Operations | Monitoring | ITSM | DevOps | Cloud

Why Do You Need to Document Your Microsoft Azure Usage?

As the adoption to cloud expand, subscribing and provisioning resources increases day by day. Enterprises have multiple strategies to implement their cloud deployments: single cloud, private cloud, multi-cloud, or hybrid cloud. There is a need to analyse and assess on regular basis to keep a watch on the usage to ensure expenditure on the cloud resources are efficient and there is no wastage. There are various possibilities but will need some level of technical competence and regular maintenance.

End to End Tracking for Azure Integration Solutions

In any integration solution, when many Azure services come together to communicate with each other, there is a need for the organizations to build an end-to-end traceability/monitoring solution that can be used by the business users and IT support. Perform end-to-end message tracking and capturing necessary data on business process flow across Azure resources and hybrid integrations. Consider an organisation that has a well-defined Employee Onboarding process.

Manage Dynamic Schemas at Scale with Rudderstack & dbt

I recently had the pleasure of hosting a webinar with the team over at Rudderstack. It focused on Data Engineering and managing dynamic schemas at scale. More specifically, Rudderstack-generated, dynamic schemas at scale. This blog will discuss the tools, software, and methods to do just that.

AIOps: Clearing the Path for Automated Operations

In the ScienceLogic webinar, “Clearing the Path for Automated Operations,” we look at how one global technology organization got their IT house in order through the application of AIOps and a strategic approach to implementation, based on ScienceLogic’s AIOps Maturity. ITOps teams are overloaded with manual, repetitive work that creates management bottlenecks and takes time away from new projects.

Kubernetes security issues: An examination of major attacks

In a never-ending game of cat and mouse, threat actors are exploiting, controlling and maintaining persistent access in compromised cloud infrastructure. While cloud practitioners are armed with best-in-class knowledge, support, and security practices, it is statistically impossible to have a common security posture for all cloud instances worldwide. Attackers know this, and use it to their advantage. By applying evolved tactics, techniques and procedures (TTPs), attackers are exploiting edge cases.

Generating DDL Statements to Recreate Single Objects

Every database administrator (DBA) is—first and foremost—human. And everyone makes mistakes. It’s not the absence of mistakes but rather how you prepare for those mistakes that makes you a great DBA. Luckily, there are many ways to prepare for those mishaps, whether the errors are made by you or someone else on your team. One commonly made mistake is to drop an object in a database or accidentally delete data.

Extend Your APM Capabilities With End-User Data

In the internet-driven economy, businesses rely on applications for different functions in the customer, partner, and employee spheres. Over the years, such applications have become more functional, faster, and user-friendly. However, end users still encounter slow loading pages, transaction failures, and esoteric error messages. These errors cause inconvenience to the users and lead to significant financial and reputational losses.

A Policy Change To Prevent Abuse on JFrog Cloud

As of August 5, 2021, JFrog will require newly created free JFrog cloud subscription users to provide valid credit or debit card information in order to activate Pipelines CI/CD. In the months since offering Pipelines CI/CD as part of a free JFrog cloud subscription, we have unfortunately experienced a rapid growth in abuse of the free compute resources from some accounts.

What's the ROI? How Operational Maturity Improves Customer and Team Satisfaction

Are we looking at the new normal now? In the last 18 months, organizations all over the world were compelled to undergo a rapid digital transformation and mature their operations to support services that were under unprecedented strain. Digital transformation allows companies to embark on large-scale cloud migrations and adopt modern development methods like DevOps and Agile.

My honest review: I tried AWS Serverless Monitoring using Dashbird.io

As a startup, we always want to focus on the most important thing — to deliver value to our customers. For that reason, we are a huge fan of the serverless options provided by AWS (Lambda) and GCP (Cloud Function) as these allow us to maintain and quickly deploy bite-size business logic to production, without having to worry too much about maintaining the underlying servers and computing resources.