Operations | Monitoring | ITSM | DevOps | Cloud

How to Monitor Active Directory with OpenTelemetry

We’re excited to announce that we’ve recently contributed Active Directory Domain Services (abbreviated Active Directory DS) monitoring support to the OpenTelemetry collector. You can check it out here! You can utilize this receiver in conjunction with any OTel collector: including the contrib collector, the observIQ’s distribution of the collector, as well as Google’s Ops Agent, as a few examples.

On-premise vs. On the Cloud

Since its emergence in the mid-2000s, the cloud computing market has evolved significantly. The benefits of reliability, scalability, and reduced set-up costs have created a demand to fuel an ever-growing range of “as-a-service” offerings, resulting in an option to suit most requirements. But despite the advantages, the question of cloud or on-premise remains valid.

Best practices to collect, customize and centralize Node.js logs

Node.js is an established platform for developing server-side applications in JavaScript. One of the most fundamental concerns that arise during the development of Node.js apps is how to carry out proper logging that will be safe, secure and performant. While there are several options for configuring Node.js logging, a few specific engineering best practices still apply, no matter which option you choose.

Kafka Summit 2022

We had a fantastic time at the Kafka Summit in London this year. It was so great to be meeting everyone face to face again after such a long break. It was interesting to see how people had progressed with their Kafka implementations. At the 2019 event people were just getting started trying out Kafka in small test environments but no one had enough production experience to know understand their needs for management at scale and production support.

Top Benefits of Containerization For Your Startup

A container is an isolated unit of software running on top of an operating system. Containers are getting popular among startups because containerized applications are portable, have built-in scalability and fault tolerance, are more secure, and promote faster development cycles. That’s why startups prefer containers for new application development to gain a business advantage over competitors who are still using VMs for application deployment and packaging.

SEO 101: Keyword Research and Strategy

While SEO (search engine optimization) includes a variety of different elements to deliver measurable results, one of the foundational pieces of a good SEO strategy is keyword research. Since keywords and phrases are the actual targets that connect potential visitors to your website, finding ways to ensure your site places as highly as possible for relevant search terms is the linchpin for all other elements of SEO strategy.

Cybersecurity Measures Every Project Manager Should Know About

Online projects could be easy prey for cybercriminals due to the involvement of critical security information (emails, different platforms' login passwords, bank accounts, etc.) and multiple people. A simple phishing email requesting new login credentials or bank account details could be effective on negligent team members and could put everybody at risk. In other words, any breach of information by a project team member could lead to a disaster for the parties involved.

NGINX Logging Configuration: How to View and Analyze Access and Error Logs

NGINX is one of the most widely used reverse proxy servers, web servers, and load balancers. It has capabilities like TLS offloading, can do health checks for backends, and offers support for HTTP2, gRPC, WebSocket, and most TCP-based protocols. When running a tool like NGINX, which generally sits in front of your applications, it’s important to understand how to debug issues. And because you need to see the logs, you have to understand the different NGINX logging mechanisms.

Why is it so important for MSPs to have zero trust in the digital age?

The pandemic may have accelerated the need for enterprises of all sizes to move towards digital transformation, but the need for cyber security has existed since before. However, with new actors or hackers, malicious software has also evolved and expanded the cyber threats to a larger attack surface. While enterprises need robust digital solutions, implementing them may make your enterprise more vulnerable to security threats.