Gear up as The ITOM podcast returns with an all new episode specially tailored to help ease all your remote work woes in an IT environment. In the last episode, we discussed VPNs, their protocols, and the advantages of using a VPN in the remote work setting. Episode 1 helped set the stage for us to dive deeper into the nuances of VPN security and encryption. Encryption helps transform confidential information into cipher text or coded text for safe transit across secure VPN tunnels.
Anything bad that can happen — will happen. This old adage applies 100% to the technology industry, where crashes and outages are far more common than the sales and marketing teams would want us to think. However, DevOps engineers that deal with infrastructure know how hard it is to ensure everything works as intended all of the time — and to configure monitoring that actually keeps track of a system’s health and helps prevent crashes and downtime.
As more organizations move to the cloud, the volume of machine generated data has grown exponentially and is increasingly important for many teams. Software engineers and SREs rely on logs to develop new applications and troubleshoot existing apps to meet reliability targets. Security operators depend on logs to find and address threats and meet compliance needs. And well structured logs provide invaluable insight that can fuel business growth.
SCOM isn’t only powerful when it comes to monitoring on-prem infrastructure, but it has also come a long way when it comes to monitoring your Azure resources. Microsoft offers a great Management Pack for monitoring Azure resources which has been through a few iterations and has only become better with each one.
Use the HAProxy Runtime API to update SSL certificates in HAProxy without a reload. When you route traffic through an HAProxy load balancer, you gain the ability to terminate SSL at the load balancer. HAProxy encrypts communication between the client and itself and then sends the decrypted messages to your backend servers, which means less CPU work on the servers because there’s no encryption work left to do.