Operations | Monitoring | ITSM | DevOps | Cloud

Enterprise monitoring software: what to know before choosing

Finding an enterprise monitoring software is not an easy task. On the one hand, there are multiple options on the market that offer solutions of all kinds. On the other hand, you know that the implementation and eventual replacement of a tool with these features can be a burden and that, if you make a bad decision, you will regret it later.

How to configure HTTPS for an Nginx Docker Container

There are a few ways to effectively configure HTTPs for an Nginx Docker Container. In this guide, we will quickly cover configuration through the use of free certificate authority Let’s Encrypt. For plenty of people, using Let’s Encrypt to configure HTTPS for an Nginx docker container is a good option. A paid version like Comodo’s SSL certificates may make more sense if you want to increase the security of your site and server.

TL;DR InfluxDB Tech Tips - How to Use the CLI Locally to Access the Flux REPL and Write a Regular CSV to InfluxDB Cloud

In this post we share how to use the InfluxDB CLI with InfluxDB Cloud. This TL;DR assumes that you have registered for an InfluxDB Cloud account – registering for a free account is the easiest way to get started with InfluxDB.

Splunking Azure: Event Hubs

Event Hubs are a big data streaming PasS capability provided by Azure. Event Hubs can process data or telemetry produced from your Azure environment. They also provide us a scalable method to get your valuable Azure data into Splunk! Splunk add-ons like the Splunk Add-on for Microsoft Cloud Services and the Microsoft Azure Add-on for Splunk provide the ability to connect to, and ingest all kinds of data sources from your Azure environment.

This is all you need to know about Lambda cold starts

So much has been written about Lambda cold starts. It’s easily one of the most talked-about and yet, misunderstood topics when it comes to Lambda. Depending on who you talk to, you will likely get different advice on how best to reduce cold starts. So in this post, I will share with you everything I have learned about cold starts in the last few years and back it up with some data.

The Complete Guide to Log Analysis: What it is, How it Works, Use Cases & Tools

Logs are one of the most valuable assets when it comes to IT system management and monitoring. As they record every action that took place on your network, logs provide the insight you need to spot issues that might impact performance, compliance, and security. That’s why log management should be part of any monitoring infrastructure.

6 Network Monitoring Best Practices that Every IT Team Should Focus On

The network monitoring teams can now tap into Internet-of-Things, software-level network, and cloud-based services to ensure maximum uptime and optimal network performance. However, adapting to these technologies would mean defining new practices for legacy architecture integration, reengineering the monitoring workflow, and evaluating the toolkit for enhancing comprehensive and layered network management.

Technology Business Management and Chaos Engineering

Get started with Gremlin’s Chaos Engineering tools to safely, securely, and simply inject failure into your systems to find weaknesses before they cause customer-facing issues. Technology Business Management (TBM) is a decision-making tool that helps organizations maximize the business value of information technology (IT) spending by adjusting management practices. With TBM, IT is transformed to run like a business instead of merely a cost center.

Getting the Most out of Your Website Performance Audit

A website performance audit is a full analysis of your marketing, usability, and search ranking. Audits are no sunny afternoon picnic. For your team, the task may be equivalent to getting sound-blasted with unexpected microphone feedback. Like feedback, a positive gain loop between a microphone and a loudspeaker, building up your site’s SEO with content, keywords, and ads increases your visibility to your audience.