Operations | Monitoring | ITSM | DevOps | Cloud

%term

How Py Surfaces Critical Errors with Sentry

In A Comedy of Errors, we talk to engineers about the weirdest, worst, and most interesting application and infrastructure issues they’ve encountered (and resolved) over the years. This week, we hear about Py from Derek Lo, Founder and CEO, and Brian Sweatt, Lead Full-Stack Engineer. Py empowers hiring teams with a suite of products to evaluate technical candidates.

Why Kubelet TLS Bootstrap in Kubernetes 1.12 is a Very Big Deal

Kubelet TLS Bootstrap, an exciting and highly-anticipated feature in Kubernetes 1.12, is graduating to general availability. As you know, the Kubernetes orchestration system provides such key benefits as service discovery, load balancing, rolling restarts, and the ability to maintain container counts by replacing failed containers. And by using Kubernetes-compliant extensions, you can seamlessly enhance system functionality.

Speeding Things Up So Your Queries Can Bee Faster

Honeycomb strives to be a fast, efficient tool; our storage back-end satisfies the median customer query in 250ms (and the P90 in 1.3 seconds). Still, every system has its limits, and customers with large datasets know that querying over a long time range, grouping by high-cardinality columns, building complex derived columns, and throwing a quantile or heat map into the mix can lead to some pretty slow queries. If this sounds familiar: good news!

Network Traffic Capture with Network TAPs

Network TAP (Terminal Access Point or Test Access Point) is the most common hardware device used for network traffic capture purpose. A Network TAP is basically a hardware designed to access the traffic between two network nodes and mirror it into a monitor port where we can connect a third party Analysis tool to listen.

Why Whitelist An Email Address?

TLDR; "If you expect to receive important emails from a trusted email address it is worth whitelisting the address to make sure that emails won't be accidentally blocked by an overzealous email client." Whatever email client you use, be it Gmail or Thunderbird, Outlook or Apple Mail, you can be sure that it comes with some kind of spam management built in. Most of the time this works well - legitimate emails are delivered to your inbox and spam is either rejected or gets funnelled to your spambox.

Announcing Tessen, the Sensu call-home service

As a monitoring company, it’s only natural that we’d always seek more data to inform our product decisions. With that in mind, we created Tessen, a hosted Sensu call-home service. Tessen is opt-in for the current version of Sensu, but will be opt out in Sensu Go (ICYMI, here’s our product roadmap, including the GA release date). Here’s what you need to know, including what we’re collecting and how that data benefits the Sensu Community.