Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Key metrics for CoreDNS monitoring

CoreDNS is an open source DNS server that can resolve requests for internet domain names and provide service discovery within a Kubernetes cluster. CoreDNS is the default DNS provider in Kubernetes as of v1.13. Though it can be used independently of Kubernetes, this series will focus on its role in providing Kubernetes service discovery, which simplifies cluster networking by enabling clients to access services using DNS names rather than IP addresses.

Tools for collecting metrics and logs from CoreDNS

In Part 1 of this series, we looked at key metrics you should monitor to understand the performance of your CoreDNS servers. In this post, we’ll show you how to collect and visualize these metrics. We’ll also explore how CoreDNS logging works and show you how to collect CoreDNS logs to get even deeper visibility into your Deployment.

How to monitor CoreDNS with Datadog

In Part 1 of this series, we introduced you to the key metrics you should be monitoring to ensure that you get optimal performance from CoreDNS running in your Kubernetes clusters. In Part 2, we showed you some tools you can use to monitor CoreDNS. In this post, we’ll show you how you can use Datadog to monitor metrics, logs, and traces from CoreDNS alongside telemetry from the rest of your cluster, including the infrastructure it runs on.

Monitoring as Code in Your Software Development Lifecycle

When we launched the Checkly CLI and Test Sessions last May, I wrote about the three pillars of monitoring as code. Code — write your monitoring checks as code and store them in version control. Test — test your checks against our global infrastructure and record test sessions. Deploy — deploy your checks from your local machine or CI to run them as monitors.

What is virtualization? A beginners' guide.

While information technology continues to evolve rapidly, virtualization remains a cornerstone of modern computing, enabling businesses to maximise resource utilisation, enhance flexibility, and reduce the total cost of ownership (TCO). It is a key building block of the cloud computing paradigm, and millions of organisations use it daily worldwide. All existing cloud platforms, such as AWS, Azure, Google or OpenStack, use virtualization underneath.

G2's Most Recommended WAF & DDoS Protection

In case you missed it, HAProxy Technologies recently put out a press release about our stunning leadership position in G2’s Summer 2023 Grid® Reports for load balancing. We’re incredibly proud of these results, which are a direct result of the hard work and dedication of HAProxy’s community developers and our enterprise product and support teams. Looking at the Momentum Grid® Report for Load Balancing, the gap between HAProxy and the rest is impossible to ignore.

How to optimize your high-performance computing workloads

One contributor to successful research is the ability to process and analyze enormous amounts of data. The speed of accessing information and performing computations is crucial to research institutions and organizations looking to innovate and lead in their domain. Yet to process and analyze all that data, researchers need high-performance computing resources that can handle these workloads.

Modernizing the Air Force: DAFITC 2023

D2iQ is excited to be participating in the Department of the Air Force Information Technology and Cyberpower (DAFITC) 2023, in Montgomery, Alabama, from August 28-30. The theme of this year’s DAFITC conference is “Digitally Transforming the Air & Space Force: Investing for Tomorrow’s Fight.” Digital transformation of the Air Force and Space Force is part of a wider modernization effort that is accelerating across all U.S.

Scaling Software Delivery: Continuous Delivery, Overcoming Challenges, and the Power of Cloudsmith

Explore the intricacies of scaling software delivery, from the nuances of continuous delivery to overcoming common challenges. Dive deep into how Cloudsmith can be the game-changer in your DevOps journey, ensuring agility, security, and efficiency in every release. Every business, from startups to established enterprises, feels the urgency to scale their software delivery. Why?

AzCopy and Azure File Sync: How They Work Together

In the ever-expanding landscape of Azure data management, two powerful tools emerge as essential assets for tech professionals: AzCopy and Azure File Sync. While each has its unique capabilities, together they create an intricate symphony that enhances data transfer and synchronization within Azure. In this comprehensive guide, we’ll unravel the functionalities of both, explore their common use cases, delve into their integration processes, and weigh their benefits and drawbacks.