Operations | Monitoring | ITSM | DevOps | Cloud

Azure Kubernetes Service: How to create a cluster

Azure Kubernetes Service, Microsoft's managed Kubernetes solution, allows you to quickly create a Kubernetes cluster in Microsoft Azure and provides features to help you manage and maintain your Kubernetes cluster in Azure. In this blog post we will go over some of the features of AKS and then walk through creating an AKS cluster.

Take a peek inside the latest version of the Dynatrace Enterprise plugin for Grafana

Hi, everyone! In honor of bingeing every season of Community over the last few weeks, Eldin and Christine have been inspired to rebrand ourselves as none other than our other favorite dynamic duo, Troy and Abed! Yet, instead of singing “Troy and Abed in the morning,” we are back to write about some useful improvements we’ve made to our Enterprise Dynatrace plugin.

Are you paying too much for your logging solution?

The cost of logging is one of the big problems of a scaled software system. Logging solutions now need to support far more than they ever have. You need to make a real investment in a logging solution that can support these initiatives. However, the up-front costs of a custom-built logging solution are prohibitive for many organizations. No business wants its bottom line affected by logging costs. That’s where Coralogix comes in.

IT Operations Productivity Now and Beyond

IT Operations teams are at the forefront of supporting enterprise needs for reliability and productivity in this era of remote work, while also supporting critical revenue-driving new digital initiatives. The tools they select and processes they adopt will be instrumental to outcomes in the coming months. Join us for a live video chat with Bhanu Singh, the product and operations leader at OpsRamp, to hear about emerging trends that will help IT Ops teams thrive amid chaos.

Alerts vs Incidents vs ITSM

In order to effectively address production issues in your application, you need to have a strong incident response strategy. Incident response starts with an alert which leads to mobilization and response, and finally results in a record of all that happened and was learned from addressing issues. In this session of Dissecting DevOps, learn about the lifecycle of incidents from alert to post mortem and why incident response is as much a strategy as a process.

Top 5 Mobile Application Performance Monitoring Tools

Your app is done and the client is ready to launch! Everything looks great. But how can you ensure that you will achieve your SLA for uptime? How are you tracking revenue growth (& optimizing)? Do you know how many users you have, and what they’re doing at any given moment in the app? What you need is a monitoring platform that will be able to track these different types of data in one place.

Introducing Flowmon ADS 11

Facing the ever-changing threat landscape, businesses more than ever before seek for fast and precise answers when protecting their values. The new Flowmon ADS 11 is here to meet your needs, bringing massive performance increase, noise-free incident understanding and superior UX. Join this webinar to learn how you can lift your security operations up with a cutting edge network detection and response tool.

Mattermost Integrations Guide, Episode One: A New Hook

One of the great things about Mattermost is how well it integrates with all the other systems you use. But this flexibility can make it difficult to figure out which integration to use for each purpose. This series will review the various ways Mattermost can connect to other systems to give you an idea of what is possible and when to use what method.

The New Model for Network Security: Zero Trust

The old security model, which followed the “trust but verify” method, is broken. That model granted excessive implicit trust that attackers abused, putting the organization at risk from malicious internal actors and allowing unauthorized outsiders wide-reaching access once inside. The new model, Zero Trust networking, presents an approach where the default posture is to deny access.