Operations | Monitoring | ITSM | DevOps | Cloud

Messaging

Kafka Security - First Steps

Apache Kafka provides an unified, high-throughput, low-latency platform for handling real-time data feeds. Installing Apache Kafka, especially the right configuration of Kafka Security including authentication and encryption is kind of a challenge. This should give a brief summary about our experience and lessons learned when trying to install and configure Apache Kafka, the right way.

Understanding Middleware: What It Is and How It Works

Distributed systems are highly scalable and efficient — but only when integrated into a powerful network. A distributed system can only function if all its applications can communicate effectively with one another. However, this is often easier said than done due to the multi-layered nature of modern architectures. Modern architectures consist of applications written in various languages with different protocols, and they are spread across multi-cloud and multi-cluster environments.

Thank You 2022 Nastel Advisory Board Members!

Formed in 2021, the Nastel Technologies Advisory Board is made up of business and IT leaders from a wide variety of sectors, across the world. These enterprise leaders and innovators understand the incredibly important role of planning for, and the management of, the integration infrastructure (i2) layer (including messaging middleware, APIs, and much more) in their enterprises to enable meeting IT and larger corporate goals in 2022.

MQTT vs RabbitMQ (AMQP 0.9.1) for IoT

RabbitMQ is an open source server that was created to support the AMQP 0.9.1 messaging protocol. It now supports other protocols as well, including MQTT 3.1.1, but AMQP 0.9.1 is its core method. So here we will compare AMQP 0.9.1 with MQTT. MQTT was designed for the Internet of Things (although it wasn’t called that at the time). Both MQTT and AMQP run over TCP connections, both are client-server in architecture and bi-directional.

Sponsored Post

Transaction Tracking vs Transaction Tracing - What's the Difference?

Transaction tracking and tracing are not the same thing. One of the top 10 banks in the world recently chose Nastel and this was their primary reason. They had a Priority 1 request processor incident on the mainframe where high value messages went missing and it took two weeks to find them. They began by looking at another vendor who said that they did transaction tracking. As the customer said, "They will try to tell you that they do transaction tracking, and that took us a while to drill down." So, let me explain the difference between these terms using an analogy.

Your Telemetry Data is Faster, Is Your Analysis?

Continuous intelligence (CI) platforms can be used to collect telemetry data from various sources, perform analysis on that data, make inferences about the data, and provide real-time insights that help businesses understand what’s going on. For years, network, application performance, and security monitoring were fairly passive operations. Systems collected key telemetry data, and operators received alerts when a particular metric crossed a preset threshold. Operations were limited in two ways.

Join the Mattermost mobile beta program: v2.0 is now live!

Get ready for the future of Mattermost mobile. Beta testers can now access Mobile v2.0, including multi-server support — our most requested mobile feature ever. We’re also bringing you a number of usability enhancements and performance improvements to make you productive on the go. If you want to be on the cutting-edge of Mattermost mobile development, we’d encourage you to join the mobile beta program today.

Morph: Database Schema Migrations Made Easy

Morph is a new database migration tool designed to improve Mattermost schema migrations. It can be used programmatically with a library and from a CLI. Morph stores the schema version in a table, where all applied migrations are persisted. It’s a flexible open source library that can be used with a driver interface implementation and a source to read migration scripts from. The engine uses a dependency injection pattern so that any implementation can be used with the library.