Operations | Monitoring | ITSM | DevOps | Cloud

Clojure microservices for JavaScript developers

This series was co-written by Tyler Sullberg and Musa Barighzaai. CircleCI is growing, which is wonderful. However, one of the growth challenges we have is that our backend is primarily written in Clojure, and few developers know Clojure. Many CircleCI engineers, including myself, have learned Clojure on the job. Before joining CircleCI, I was a JavaScript developer. As the lingua franca of software engineers, JavaScript is a relatively straightforward language to learn.

How to Troubleshoot Network Routing and Connectivity in Your AWS Environment

Your public cloud can seem like a “black box.” And when there’s a cloud networking problem, it can be tough to identify and fix it fast. Join Kentik Cloud expert, Dan Rohan, as he demonstrates how Kentik Cloud helps you proactively see and troubleshoot AWS network routing and connectivity issues quickly. What You'll Learn -- Kentik product manager Dan Rohan discusses: During in-product demonstrations, Dan shows.

High-availability connectivity for Kubernetes with dual ToR

Dual ToR (top of rack) peering provides a redundant path for customers with cluster applications that cannot tolerate service downtime or failure and require a high-availability solution. While Calico ToR connectivity has existed for some time, Calico Enterprise now supports connectivity with dual ToR switches.

Powerful Time-Based Automation Rules to Move You From Reactive to Proactive

Unattended incidents won’t clean up after themselves and will come back to haunt you—whether as rising MTTR metrics, a cluttered Incident Index, fruitless back-and-forth communication, or a declining CSAT score. Powerful automation conditions can drive productivity, save you manual work, and speed up your incident lifecycle management —and keep your employees happy.

SAN Performance Monitoring

A Storage Area Network (SAN) is a specialized, high-speed network that provides block-level network access to storage. SANs are typically composed of hosts, switches, storage elements, and storage devices that are interconnected using a variety of technologies, topologies, and protocols. Each computer on the network can access storage on the SAN as if they are local disks connected directly to the computer.

Comparison N-Able vs Kaseya vs Pandora FMS: Fight !!!

Lemons, oranges, grapefruits, limes… We know that they are not the same, but if necessary, you can make juice with all of them. And yes, we can and we will. We are in summer and it makes you want to make a good cocktail, doesn’t it? Today, in PFMS blog, we are going to analyze the commonalities of N-Able (Solarwinds MSP), Kaseya and Pandora FMS. Also their -remarkable- differences of course.

Get Started with Splunk for Security: Splunk Security Essentials

Continuing to ride the waves of Summer of Security and the launch of Splunk Security Cloud, Splunk Security Essentials is now part of the Splunk security portfolio and fully supported with an active Splunk Cloud or Splunk Enterprise license. No matter how you choose to deploy Splunk, you can apply prescriptive guidance and deploy pre-built detections from Splunk Security Essentials to Splunk Enterprise, Splunk Cloud Platform, Splunk SIEM and Splunk SOAR solutions.