Operations | Monitoring | ITSM | DevOps | Cloud

Automated Just-In-Time Permissions Using JumpCloud+Torq

For security teams, properly managing which users can access resources and governing the level of access those users have is about as basic as locking the door at night. Understandably then, there are thousands of options available to fine-tune or revoke access, and it’s likely that issues come up daily for most companies—if not hourly.

Getting started with DNS attacks

Whenever an online service goes down, you're likely to hear three words: "it was DNS!" Blaming DNS might be a running joke among network admins and engineers, but it's one rooted in experience. DNS problems are known for causing massive, Internet-wide outages such as the 2021 Akamai outage that temporarily made the websites for Delta Air Lines, American Express, Airbnb, and others unreachable.

Sentry Points of Presence: How We Built a Distributed Ingestion Infrastructure

Event ingestion is one of the most mission-critical components at Sentry, so it’s only natural that we constantly strive to improve its scalability and efficiency. In this blog post, we want to share our journey of designing and building a distributed ingestion infrastructure—Sentry Points of Presence— that handles billions of events per day and helps thousands of organizations see what actually matters and solve critical issues quickly.

How to use ITAM to support your IT support game

Historically IT asset management (ITAM) is the practice that was forgotten about by IT service management (ITSM) practitioners because it wasn’t considered a “core” ITIL process. This changed with the publication of ITIL 4, and now ITAM sits firmly in the ITIL management practice section of the service value stream. Done well, ITAM can help organizations to manage, control and support their IT services.

Managing Kafka on AWS with Nastel Navigator

Apache Kafka is a very popular open-source distributed event streaming platform used by thousands of companies for high-performance data pipelines, streaming analytics, data integration, and mission-critical applications. Amazon MSK is a fully managed Kafka service that makes using Kafka even easier. But how do you get started with Kafka on AWS? How do you migrate your existing Kafka environment to the cloud? How do you manage many Kafka environments at once?

How to Keep Track of the Fixed Asset Movement at Different Locations?

The construction Industry is an asset-intensive industry. It is full of assets and equipment and each organization in the construction industry has equipment in abundance. Moreover, for project work, Organization sends the assets and equipment to various locations. When pieces of equipment are in distinct locations, keeping track of asset movement becomes complicated.

How to use path wildcards in Graphite Module

The Graphite module of Icingaweb2 is a great tool for rendering graphs from performance data. The latest version 1.2.0 introduces some bug fixes and new features like dark and light mode support, a lot of new templates, support for path wildcard, etc. The support for wildcard * was already available in the previous version. We have extended this support and added all the wildcards that graphite offers.

Difference between Continuous Integration, Continuous Deployment and Continuous Delivery

Continuous integration is a DevOps practice, where developers continuously integrate the code changes into a central repository. It most often refers to the build or the integration stage of the software release process.A continuous integration service helps to automatically build and run unit tests on the new code changes to find any errors instantly.