Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Deployment Tracking with Atatus

Now Deployment tracking is available for both APM and Browser products in Atatus. The deployment tracking is one of the most awaited feature in Atatus. It provides better visibility of your software releases for both back-end and front-end apps. When you deploy a new version of your app, you can notify Atatus with source revision or git SHA or application version. Then you will be able to see how new deployment affect your app performances from previous deployment.

User Story: The CloudSploit CloudFormation Scanning API

At CloudSploit, one of our biggest satisfactions is learning more about how our users actually use our product. While we can look at charts, graphs, and usage statistics, nothing beats an actual walkthrough by an enthusiastic user who has incorporated CloudSploit into his or her company’s architecture.

The Crazy Simple Manifesto

Creatives and businesses depend on programmers to fulfil their visions. The problem? Programmers are scarce. There are 230,000 unfilled jobs for programmers in the U.S. alone, and more than 90 percent of the gap is outside Silicon Valley. And, when the vast majority of the world’s great software talent resides in the halls of tech juggernauts — like Google, Amazon and Facebook — giving them an embarrassment of riches, the rest of the world is left behind.

Connect to MySQL ElastiCache through EC2

You can quickly and efficiently use SSH to safely access data in your remote MySQL RDS data stores with just a single command. This tip not only enables you to access your remote server as if it was local and take advantage of local tools, but also modify data remotely, download MySQL backups, and do it all securely, through an SSH encrypted connection.

Connect to Redis ElastiCache through EC2

You can quickly and efficiently use SSH to safely access data in your remote Redis Elasticache data stores with just a single command. This tip not only enables you to access your remote server as if it was local and take advantage of local tools, but also modify data remotely, download Redis data, and do it all securely, through an SSH encrypted connection.

Connect to Memcache ElastiCache through EC2

You can quickly and efficiently use SSH to safely access data in your remote Memcache Elasticache data stores with just a single command. This tip not only enables you to access your remote server as if it was local and take advantage of local tools, but also modify data remotely, download Memcache data, and do it all securely, through an SSH encrypted connection.

Network Configuration Management Best Practices

One of the biggest responsibilities of system administrators and DevOps professionals is ensuring networks are always functioning properly. Network configuration management used to be a simple task. Watch resource usage and make the appropriate tweaks when the occasional traffic spike occurred. Since then, the rise of agile principles within the DevOps field has required system administrators to adapt to rapid shifts in their field.

Simple Authentication with AWS Cognito

I was recently doing some work related to AWS Cognito, which I wasn’t previously familiar with, and it turns out to be pretty interesting. Stackery has a cloud-based app for building and deploying serverless applications, and we use Cognito for our own authentication. The thing I was trying to do was hard to figure out but easy once I figured it out, so I’ll include some code snippets related to my specific use case.