Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Automated Containerization of Apps Using CloudHedge

Well, the answer is yes and no. Containerization is a relatively new technology and needs significant efforts to containerize an application, orchestrate, secure, manage and monitor it. Hence it’s worth looking at what does it take to containerize, deploy and run an application in real production in bit details for you to take a call whether you want to venture into it yourself or not.

Poor Web Hosting and Maintenance Leads to Hacking

Many individuals feel accomplished after owning a business website; so much so that they even forget to set up security defenses around it. On the other hand, most of the people deliberately skip this step because why would hackers hack small-scale business models, right? You would be surprised to learn that 43% of hackers target small businesses. Besides, 60% of small-scale companies go out of business within six months of a cyberattack.

Signal Sciences brings real-time web attack visibility to Datadog

Signal Sciences is proud to announce our integration with the Datadog platform. This integration furthers our mission of producing the leading application security offering that empowers operations and development teams to proactively see and respond to web attacks—wherever and however they deploy their apps, APIs, and microservices.

Deploying Redis with the ELK Stack

In a previous post, I explained the role Apache Kafka plays in production-grade ELK deployments, as a message broker and a transport layer deployed in front of Logstash. As I mentioned in that piece, Redis is another common option. I recently found out that it is even more popular than Kafka! Known for its flexibility, performance and wide language support, Redis is used both as a database and cache but also as a message broker.

GripMatix releases new Citrix MP

At Squared Up we frequently get asked about Citrix monitoring and dashboards, especially by customers who aren’t paying for the premium ‘Citrix Platinum’ license and so don’t have access to SCOM management pack from Citrix. That’s why we were very excited to hear that there is a new SCOM management pack for monitoring Citrix.

Building Sentry: Source maps and their problems

Welcome to our series of blog posts about all the nitty-gritty details that go into building a great debug experience at scale. Today, we’re looking at the shortcomings of source maps. Other than Python, JavaScript is the oldest platform that Sentry properly supports, which makes sense considering many Python services (including Sentry itself) have a JavaScript front-end. As the popularity of transpiling grew, the need for tools to debug transpiled code in production became obvious.

Coming Soon: Seamless and Cost-Effective Meta Tags for Metrictank

One of the major projects we’re working on for Metrictank – our large scale Graphite solution – is the meta tags feature, which we started last year and are targeting to release in a few months. A lot of people don’t realize this, but Graphite has had tag support for more than a year. Our mission with Metrictank is to provide a more scalable version of Graphite, so introducing meta tags was a logical next step.

Elasticsearch security: Authentication, Encryption, Backup

There’s no need to look outside the Elastic Stack for apps to ensure data protection. Basic Elasticsearch Security features are free and include a lot of functionality to help you prevent unauthorized access, preserve data integrity by encrypting communication between nodes, and maintain an audit trail on who did what to your stack and with the data it stores. From authentication to encryption and backup, Elasticsearch security covers everything that’s needed to safeguard your cluster.

CI/CD/Civo/C-what?

As a cloud provider and DevOps-focused company, we definitely want to practice what we preach. We see the benefits of a modern cloud native architecture, so we built our hosting of www.civo.com and api.civo.com (our application) to take full use of these modern decisions. This post describes our approach to Continuous Integration (CI) and Continuous Deployment (CD) from a Chief Technical Officer's perspective.

Icinga Cube 1.1.0 is out!

As a little introduction for everyone who has not heard about the cube yet: The cube module is there to show statistics grouped by the custom variables that have been set for the hosts and services. They are then displayed in up to three dimensions for a quick overview to show the relations. The most prominent change is the addition of services: While it used to be only possible to have the hosts in a cube, the module has now been extended to provide full functionality with services as well.