The large volumes of logs, metrics, and traces generated by scaling cloud environments can be overwhelming, but they must be collected to identify and respond to production issues or other signals showing business or application issues. To collect, monitor, and analyze this data, many teams choose between open source or proprietary observability solutions.
May 27, 2020 By @blag After acquiring the StackStorm product and the amazing StackStorm team in 2017 from Brocade, Extreme Networks has been a large contributor (if not the largest contributor) to the StackStorm project, even donating the code and transferring the StackStorm trademarks to the Linux Foundation last year. Continuing that tradition, Extreme Networks announced today that they were donated their enterprise extensions of StackStorm (previously StackStorm Enterprise) to the Linux Foundation!
Nowadays, a working digital infrastructure is the lifeblood of almost any organization. The impact of a major IT incident can go far beyond the IT department, affecting a company’s revenue or incur costs in other areas of the business caused by service disruption. Therefore, in addition to the technical response to a major incident from the IT department, business stakeholders need to be involved as well, so they can prepare the business response.
At Taloflow, we are determined not to be the cobbler whose children went barefoot. We approach our own AWS costs as if we are helping one of our customers. The results are striking and worth sharing. And, with zero upfront or reserved commitments required! This post illustrates how a little bit of diligence and a clear cost objective can end up making a large impact on profitability.
Under the hood, the HAProxy Data Plane API and the HAProxy Kubernetes Ingress Controller are powered by a shared set of Go libraries that apply changes to an HAProxy configuration file. In this talk, Marko Juraga describes how these libraries are developed and invites you to use them in your own projects when you need to integrate with HAProxy. Watch Marko’s presentation video or read the transcript below. Explore more HAProxyConf 2019 talks in our User Spotlight Series.
If you follow any kind of tech news feed, you’ve surely seen stories about unwanted “guests” doing God knows what in someone’s collaboration room. I take these intrusions very seriously, but I don’t think it’s the most serious security threat we face in UC and IT overall.
Recently, a colleague of mine joked that she manages a marketing team of three: Claire, Mark, and Sally. The punchline is that she’s referring to Clearbit, Marketo, and Salesforce. She felt that way because they each have their own role with unique insights and jobs, and her team shares information with everyone else the same way she does through chat.
New applications and workloads are constantly being added to Kubernetes clusters. Those same apps need to securely communicate with resources outside the cluster behind a firewall or other control point. Firewalls require a consistent IP, but routable IPs are a limited resource that can be quickly depleted if applied to every service.
My name is Kat Cosgrove, and I’m a Developer Advocate at JFrog. Before that, I was an engineer on JFrog’s IoT team. Our goal is to bring DevOps to the edge, because it shouldn’t be as difficult to update these kinds of devices as it currently is. In pursuit of this goal, we found a lot of interesting solutions that we could bring into a CI/CD pipeline for embedded Linux devices, and eventually built a rather flashy proof of concept that put several of these solutions on display.