Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Bringing rich and real-time infrastructure monitoring to Netdata Cloud

The Netdata Agent is well-equipped to solve monitoring and troubleshooting challenges for single nodes. We love that the Agent is so valuable to our users, but Netdata Cloud is designed for infrastructure monitoring. That’s why we’re working so hard to offer even more capabilities and help users monitor and troubleshoot infrastructures of all sizes, entirely for free!

Monitoring RabbitMQ With Prometheus and Grafana

Prometheus and Grafana are powerful monitoring solutions. Combined together, you can build insightful monitoring metrics and display analysis on a beautiful dashboard. Among many external systems and applications, you can also monitor RabbitMQ with both toolkits. To integrate RabbitMQ into your Prometheus and Grafana, you can try MetricFire that provides hosted solutions for Prometheus and Grafana.

Containers vs. VMs: Which Should You Use?

Both containers and virtual machines are virtual environments that comprise a number of computing components and are independent in nature, thereby allowing developers to scale applications in isolated runtimes. Both of these concepts aim at providing independent sets of resources to individual computing environments to ensure quick and reliable application performance.

Using the new GitHub Container Registry with Codefresh

The GitHub Container Registry has just been announced by GitHub and is supported natively on Codefresh like any other Docker repository. Codefresh provides multiple options to connect to Docker Container Registries, one of which is GitHub Container Registries. Currently, GitHub plans to include the GitHub Container Registry within the pricing model of GitHub packages. In comparison, Docker Hub has added rate limits to free accounts.

Virtualization: Definition, Key Metrics to Monitor

With organizations worldwide moving towards digitization and remote working models, there is an increased need for more computing power and server resources. But not everyone can afford to host state-of-the-art, well-maintained servers in their premises. And that is why virtualization technology is so popular today. Virtualization technology enables organizations of all sizes to make use of IT services without the hardware resource constraint. Are you thinking about how virtualization can help you?

Get Around Docker Hub Download Limits: JFrog Artifactory

You may have heard the latest Docker announcement about the new rate limits for container image pulls. Starting November 1st, Docker will start to limit Docker Hub usage based on your subscription level and block pull requests that exceed imposed limits. Not only that, Docker has also put in place a new retention policy, six months for free accounts, for inactive images (originally slated for November 1, this policy has been delayed to mid-2021 due to community feedback).

Build a Raspberry Pi Desktop with an Ubuntu heart

On the 22nd October 2020, Canonical released an Ubuntu Desktop image optimised for the Raspberry Pi. The Raspberry Pi Foundation’s 4GB and 8GB boards work out of the box with everything users expect from an Ubuntu Desktop. It is our honour to contribute an optimised Ubuntu Desktop image to the Raspberry Pi Foundation’s mission to put the power of computing into people’s hands all over the world.

Going Serverless: Best Practices

Making the move to serverless architecture? By accelerating app development time, serverless isn’t just a boon for business, it’s also a win for engineering teams. Gartner explains: “Serverless architectures enable developers to focus on what they should be doing — writing code and optimizing application design — making way for business agility and digital experimentation.”

Track open source security exposure with Snyk and Datadog

Using open source code makes it easier to build applications, but the freely available nature of open source code introduces the risk of pulling potential security vulnerabilities into your environment. Knowing whether or not customers are actually accessing the vulnerable parts of your application is key to triaging security threats without spending hours fixing an issue that doesn’t affect end users.