Operations | Monitoring | ITSM | DevOps | Cloud

Disaster Recovery Preparedness for Your Kubernetes Clusters

In the pre-Kubernetes, pre-container world, backup and recovery solutions were generally implemented at the virtual machine (VM) level. That works for traditional applications when an application runs on a single VM. But when applications are containerized and managed with an orchestrator like Kubernetes, this system falls apart. That means effective disaster recovery (DR) plans for Kubernetes must be designed for containerized architectures and natively understand the way Kubernetes functions.

How to optimize your logging costs

CIOs see data costs as their greatest logging challenge to overcome, according to this survey we collaborated on with IDC. If you’re running significant production operations, you’re almost certainly generating 100’s of GB of log data every day. Naturally, you’re also monitoring those logs and querying for incident investigations. However, most log data is never queried or analyzed, yet makes up the majority of logging costs.

Ensuring Availability and Security for Remote Workers

The year 2020 has seen various changes throughout the world but no change has seen more of an impact than the Corona-virus. During this epidemic, workers from all industries have moved from a traditional office-based role to WFH (Working From Home). It’s known as a business transforms it brings new risks associated with it. New and emerging technologies and the practices they involve require operational, policy and security measures to be implemented and evolved over time.

Continuous Deployment vs. Continuous Delivery: What is the difference?

Being in the DevOps space, we're often asked questions about software deployment like, "What's the difference between continuous deployment and continuous delivery?", "What is continuous deployment?", and "Are continuous deployment and continuous delivery the same thing?" So first, let's start by clearly defining these terms.

Hey, [Insert Family/Friend Name Here], Let's Talk About Online Security

2020 keeps on proving the old adage, “It gets worse before it gets better.” We still seem to be in the “worse” stage. If you’ve been paying attention to the news—and I don’t blame you if you’ve been taking a break for sanity’s sake—you might have noticed (in addition to the reports about the pandemic and social issues) hacks and general security breaches have been ramping up.

Are Cloud Computing Engineers the Missing Link on Your Federal IT Team?

Cloud computing can be more complex than anticipated, particularly as agencies continue to move applications and operations into a cloud environment. Does your federal IT team have the in-house skills to ensure cloud computing is helping your agency rather than draining its money and resources?

Ivanti's Latest Service and Asset Management Enhancements Resolve up to 80% of Issues Before Users Report Them

The theme for Ivanti this summer has been one of transformation, and in keeping with that theme, today we announced enhanced capabilities for the Ivanti Enterprise Service Management portfolio. Leveraging Ivanti Neurons, these enhancements include: The new releases give service desks greater visibility—in real time—to actionable information across their device estate to improve the accuracy, speed and efficiency of services delivered.

Monitoring CDN Cache Hit Miss Ratio

In today’s Tip of the Day, we are looking at validating the performance of your CDN cache vs. the CDN origin content. Having this information at your fingertips will allow you to verify that (i) your CDN service is improving performance for your end users; and (ii) they are adhering to your SLAs. Your CDN Monitoring solution needs to offer a comprehensive set of insights into regional performance problems, network routing challenges, and other overall performance issues, including origin vs.

The "Problems" With Agile and Scrum

Agile is a popular buzzword in software development, with some organizations and teams masquerading as “agile” while they are actually doing something very different. I’ve seen it numerous times in my career as an Agile Coach: A leader claims to embrace agile values, but micromanages engineering teams and uses agility as a way to manipulate developers to work long hours. The result?

Securely manage credentials while monitoring Kubernetes workloads with autodiscovery

In the world of containers and Kubernetes, observability is crucial. Cluster administrators need visibility into the infrastructure and cluster operators need to know the status of their workloads at any given time. And in both cases, they need observability into moving objects. This is where Metricbeat and its autodiscover feature do the hard part for you.