Operations | Monitoring | ITSM | DevOps | Cloud

Best Practices in Java Logging for Better Application Logging

Examining Java logs is usually the quickest way to figure out why your application is experiencing trouble, so it's critical to have it in place. Best practices for Java logging can help you troubleshoot and address issues before they affect your users or business. In many circumstances, this entails utilizing a Java logging tool capable of automating your processes and delivering faster and more accurate results than manual logging.

How traceroute in the Synthetic Monitoring plugin for Grafana Cloud helps network troubleshooting

One of the powerful tools available in Grafana Cloud is Synthetic Monitoring, a black box monitoring solution that can provide insights that are hard to get in other ways. It provides a different view of your application by observing performance and uptime externally and from all over the world. As a result, you can build an understanding of what your end users are actually experiencing. However, as great as it is, synthetic monitoring does have limitations.

What Are the Main Points of Failure in the PSTN Supply Chain?

In this series of articles, we are reviewing in detail the PSTN routing for Microsoft Teams voice. In the previous article, we reviewed the challenges IT teams can face when mixing Microsoft Teams, PBXs and PSTNs. Now, let’s take a deeper look at the complexity and potential points of failure in the PSTN supply chain.

Using cfbs with a traditionally managed policy set

With the recent release of build.cfengine.com and cfbs I have been thinking about the process of converting a traditionally manged policy set. I consider a traditionally manged policy set one where you have a repo with the root of masterfiles being the root of the repository, or even having no repository at all and managing masterfiles by editing directly in the distribution point (e.g. /var/cfengine/masterfiles).

Getting Started with Playbooks

It’s 2022: You’re good at your job, you’re maintaining modern systems, now you want to level up your team based on a solid foundation of their collective expertise. You want to standardize and centralize process documentation and make execution as easy and effective as possible so that everything runs smoothly, every time.

If you're adopting Kubernetes, you need Chaos Engineering

When Ticketmaster started their Kubernetes migration, they had to address a huge problem: whenever ticket sales opened for a popular event, as many as 150 million visitors flooded their website, effectively causing distributed denial of service (DDoS) attacks. With new events happening every 20 minutes and $7.6 billion in revenue at stake, outages could mean hundreds of thousands in lost sales.

Application Insights health check with Serverless360

Recently we launched features to provide support for App Insights in Serverless360. App Insights is one of the coolest features on Azure because it can integrate so easily with many different features such as: In Serverless360 our core principle is to democratize the support experience for your application.

Best Large File Transfer Tools

At a time when so much of business is digitized, it’s becoming critically important for organizations to have a way to transfer large files over the internet without compromising security. While it may seem like the importance of these transfers would lead to an abundance of great large file transfer options, finding a quality large file transfer tool can be tricky.

Security Apathy Is Real - Here Are 5 Ways Agencies Can Combat It

A new study—the SolarWinds IT Trends Report 2021—suggests, although tech pros are confident with their work from home and remote work policies, agencies are at a critical inflection point as this confidence could create complacency or lead to security failures. Rather than potentially fall behind, here are five steps government agencies can take to combat security apathy and proactively manage cyber risk when we emerge from the pandemic. 1.