Operations | Monitoring | ITSM | DevOps | Cloud

How to Download Files from URLs with a Bash Script

In today's dynamic IT environment, automation, and scripting are essential tools for IT professionals and Managed Service Providers (MSPs). Whether it's for deploying applications, managing infrastructure, or troubleshooting, scripts can save countless hours of manual labor, increase efficiency, and reduce human error. One common task that professionals often need to automate is file downloading from a URL using a shell script, specifically a bash script.

Introducing Cortex Plugins and Customization

To be a true system of record, your IDP needs to be a source of truth for all the data in your stack. While Cortex offers 50+ out of the box integrations, and the ability to bring in custom data, we know there are occasions where you’ll also want to visualize or take action on data sourced from other places including internally developed tools or repositories. That’s why we’re excited to officially launch the Cortex plugin framework plus UI customization. Now users can.

Enriching your Search Results with Lookups

It’s quite common for data from a Search to contain references to information that is, well, unintuitive. Error or Message Codes, Port Numbers, Reference IDs, and Customer Numbers are all useful pieces of information, but far from being human-readable. That information is often available in a collateral location, often a spreadsheet or database, where it can be looked up with a “key” field.

Log Data 101: What It Is & Why It Matters

If you mention 'log data' at a crowded business event, you'll quickly be able to tell who's in IT and who isn't. For the average person, log data is about as thrilling as a dental appointment or reconciling a years-old bank account. At the mere mention of log data, their eyes glaze over as they search for an escape from the conversation. Conversely, IT professionals' eyes light up and they become animated when the topic of log data arises.

The Impact of Network Topology

When it comes to arranging your network architecture, there are different methods to consider, each with its own pros and cons depending on your business needs. The way you design your network can improve connectivity for data sharing or increase security. This arrangement of components and their proximity to each other is known as network topology. In this article, we’ll explore network topology, different types of topologies, and how they impact speed, reliability, security, and other functions.

How To Increase Revenue and Protect Your Business from Internet Disruptions with IPM

Over the last few months, we’ve been analyzing the thought-provoking findings of a recent study conducted by Forrester Consulting. This study illuminated the notoriously challenging-to-measure financial impact of Internet disruptions on eCommerce companies.

The Power of VMware CLI

Command Line Interface (CLI) for VMware is not just a feature but a cornerstone for effective virtualization management. Think of it as the hidden trapdoor that takes you straight to the control room of a spaceship. It’s less fancy than the graphical user interface (GUI), but it gets you direct access to the nuts and bolts of your VMware environment.

What's New with Fluentd & Fluent Bit

At the recent KubeCon EU, we learned the significant news of the FluentBit v2.0 major release with numerous new features. What’s new and what’s to come for this key log aggregation tool? On the latest OpenObservability Talks, I hosted Eduardo Silva, one of the maintainers of Fluentd, a creator of Fluent Bit and co-founder of Calyptia.