Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

How to Achieve Zero-Downtime Application with Kubernetes

I’ve worked on on-premised and managed Kubernetes clusters for more than seven years. What I can say is that containers have drastically changed the hosting landscape! It has brought a lot of facilities where complex setups were required. Having several instances, with rolling restart, zero downtime, health check, etc. It was such a pain and time effort before (implementing VRRP solution, application monitoring restart with monit like, load balancing haproxy like)!

The Iceberg of Engineering Incident Costs

I've long been fascinated with the metaphor of an iceberg to describe a problem who’s true magnitude is obscured beneath the surface. If you’re not familiar with this phenomenon, when ice freezes it decreases in density. This allows the solid ice to float, partially, atop the water with only a small fraction of it exposed. In fact, icebergs hold nearly 90% of their mass hidden below the water.

Exploring Kubernetes Storage: Persistent Volumes and Persistent Volume Claims

In today's world of container-based applications, the role of storage has become more critical than ever. One of the most significant challenges of containerization is the management of stateful applications. Kubernetes, one of the popular container orchestration platforms, provides a solution to this problem - Persistent Volumes (PVs). PVs allow the storage provision to be decoupled from the lifecycle of the Pod, making it easier to manage stateful applications.

The Resolve Automation Flywheel: A "Good to Great" Automation Journey

Organizations lean on IT as the foundational force for helping the business succeed, even more so when stakes are high, and the future is unpredictable. Considering the countless tasks and processes carried out in IT, automation is no longer a nice to have. It’s a requirement for starting, and maintaining, a system of consistency that supports the business through instability and uncertainty.

How to Log HTTP Headers With HAProxy for Debugging Purposes

HAProxy offers a powerful logging system that allows users to capture information about HTTP transactions. As part of that, logging headers provides insight into what's happening behind the scenes, such as when a web application firewall (WAF) blocks a request because of a problematic header. It can also be helpful when an application has trouble parsing a header, allowing you to review the logged headers to ensure that they conform to a specific format.

21+ Stunning FinOps Statistics You Need To Read

A recent report found that managing cloud costs, alongside resource usage, is the most pressing cloud management challenge for the fifth straight year. This makes sense, considering respondents said a staggering 32% of their cloud budget went to waste in 2022 alone. It doesn't end there. The following FinOps statistics also demonstrate the value of the cloud for many organizations.

Why should every organization invest in cybersecurity software?

In today’s digital age, organizations across industries are increasingly reliant on technology for their operations, communication, and data management. While this technological advancement is no doubt beneficial, it also brings with it a heightened risk of cyber threats and attacks. From data breaches and ransomware attacks to intellectual property theft and financial fraud, the consequences of a cybersecurity breach can be devastating for any organization.

Develop, Operate, and Optimize with VMware Tanzu: A VMware Explore Round-Up

Applications are the center of your organization’s business. Success (or failure) depends on how quickly you can respond to dynamic market demands driven by cultural shifts, technical innovation, and global events. This business agility is driven by fast, predictable application delivery. The past few years have seen IT leaders in the public sector and private industry alike rushing to get better and faster at delivering applications and services to their customers, employees, and constituents.

AZcopy and GDPR compliance

In today’s data-driven world, managing information is more crucial than ever. With the constant flow of data, both individuals and organizations are increasingly concerned about privacy and security. The General Data Protection Regulation (GDPR) has emerged as a key legislative framework in the European Union to protect citizens’ personal data. But how does this relate to the tools we use to manage and transfer data, like Microsoft’s AzCopy?