Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

Logging Agents vs. Logging Libraries: Which Should You Use?

When logging applications to a centralized location like LogDNA, developers have two options: using a logging agent or using a logging library. Both approaches will get your logs to their destination, but choosing one over the other can have a significant impact on the design of your applications and infrastructure. In this article, we’ll explain the difference between logging via agents and logging via libraries, and which approach works best in modern architectures.

DevOps interview questions: How to prepare

On LinkedIn, there are more than thirty thousand U.S.-based DevOps positions. That number may not be as high as it is for software developers, but it’s still higher than sysadmins or systems engineers. Maybe this demand has you interested in switching career paths, or maybe you want to change jobs. If that’s the case, you’re in luck. Today’s post will present some common interview questions that you’ll probably get when interviewing for a DevOps position.

Acronym Buster: IT Operations Tools

TLDR: There's a LOT of different tools out there... Clearly feeling the world was in desperate need of more acronyms, IT operations has well and truly stood up to the plate. Dazed and confused - and with FOMO about to kick in – I thought now would be a good time to write up an acronym buster so I could finally put those woes to bed. That, and I promised my manager I'd publish a new blog before COP.

The simple, powerful way to boost your IT team's performance

IT teams, we are at a crossroads. We’ve spent years, if not decades, being thought of as cost centers at the best of times, and more often, a source of bottlenecks. Now, we’re making a name for ourselves as facilitators of innovation and providers of legendary service. Our companies are recognizing how critical we are to their success.

Website Security: Web Monitoring Tips for Keeping Your Site Safe

With the constant threat of DDoS, DNS attacks, malware, and data breaches; website security is a top priority for today’s tech teams. You’ve taken the appropriate measures. Your domain uses HTTP/S, SSL encryption, and is locked up tight. Or is it? In 2018, Symantec reported over 70 million records were leaked or stolen because of misconfigured S3 buckets.

Deploying Redis Cluster on top of Kubernetes

Redis (which stands for REmote DIctionary Server) is an open source, in-memory datastore, often used as a database, cache or message broker. It can store and manipulate high-level data types like lists, maps, sets, and sorted sets. Because Redis accepts keys in a wide range of formats, operations can be executed on the server, which reduces the client’s workload. It holds its database entirely in memory, only using the disk for persistence.

Navigating Network Services and Policy With Helm

Deploying an application on Kubernetes can require a number of related deployment artifacts or spec files: Deployment, Service, PVCs, ConfigMaps, Service Account — to name just a few. Managing all of these resources and relating them to deployed apps can be challenging, especially when it comes to tracking changes and updates to the deployed application (actual state) and its original source (authorized or desired state).