Operations | Monitoring | ITSM | DevOps | Cloud

Linux

Cloud PaaS through the lens of open source - opinion

Open source software, as the name suggests, is developed in the open. The software can be freely inspected by anyone, and can be freely patched as required to suit the security requirements of the organisation running it. Any publicly identified security issues are centrally triaged and tracked.

DataOps: keeping the data flowing with Model-driven Operations

If you’ve ever lived DataOps, you’ll know that it’s a challenge at the best of times. A day in the life of a typical data engineering team involves securing, releasing, debugging and stabilising complex and oftentimes fragile data pipelines. These pipelines can involve many source applications and intermediaries, and troubleshooting them under management pressure when it’s all going wrong is stressful.

Happy birthday - 30 Years of Linux

Thirty years ago today, Linus Torvalds announced his free operating system to the world. As with many of the world’s greatest, Linux had humble beginnings as a very small pet project. The GNU was working on an ambitious free, public domain operating system but the project had been delayed, and enthusiasts were quick to adopt Linus’ new project.

Model-driven observability: the magic of Juju topology for metrics

In the first post of this series, we covered the general idea and benefits of model-driven observability with Juju, but did not dive deep into the idea of contextualization and how it makes observability more actionable. In this post we start addressing what contextualization means in model-driven observability, starting from adding Juju topology metadata added to telemetry, and how that improves the processing and querying the telemetry for charmed applications.

How to detect security threats in your systems' Linux processes

Almost all tasks within a Linux system, whether it’s an application, system daemon, or certain types of user activity, are executed by one or more processes . This means that monitoring processes is key to detecting potentially malicious activity in your systems, such as the creation of unexpected web shells or other utilities.