Operations | Monitoring | ITSM | DevOps | Cloud

%term

Now in private beta: Gremlin Service Mesh Extension

Service meshes like Istio have become an essential way to securely and reliably distribute network traffic, especially with ephemeral, service-based architectures such as Kubernetes. However, their constantly shifting nature can interfere with targeting specific services for resilience tests. Infrastructure-based testing is designed to target specific IP addresses, allowing precision testing of applications, VMs, and nodes.

Release Roundup November 2024: Reliability in the serverless and AI era

2024 is coming to a close, and while many teams are slowing down in preparation for the holidays, we’ve been cooking up tons of new features. We’ve extended our platform support to the Istio service mesh, added a brand new experiment type for testing artificial intelligence (AI) and large language model (LLM) workloads, and made it easier to onboard Kubernetes clusters. We’ve also made our Linux and Windows agents more robust and performant.

The Art of the Possible: Drawing Up Your DEX Strategy

Digital Employee Experience (DEX) is more than just technology—it's a transformative journey. In this first episode of our series, Emily Schlick (Vizient) and Zakir Mohammed (Toyota) share their strategies and lessons from their first year of DEX implementation. Learn how they: Built a strong DEX strategy Empowered people and processes Partnered with Nexthink to drive success Whether you're starting your DEX journey or looking to level up, this episode is packed with actionable insights to help your organization thrive.

Third-party secrets are now supported in Bitbucket Pipelines

Bitbucket Pipelines is excited to announce support for CI/CD third-party secrets – a powerful new feature that enables you to seamlessly retrieve secrets directly from your preferred secret store. This enhancement ensures your workflows remain efficient and secure. Now, you can set up your own integration and customize the utilization of your secrets to suit your needs.

Optimize and troubleshoot cloud storage at scale with Storage Monitoring

Organizations today rely on cloud object storage to power diverse workloads, from data analytics and machine learning pipelines to content delivery platforms. But as data volumes explode and storage patterns become more complex, teams often struggle to understand and proactively optimize their storage utilization. When issues arise—such as unexpected costs or performance bottlenecks—these teams frequently lack the visibility needed to quickly identify and resolve root causes.

Understanding the Differences Between Flow Logs on AWS and Azure

AWS VPC flow Logs and Azure NSG flow Logs offer network traffic visibility with different scopes and formats, but both are essential for multi-cloud network management and security. Unified network observability solutions analyze both in one place to provide comprehensive insights across clouds.

What Do Most Corporations Do With Returned Computers?

When computers are returned to a corporation, they don’t simply disappear into storage or landfills. Companies often implement structured processes to make the most of these devices while adhering to regulatory and ethical standards. Managing returned computers is a practical and pressing concern for corporations, whether dealing with employee's offboarding, end-of-life hardware, or upgrades. The process involves multiple considerations, from data security to environmental compliance.

How to Mitigate DDoS Attacks and the Impact on Availability

Distributed Denial of Service (DDoS) attacks are intended to overwhelm a network or server and cause failure or work stoppage. DDoS attacks first appeared in the mid-1990s and continue to the present day. Far from going away, they have become more prevalent: in the first quarter of 2024, the number of DDoS attacks against web servers increased by 93% compared to the same period a year earlier. One survey found that nearly 70% of organizations experienced 20 to 50 DDoS attacks per month.