Operations | Monitoring | ITSM | DevOps | Cloud

Announcing HAProxy Kubernetes Ingress Controller 1.8

We’re proud to announce the release of version 1.8 of the HAProxy Kubernetes Ingress Controller! In this release, we added support for full rootless mode, Prometheus metrics for the controller itself, and examples that are synchronized with our Helm chart. In this blog post, you will learn more about the changes in this version. Register for our webinar to learn more about this release.

Using Relay's flexibility to turn scripts into permanent tools

Relay’s inputFile capability is handy because it allows you to use familiar programming languages to get custom solutions working quickly. Using an inputFile with Relay is as easy as writing a script in bash, Python, or Powershell, and storing it in a remote Internet-accessible repository like GitHub. Let’s see how Relay enhances our daily driver skillset to solve problems quickly and reliably with minimal code.

The Power of ChaosSearch Alerts

How can you derive value from data? One answer is to generate alerts based on the data. Alerts help your team stay on top of a variety of potential challenges – like application performance issues, security risks, disruptions to the CI/CD delivery chain and beyond. ChaosSearch’s flexible alerting system makes it easy to generate alerts relevant to your organization’s needs.

How to Manage Data Center Cabling

Tracking and managing data center cabling is one of the most overlooked aspects of data center management. However, when it’s not done properly, it can cause all kinds of problems from costly downtime to inefficient use of capacity. Don’t settle for cable spaghetti. Keep reading to find out the basics about data center cabling, understand how to track and organize it, and learn how the best data center managers in the industry are dramatically simplifying cable management.

Building a search experience with Elastic

We’re excited to share an end-to-end demo that showcases how Elastic empowers developers to build rich search solutions. The demo provides mechanisms to run in your own environment, to ingest data into Elastic Enterprise Search using the Enterprise Search Python Libraries, and to create a modern UI in React, using the free and open source tool Search UI.

Trusted Device Authentication 101

Suppose you have to use your phone or other devices frequently, and you don’t want to type your password every time you wish to access an application. By implementing Trusted Device authentication, your system will recognize the device’s authentication and help you log in to the application quickly and safely. The whole process will not only save your time but will also allow you to witness an advanced authentication procedure.

Service Level Objectives as Code: Terraforming Honeycomb SLOs

In March, we announced official support for a Honeycomb Terraform Provider. Today, we’re announcing additional support for managing Honeycomb Service Level Objectives (SLOs) with Terraform. This furthers Honeycomb’s support for configuration as code and it gives you programmatic control for an immensely popular Honeycomb feature.

Announcing LM Envision

LogicMonitor’s unified observability platform brings clarity to Enterprise IT 2022 Is another exciting year for LogicMonitor. Today, LogicMonitor brought together customers, partners, industry analysts, and visionary thought leaders in New York City for our annual user conference, LM Elevate to discuss how to“elevate” their monitoring, their digital transformation, and their industries.

Modernizing service delivery for government employees and citizens

Modern digital experiences play a major role in how government agencies serve their communities. Digital enhancements can streamline processes, improving reliability and accessibility for employees and citizens. Both groups need to access services through multiple channels. Modernized solutions that enhance employee experiences can improve service delivery across the board.