Operations | Monitoring | ITSM | DevOps | Cloud

Securely manage credentials while monitoring Kubernetes workloads with autodiscovery

In the world of containers and Kubernetes, observability is crucial. Cluster administrators need visibility into the infrastructure and cluster operators need to know the status of their workloads at any given time. And in both cases, they need observability into moving objects. This is where Metricbeat and its autodiscover feature do the hard part for you.

The No Sweat Guide to Effective Switch Management

An on-site switch plays a critical role in a network: that of connecting your users to the rest of the IT infrastructure. Don’t think of that jack in the wall or under the cubicle as a simple Ethernet port. As part of effective switch management, you need to think of it as the mission-critical gateway to IT services that it is.

Deploy packages from a Cloudsmith repository with Puppet

Puppet is a Continuous Configuration Automation tool that’s you can use to automate the configuration of your entire infrastructure. You can use it to manage the configuration of anywhere from a few, to thousands of servers or devices. Puppet consists of two main components: The Puppet Server The Puppet server is where you create and store your configurations and define which nodes specific configurations will be applied to.

Continuous Deployment vs. Continuous Delivery: What is the difference?

Being in the DevOps space, we're often asked questions about software deployment like, "What's the difference between continuous deployment and continuous delivery?", "What is continuous deployment?", and "Are continuous deployment and continuous delivery the same thing?" So first, let's start by clearly defining these terms.

Hardware Asset Management: Knowing When to Upgrade

When is it time to say goodbye? For a hardware device, that question can be tough to answer. Though the device has been in the environment for several years, there is still usable life left. So why would we retire and dispose the device and spend additional money on a replacement? With the device’s lifecycle information, that answer becomes much clearer.

Many-to-Many Communication: The Next Generation of Deterrence

Military strategists will often tell you that the best way to win a conflict is to prevent it by projecting an unmistakable posture of strength, preparedness and resolve. As history has shown in the seven decades since the Second World War, deterrence doesn’t come cheap, certainly not in the era of modern, technology-enabled warfare. Yet it is still far less costly in lives, dollars, and equipment than letting a hostile situation escalate out of hand.

How We Use Quarkus With Kafka in Our Multi-Tenant SaaS Architecture

At LogicMonitor, we deal primarily with large quantities of time series data. Our backend infrastructure processes billions of metrics, events, and configurations daily. In previous blogs, we discussed our transition from monolith to microservice. We also explained why we chose Quarkus as our microservices framework for our Java-based microservices. In this blog we will cover.