How We Create API Tokens Using Spring Boot

Have you ever wondered how much effort goes into providing a seamless authentication process on a platform such as the Qovery console? Needless to say, we do not take security or user experience lightly. That’s why we decided to combine SSO through our users’ Git provider accounts (GitHub, GitLab and Bitbucket) with an external authentication service called Auth0.

KubeCon EU 2022 - Trends & Highlights

Kubecon EU returned to Spain. This time to Valencia, city of paella and horchata and, of course, a great place for big events. We had a great time meeting you all in person, and attending the talks. Here are our hot takes from the event. The main event started on Wednesday, but before that different co-located events took place: Ebpf Day, Cloud Native SecurityCon, and PrometheusDay among others. These events gathered a large number of attendees.

Will Microsoft's Latest Tool Transform Workflows for Developers?

At Microsoft’s 2022 Build Conference, which took place on May 24 through May 26, the tech juggernaut revealed a number of new technologies and iterations that are poised to impact the workplace and the world at large. One announcement in particular has already sparked major conversation among the developer community: the new Microsoft Dev Box.

What Are the Challenges Faced While Implementing Condition-Based Maintenance?

Condition-based maintenance is helpful to organizations as it helps in decreasing downtime. It is not easy to implement but once implemented successfully then this maintenance will provide several benefits. What are the challenges that occur while implementing condition-based maintenance and how can you overcome those challenges? That we will discuss in this blog, but first let us know what condition-based maintenance software is!

How To Build an Escalation Policy for Effective Incident Management

Regardless of your organization’s size, industry, or security measures, you will inevitably face IT incidents. But what do you do if an incident affects a critical system and your on-call responders can’t resolve it? Does your team have a set of clearly outlined next steps they should take to handle the issue? Answering these questions can be complicated, even more so for large organizations that rely on cloud-based services to fuel their IT environment.