Operations | Monitoring | ITSM | DevOps | Cloud

Optimizing SD-WAN Monitoring Efficiency for MSPs: SATLX Deploys Obkio for Distributed Continent-Wide Network Monitoring

In today's rapidly evolving digital landscape, organizations across industries increasingly rely on Software-Defined Wide Area Networks (SD-WANs) to streamline their network infrastructure and enhance connectivity between geographically dispersed locations. As the demand for efficient and reliable network performance continues to grow, Managed Service Providers (MSPs) face the challenge of effectively monitoring and managing these complex SD-WAN environments.

Canonical releases Charmed Kubeflow 1.8

Canonical, the publisher of Ubuntu, announced today the general availability of Charmed Kubeflow 1.8. Charmed Kubeflow is an open source, end-to-end MLOps platform that enables professionals to easily develop and deploy AI/ML models. It runs on any cloud, including hybrid cloud or multi-cloud scenarios. This latest release also offers the ability to run AI/ML workloads in air-gapped environments.

A Quick Guide To Google Cloud Platform (GCP) Tools

Over the past few years, Google has grown its cloud services to include more than 100 products and services. Today, Google Cloud rubs shoulders with the top two cloud service providers. Yet, managing a Google Cloud environment has become increasingly challenging as the platform expands its GCP tools. It’s not just Google Cloud. The same is true today for other leading public cloud providers. To its credit, Google Cloud provides plenty of tools to help you get the most out of the platform.

Best Practices to Avoid Website Outages on Black Friday

The most frenzied shopping day of the year – Black Friday – is fast approaching, and businesses around the globe are bracing themselves. However, imagine this – a massive number of eager shoppers ready to snag the hottest deal, and just when your website should be working at its best, it crashes, leaving behind frustrated customers and potential revenue slipping through your virtual fingers. This scenario is not entirely fictional.

Defensive Instrumentation Benefits Everyone

A lot of reasoning in content is predicated on the audience being in a modern, psychologically safe, agile sort of environment. It’s aspirational, so folks who aren’t in those environments may feel like the path there includes doing “the new thing” or using “the new tool.” If you write software and your employer hasn’t caught up to all the newest, best ways to work, I hope this pragmatic post helps you sleep better at night.

Better when closer: the role of the data centre in your network

For those who remember the tech world before the COVID digitalisation gold-rush, the 2019 assertion by Gartner that 'The Data Centre Is (Almost) Dead, ruffled feathers. The report warned that by 2025, 80% of enterprises will shut down their traditional data centres. In fact, 10% of organisations already have. Then the pandemic hit and the global demand for world-class user experiences (for workforces and customers alike) exploded.

Turkeys, Tech, and Table Settings: A Humorous Guide to IT Security at Thanksgiving Dinner

Let’s set the table a bit. As you know, in the U.S., Thanksgiving is coming up. And recently I had a conversation with my 83-year-old mother about Thanksgiving. Of course, we came across the inevitable parallels between Thanksgiving dinner and network security! That’s what you would be thinking when talking about Thanksgiving dinner with someone right? Before we dive into the feast, let me set the table.

5 Tips For Consumers To Shop Safely This Black Friday

While it makes for bleak reading, the frenzy of sales and online shopping activity surrounding Black Friday, means this pre-holiday season is a key period for cybercriminals. And each year we see an increase in cyberattacks during what should be a feel-good time. With more consumers expected to be shopping online this year, the opportunity for fraudulent behaviour is rife. But that doesn’t mean we have to surrender to the risks of poor website security.

Icinga 2 API with Let's Encrypt certificates, just for fun

In our community forum Michael already outlined the possibility to operate Icinga 2 with an external certification authority, not the one Icinga 2 generates by itself. Thomas, one of our NETWAYS colleagues, reported his experience in that field: in short, it’s easy to mess up lots of things and hard to debug them. And I absolutely agree. At the moment I’m reading TLS Mastery from Michael W. Lucas.

New in Grafana roles: Manage user permissions better with 'No basic role'

Since we introduced role-based access control (RBAC) in Grafana 9.0, users — and later, service accounts — have been required to have an assigned role that includes a basic set of permissions. This sometimes led organizations to create users and service accounts that had more permissions than necessary. As a result, Grafana administrators had to make additional adjustments to users’ permissions on a case-by-case basis.