Operations | Monitoring | ITSM | DevOps | Cloud

Kubernetes monitoring and troubleshooting made simple

Infrastructure monitoring was difficult enough when entire businesses ran off a few bare metal servers in a dusty, forgotten closet. Other IT infrastructure monitoring tools fell short, unable to provide complete and granular-enough metrics in real time, even when we were only dealing with a handful of systems responsible for running every part of the application stack.

The Value of Ingesting Firewall Logs

In this article, we are going to explore the process of ingesting logs into your data lake, and the value of importing your firewall logs into Coralogix. To understand the value of the firewall logs, we must first understand what data is being exported. A typical layer 3 firewall will export the source IP address, destination IP address, ports and the action for example allow or deny. A layer 7 firewall will add more metadata to the logs including application, user, location, and more.

Highly available Kubernetes in IoT: MicroK8s on RaspberryPi

Learn how to set up a Pi-Hole instance with a single command and a cluster of Raspberry Pis on MicroK8s. High availability, load balancing and Kubernetes configuration included. The Raspberry Pi 4 brings the graphics, RAM and connectivity needed for a Linux workstation, so why not use a cluster to set up your own Pi-Hole, the open source network-level ad blocker that acts as a DNS sinkhole or DHCP server.

From Distributed Tracing to APM: Taking OpenTelemetry & Jaeger Up a Level

It’s no secret that Jaeger and OpenTelemetry are known and loved by the open source community — and for good reason. As part of the Cloud Native Computing Foundation (CNCF), they offer one the most popular open source distributed tracing solutions out there as well as standardization for all telemetry data types.

Measuring User Experience with Web Vitals

Top of search for you means top of mind for your customers. And with Google’s upcoming Page Experience update to Web Vitals taking place in a few weeks, now’s the right time to optimize your user experience. But before you can optimize your user’s experience, you need to be able to measure it. We’re kicking off Measurement May by breaking down breaking down how Google uses Web Vitals data — and how you can instrument that data with Sentry.

How to search logs in Loki without worrying about the case

Whether it’s during an incident to find the root cause of the problem or during development to troubleshoot what your code is doing, at some point you’ll have an issue that requires you to search for the proverbial needle in your haystack of logs. Loki’s main use case is to search logs within your system. The best way to do this is to use LogQL’s line filters. However, most operators are case sensitive.

Why Experience Level Agreements for Microsoft 365 are Becoming a Business Expectation

When it comes to business, having a productive IT team means enhanced productivity. Understanding that productivity is a direct result of a good user experience is crucial. In this blog, we will examine what constitutes a good user experience and how experience level agreements for Microsoft 365 are becoming a business expectation. An effective Experience Level Agreement is a combination of different data sources.

The fastest SQL Change Automation, Azure DevOps and AzureSQL DB pipeline

Is it possible to set up an end-to-end deployment pipeline from Dev through to Production in Azure DevOps, with SQL Change Automation and Azure SQL DB in just 10 minutes? Join Chris Unwin, a Redgate Solution Engineer, as they try to break the record for setting up a migrations-first pipeline with SQL Change Automation from Dev to Continuous Integration and finally, deployment.