Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Docker Log Rotation - Definition, Configuration Guide, and Best Practices

Docker containers generate logs to monitor their operations, but without a mechanism in place to manage these logs, they can grow indefinitely, leading to excessive disk space consumption and performance degradation. Implementing docker log rotation is crucial to control log file size and quantity, ensuring efficient log management and optimal system performance.

Syncing PagerDuty Schedules to Slack Groups

We’ve posted before about how engineers on call at Honeycomb aren’t expected to do project work, and that whenever they’re not dealing with interruptions, they’re free to work on whatever will make the on-call experience better. However, all of our engineering rotations rely on hand-off meetings where they update the Slack groups with everyone who’s on call. During my last shift, a small problem kept causing friction for some of our incident management automation.

How to deploy AI workloads at the edge using open source solutions

AI is driving a new wave of opportunities in all kinds of edge settings—from predictive maintenance in manufacturing, to virtual assistants in healthcare, to telco router optimisation in the most remote locations. But to support these AI workloads running virtually everywhere, companies need edge infrastructure that’s fast, secure and highly scalable.

The waiting game is over. 5G is coming to the edge.

Cédric Gégout (VP of Product at Canonical) reflects on a recent research report that Canonical published in collaboration with Omdia. The report uncovered that despite the lack of widespread 5G standalone infrastructure, enterprises, industrial actors and service providers are preparing for 5G edge computing to produce returns within two years.

What the Cyber Resilience Act (CRA) means for IoT manufacturers

The EU Cyber Resilience Act is coming. I’ve talked about this piece of upcoming regulation in some depth before, having covered its background and stipulations in previous pieces on our website and for the Forbes Technology Council, and explored what it means for the businesses who consume open source in later articles (you can also read a version of this blog on Forbes).

BMC Footprints vs Remedy: Key Differences

When it comes to IT Service Management (ITSM), BMC Footprints and BMC Helix ITSM (formerly Remedy) are two of the most well-known tools on the market. However, choosing the right ITSM solution requires careful consideration, as each tool offers different features and benefits. In this blog post, we’ll compare BMC Footprints vs Remedy, exploring their key differences.

IT Infrastructure Optimization: Improved Performance and Cost Savings

IT infrastructure optimization should be a top priority. It is not just about upgrading hardware or software but about ensuring that all components work together seamlessly to support business needs. Your IT infrastructure supports all your daily operations and some of your long-term strategic goals. In this article, we'll explore the key aspects of IT infrastructure optimization, discuss practical steps to improve performance, and offer tips for managing costs.

Tool Sprawl and How to Stop It

Humans have always used tools to help them achieve their goals. But in the digital era, this dynamic is often reversed. Our tools now inundate us with so much attention-demanding information, it can feel like they control us. This is especially true in the IT department, where juggling a vast array of monitoring products and solutions can be a constant headache for tech professionals. Let's take a closer look at the chaos of tool sprawl and how teams can take back control of their stack.

Introducing Megaport AI Exchange

Supercharge your AI innovation with secure, scalable, and high-performance connectivity for your AI workloads. AI isn’t magic. Just like every other system in the IT world, AI is built on computing infrastructure – and the performance of your AI applications hinges on this infrastructure and the connections that bind it.