Operations | Monitoring | ITSM | DevOps | Cloud

The Need for 'Real ISP' Visibility in your DEM Strategy

Recently, one of my buddies moved to a new apartment. As an extreme binge-watcher, he tried all different combinations for positioning his 65-inch 4K TV and leather recliner in almost every single sq. ft of the living room. The only flexibility he did not have was in choosing an Internet Service Provider (ISP) for his new house. As a backend dev professional, it did not even matter to him as long as he was getting a 150Mbps internet connection.

Creating a host through the Icinga 2 API

Learning about the Icinga API can be an eye opening moment for some, and lead to a path of automation and configuration management. But where to start? Well, you can always check out the Icinga API documentation for that. But today, I have an idea for you – I’ll show you how to create a host through the Icinga 2 API.

macOS vs. Windows - What kernels tell you about security events: Part 1

How would you compare the Windows and macOS operating systems? In what ways are they similar? Why do they each take different approaches to solving the same problem? For the last 19 years I've developed security software for Windows. Recently, I’ve started implementing similar features on macOS. Since then, people have asked me questions like this. The more experience I gained on these two operating systems, the more I realized they’re very different.

Challenges of Going Serverless (2020 edition)

While we know the many benefits of going serverless - reduced costs via pay-per-use pricing models, less operational burden/overhead, instant scalability, increased automation - the challenges are often not addressed as comprehensively. The understandable concerns over migrating can stop any architectural decisions and actions being made for fear of getting it wrong and not having the right resources.

Improve Website Performance and Availability with Synthetic Monitoring

Enterprise monitoring tools have traditionally paid attention to the performance of monolithic applications hosted on physical and virtual infrastructure resources. The adoption of cloud native and microservices architectures has brought greater focus to end-user experiences delivered by web applications across different global locations. The bar for a great digital customer experience has never been higher.

Improving Application Quality through Log Analysis

Throughout the history of software development, one statement has remained true: no application is perfect. Due to that fact, development organizations must work with all resources at their disposal to limit the impact that application problems have on the end-user. Server log files represent an important resource that should be referred to during the process for troubleshooting any application issue.

Encryption at rest with Ceph

Do you have a big data center? Do you have terabytes of confidential data stored in that data center? Are you worried that your data might be exposed to malicious attacks? One of the most prominent security features of storage solutions is encryption at rest. This blog will explain this in more detail and how it is implemented in Charmed Ceph, Canonical’s software-defined storage solution.

Data science workflows on Kubernetes with Kubeflow pipelines: Part 2

This blog series is part of the joint collaboration between Canonical and Manceps. Visit our AI consulting and delivery services page to know more. Kubeflow Pipelines are a great way to build portable, scalable machine learning workflows. It is a part of the Kubeflow project that aims to reduce the complexity and time involved with training and deploying machine learning models at scale. For more on Kubeflow, read our Kubernetes for data science: meet Kubeflow post.