Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Monitor Harbor container registry with Datadog

Harbor, developed by VMware and hosted by the CNCF, is an open source registry for container images and Helm charts. Hosting Harbor within your infrastructure gives you a number of advantages over using the default Docker registry, such as role-based access control, security scanning, and replication of resources between registry instances. Since a failed Harbor deployment can spell trouble for your containerized workloads, monitoring your self-hosted container registry is critical.

Best Practices for Automating Monitoring

Developer teams and even operational teams often ignore monitoring applications. Deadlines, inexperience, company culture, and management can lead to poor or neglected monitoring inside developing platforms. Automating all monitoring tasks is an excellent way to avoid this scenario. Automation leads to lower costs, less time spent solving issues, and more efficient teams.

Monitoring Amazon Classic Elastic Load Balancers with Blue Matador

AWS Elastic Load Balancing is one of the most widely used of Amazon’s cloud services. In many AWS stacks, an Elastic Load Balancer (ELB) will be involved in almost every single request that customers make to your application. Since they are critical to the health of your application, properly monitoring ELBs is a top priority for most teams. In this blog post, we will go over how Blue Matador monitors Classic Elastic Load Balancers automatically and without configuration.

Introducing the new Sysdig Secure policy editor

Among many other features Sysdig Secure version 2.4 introduces a new and improved runtime policy editor, along with a comprehensive library combining out-of-the-box run-time policies from our threat research teams, container-specific compliance standards, Kubernetes security and Falco opensource community rules.

Sysdig Secure 2.4 introduces runtime profiling for anomaly detection + new policy editor for enhanced security.

Today, we are excited to announce the launch of Sysdig Secure 2.4! With this release, Sysdig adds runtime profiling to enhance anomaly detection and introduces brand new interfaces that improve runtime security policy creation and vulnerability reporting. These features are focused on upgrading the experience of creating your security policy to detect security threats and attacks to your infrastructure and apps.

Code Commits: only half the story

It’s not the first time I’ve been asked by a sales rep the following question: “The customer has looked at Stackalytics and is wondering why Rancher doesn’t have as many code commits as the competition. What do I say?” For those of you unfamiliar with Stackalytics, it provides an activity snapshot, a developer selfie if you will, of commits and lines of code changed in different open source projects.

Extend CI/CD with CR for Continuous App Resilience

The radical shift towards DevOps and the continuous everything movement have changed how organizations develop and deploy software. As the consolidation and standardization of continuous integration and continuous delivery (CI/CD) processes and tools occur in the enterprise, a standardized DevOps model helps organizations deliver faster software functionality at a large scale.