Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

How To Write Incident Postmortems

Writing a public postmortem regarding an outage is essential to maintaining transparency and accountability when things go wrong in a service or system. The purpose of writing a postmortem is to analyze and document an incident or event that has occurred, usually with a focus on identifying its root causes, understanding what went wrong, and outlining steps to prevent similar issues from happening in the future.

VMware Tanzu Application Service and MySQL: Better Together

VMware SQL with MySQL for Tanzu Application Service is a top choice for customers seeking a multi-cloud, easy-to-use, on demand MySQL service for enterprise applications. Customers who have adopted our solution affectionately refer to it as MySQL tile. Our solution provides tangible benefits over open source and third-party offerings for the VMware Tanzu Application Service platform. To call out a few.

The Essential AzCopy Cheat Sheet

AzCopy is a command-line utility designed for copying data to and from Microsoft Azure Blob and File storage. It allows for efficient data transfer, ensuring the integrity of the files and offering a seamless process. In a world where data is considered a valuable asset, AzCopy stands out as a vital tool for data administrators, developers, and Azure users.

Agentless Network Monitoring: An Introductory Guide

From communication and collaboration to data storage and sharing, networks are critical to almost every business operation today. Thus, monitoring the reliability and security of your network infrastructure is more critical than ever. Network monitoring entails observing and analyzing network traffic to identify issues, optimize performance, and ensure security.

Checkly Advances Monitoring as Code with New User-Centric Features

Checkly, the leading provider of monitoring solutions powered by a Monitoring as Code (MaC) workflow, has unveiled two groundbreaking features: the Activity Log and Code Exporter. These innovative features not only enhance transparency and simplify the adoption of MaC practices but also mark a significant step forward in Checkly's commitment to advancing the MaC movement, offering users an end-to-end workflow that integrates seamlessly with modern software development practices.

How to Plan for a Crisis with Infrastructure-Agnostic Recovery of Kubernetes Applications

Corey Dinkens and Carol Pereira contributed to this blog post. As enterprises deploy modern containerized applications to their Kubernetes clusters, managing data protection centrally is necessary to run critical business applications, especially in multi-cloud distributed environments.

ITOps vs. DevOps: what's the difference?

Titles within an organization evolve nearly as fast as the technology itself. For a long time, the title of DevOps was considered a literal interpretation of “Development” and “Operations” – a catch-all term for hybrid roles encapsulating everything from on-prem, cloud, and hybrid infrastructures, to code execution and lifecycle management. Sounds like a lot? It is.