Operations | Monitoring | ITSM | DevOps | Cloud

Debug issues and automate remediation with Shoreline and Datadog

Shoreline is an incident response automation service that enables DevOps engineers and site reliability engineers (SREs) to quickly debug and remediate issues at scale and develop automated routines for incident management. Using Shoreline’s proprietary Op language, customers can run debug commands across all their hosts simultaneously and then deploy custom scripts via Actions to trigger automated remediations.

Heroku Vs. AWS: Data Security Comparison

Heroku and AWS are two of the common choices available for cloud hosting. Heroku is a Platform as Service (PaaS) provider that helps startups develop business applications with simplicity and without needing DevOps expertise in the team. Not only does it provide resources automatically, but you can deploy your applications with just a single click. Heroku has been a top choice for developers for years as it speeds up development cycles by providing fully managed infrastructure and application deployment.

Write an Ecommerce Customer Journey

The ‘Add to Cart’ user journey is one of the most common ecommerce customer journeys used by website owners. For obvious reasons, ensuring potential customers can search, select a product, and checkout successfully is a vital function. Unlike ecommerce customer journey map tools, Synthetic user journey monitoring can assist in creating a positive customer experience by tracking performance metrics, and sending alerts if issues do occur.

4 Common Email Problems Businesses Face (And How To Fix Them)

Staying on top of deadlines, busy schedules, team organization, and customer needs are challenging. If you add some of the common email problems we discuss in this article, your list of challenges can rapidly grow. While it's helpful to have an IT department to deal with technical issues, it's a good idea to know how to fix some of them yourself, so let's get to business.

Hardware Asset Management (HAM) Explained

A well-run IT team keeps track of every asset in their domain, including hardware, software, and licenses. The specific task of managing hardware assets is known as hardware asset management. This involves keeping tabs on hardware from the time it's requested and purchased to the time it's phased out of use and disposed of. As you can imagine, this can be a daunting task when handled manually. Without procedure and special tools, the process can be scattershot and rife with opportunities for error.

Introduction of the ansible-collection-icinga

Ansible is a commonly known tool to easily automate deployments in infrastructures, its configuration is based on YAML and is able to scale in big environments. Icinga 2 provides its own secure agent to monitor hosts, high available satellite zones and monitoring configuration. To manage this monitoring environment we introduce you to the ansible-collection-icinga, this collection can install Icinga 2 server, configure monitoring and deploy Icinga 2 agents in your infrastructure.

How to Identify Memory Leaks

You may not be familiar with thinking about the memory usage of your applications as a software developer. Memory is plentiful and usually relatively fast in today's development world. Likely, the programming language you're using doesn't require you to allocate or free memory on your own. However, this does not mean you are safe from memory leaks. Memory leaks can occur in any application written in any language. Sure, older or "near to the metal" languages like C or C++ have more of them.