Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Organizations, the ultimate way to manage your users and projects

Organizations thrive on organization. But as the number of projects and contributors you organize within your organization grows, it becomes more and more difficult to organize your organizational permissions. That’s why we’ve introduced a new type of organizational layer that we’ve cleverly named Organizations. Organizations allow your key contributors to manage your projects and billing, thus removing the bottleneck on the legacy project owner.

Monitor feature releases with Statsig's offering in the Datadog Marketplace

Statsig is a modern experimentation platform that provides crucial insight into how new features are received by your users, so you can make informed product decisions and deploy with confidence. Statsig automatically runs A/B tests on features as they’re rolled out, and measures their impact on key business metrics, such as user growth and engagement.

Testing Your HAProxy Configuration

Learn how to test your HAProxy Configuration. Properly testing your HAProxy configuration file is a simple, yet crucial part of administering your load balancer. Remembering to run one simple command after making a change to your configuration file can save you from unintentionally stopping your load balancer and bringing down your services.

Feature Spotlight: API Dependency Graph

As APIs become more complex, it can be easy to accidentally break connections. To prevent this, Speedscale can automatically detect and make you aware of inbound and outbound transactions running through APIs in our API Dependency Graph. The Traffic Viewer dashboard makes this information visible to independent teams working on different services. In most organizations this information is usually only known by senior engineers, team leads, and architects.

Code Review

Code review is a process to ensure that bugs and errors are caught and fixed before they reach production. This very often requires the participation of developers who are not directly involved in implementing the particular part of code that is being reviewed. Code review is part of a bigger quality assurance process to ensure that the final product performs exactly as expected.

Situation Room: On-Call Team Faces Worst Case of Sunday Scaries

Picture this: it’s Sunday night. You’re relaxing in bed, in that sweet spot where you’re geared up for Monday, but the fun of the weekend hasn’t yet faded. As you idly scroll through content on your phone, you see a message preview pop up. It’s to your work email. That’s bad. It’s from the hosting company you contract. That’s really bad. They’re saying they accidentally deleted the production database. That’s “jump out of bed” bad.

Civo update - August 2021

Welcome to the Civo update for August 2021. It's was a busy month, with the big news being the launch of Civo Academy: A full Kubernetes learning program consisting of over 50 videos created in-house by the team here at Civo. We also kicked off the Civo DevOps Bootcamp! The first few live stream installments have been a huge success, helping developers at any stage of their career learn more about DevOps fundamentals.

Integration Infrastructure Management is the New Black

Information Technology (IT) has moved through many clearly defined eras. I don’t feel the need to list them all, but the latest one clearly is the move from discrete computers to virtualized software-configured environments, that we all colloquially call “the cloud”. And with each technological generation, we have improved the methods we use to integrate discrete modules of technology, and increased the level of automation.

Firewall... It's getting hot in here!

There’s something that humans and machines have in common, and no, it’s not the disappointment suffered by the final season of Game of Thrones, or, well, at least not only that. What we have in common is that we need protection. You know, animals need it too, and plants, but if you’ve gotten this far, it seems that you’re interested in computers, networks and all these pretty modern “geek” things, so today we’ll talk about that kind of protection.