Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Americaneagle.com and ROC Commerce stay ahead with Retrace

As a digital agency, the last thing you need are production issues for your ecommerce clients. The stakes are even higher when your ecommerce clients are running Super Bowl ads for millions to see. Instead of enjoying the game, you are faced with troubleshooting a dumpster fire. The development teams at Americaneagle.com and ROC Commerce rely heavily on Application Performance Management (APM) tools, especially on high stakes game days.

How to configure HTTPS for an Nginx Docker Container

There are a few ways to effectively configure HTTPs for an Nginx Docker Container. In this guide, we will quickly cover configuration through the use of free certificate authority Let’s Encrypt. For plenty of people, using Let’s Encrypt to configure HTTPS for an Nginx docker container is a good option. A paid version like Comodo’s SSL certificates may make more sense if you want to increase the security of your site and server.

DevOps and the Cloud: 5 Ways DevOps And the Cloud Will Come Together in 2020

More and more companies are beginning to turn to DevOps and the cloud as a way to improve their software teams. Whilst it used to be that development and operations were seen as separate, that view has now changed. Linking the two leads to better communication, faster development times, and the ability to stay on top of things.

Stackify's New Pricing: Everything you need to know

Stackify Retrace pricing is changing. We’re moving away from our old device-based billing to a modern usage-based billing. This means you’ll pick a plan based on the exact amount of projected logs and performance traces you collect and nothing more. You’re probably wondering why and what’s in it for me. Stackify has one core belief that has guided us since our inception and will never change.

Node.js Microservices: Developing Node.js Apps Based On Microservices

Node.js application developers, in the ever-evolving business landscape, enjoy tangible advantages while incorporating microservices in Node.js apps development. The microservice architecture, or microservices, is a distinct method of software systems development, which attempts to create modules that are single-function, with well-defined operations and interfaces.

Kubernetes in Production: 6 Key Considerations

Kubernetes is an open-source platform for container orchestration. You can use it to deploy a highly resilient, self-healing infrastructure using automation and infrastructure as code (IaC). Kubernetes includes features for zero downtime deployments, scaling, automatic rollout and rollback of updates, and service discovery. Kubernetes is designed to help you manage container deployments at scale via REST API.

Java Development Mistakes: Avoid These 7 Mistakes When Java Developing

Over time, Java has become a popular programming language in software development. Although Java is more popular with developers than C or C++, this programming language still has its problems. Here are seven Java development mistakes that developers can make and how you can avoid them.

How to Create SQL Percentile Aggregates and Rollups With Postgresql and t-digest

When it comes to data, let’s start with the obvious. Averages suck. As developers, we all know that percentiles are much more useful. Metrics like P90, P95, P99 give us a much better indication of how our software is performing. The challenge, historically, is how to track the underlying data and calculate the percentiles. Today I will show you how amazingly easy it is to aggregate and create SQL based percentile rollups with Postgresql and t-digest histograms!

Kubernetes Security Best Practices You Must Know

Kubernetes (k8s) enables you to efficiently orchestrate container management, in the cloud or on-premises. As a whole, k8s provides many benefits, including features for self-healing, automated rollouts and rollbacks, load distribution, and scalability. However, k8s is a highly complex platform and requires extensive configuration.

How to Incorporate Security Into Your company's SDLC

It’s been shown that if you follow a proven collection of practices for developing, designing, testing, implementing, and maintaining your software, you will produce a much higher quality product. Over the past few years, we have seen an increasing number of cases of attacks on the application layer. The Open Web Application Security Project, OWASP, estimates that around one-third of web applications contain security vulnerabilities.