Operations | Monitoring | ITSM | DevOps | Cloud

Running MongoDB on Kubernetes

Containers are a lightweight, portable, and consistent way to package applications and their dependencies. Containers provide an isolated environment, ensuring an application runs reliably across different environments. Enterprises and tech-savvy individuals are using container technologies because of their benefits. However, container orchestration tools have become necessary to manage clusters with the rise in container usage.

AWS vs GCP: Choosing the Best Cloud Provider for Your Needs

If you are confused about whether to go for AWS or Google Cloud (GCP) in 2023, then you should read this article. Both AWS and GCP have made tremendous progress over the past few years. There was a time when AWS was much ahead of Google, but not anymore. Google has reduced the gap to a great extent; it even surpasses AWS in some areas, especially data analytics. However, there is no one-size-fits-all answer to this problem.

The Driving Force of Community at All Things Open 2023

The most noticeable takeaway from All Things Open 2023 was how visibly and demonstrably people were there for the event itself. Not to check a box or browse the swag but to be together, show their support of open source, and glean every last bit of knowledge they could.

What is Network Monitoring?

Today, more than ever, as IT environments become more diverse and complex, the need for an effective network monitoring solution has become paramount. However, with the digital environment, it’s constantly ever-evolving, so, these tools must keep pace with these changes to ensure they are still effective for users diagnosing issues and identifying bottlenecks within their network.

Implementing Backstage 3: Integrating with Existing Tools Using Plugins

This third part of the “Implementing Backstage” series explains how to integrate Backstage with existing tools and plugins. If you’re at an earlier stage of your Backstage implementation, the two previous installments in this series focus on getting started and using the core features. If you’re looking for a more general introduction to Backstage, you can read the first article in the “Evaluating Backstage” series.

Achieving observability in Heroku applications with Sumo Logic

Are you one of the many companies harnessing the power of Heroku to build, deliver and scale your applications seamlessly? If so, you're likely aware of the need for robust observability to ensure your Heroku environment runs smoothly. Let’s delve into the world of Heroku monitoring and explore how Sumo Logic, a leading observability platform, can provide invaluable insights into your Heroku infrastructure and application logs.

How do you measure software health?

Just like personal health, software health is best managed proactively so you can prevent issues before they occur and avoid costly, stressful outages. Cortex helps you track and improve the health of your software with Scorecards and Initiatives. Scorecards quantify software health by aggregating data from multiple sources to give you a continuous view into the health of your system. Initiatives use Scorecards to drive organizational improvement.

Using Cribl Search to Aid in Threat Hunting by Enriching Data in Motion

Cribl Search is reshaping the data search paradigm, empowering users to uncover and analyze data directly from its source. Cribl Search can easily reach out and query data already collected in Amazon S3 (or S3 compatible), Amazon Security Lake, Azure Blob, Google Cloud Storage, and more. By searching data where it lives, you can dramatically speed up your search process by avoiding the need to move data before analyzing it.

Got Ghosts in Your Enterprise Network?

Shining a light on the dark corners of the new enterprise network doesn't have to be as scary or overwhelming as some think. While “ghost issues” typically lurk in these sometimes unexplored places on the internet or in cloud environments, during this Halloween season your network operations teams can gain the confidence to not only uncover these network ghosts, but compel and cast them out forever.